Russia Steps Up Cyberwar Against Ukraine

Since before the start of Russia's failed invasion in 2022,  Ukraine’s national infrastructure - beginning with  the electricity supply and telecoms -  has suffered from Russian cyber attacks. These have targeted the logistics, health care, agricultural and retail sectors, making it more difficult for Ukraine to produce and distribute food and medicine to its population. 

Frequent attacks against media, telecommunications and Internet providers make it harder for the country to keep its populace well informed about attacks using conventional weapons.

Those conducted against Ukraine’s energy providers and storage facilities undermine its ability to keep its population warm and able to work. However, Russia’s Winter cyber warfare campaigns have not limited their scope to targeting Ukraine-based entities alone  - they have frequently affected neighbouring  countries that support it

Now, the threat intelligence experts at Cyjax has published new research titled 'The Cyber Winter of Discontent'  which analyses the conflict in Ukraine makes predictions as to how Russia may conduct cyber military activity over winter this year.

It finds that Russia is facing a crisis of resources and manpower and with Ukraine receiving a steady supply of defensive weapons and technology from the West, Russia may struggle to effectively deploy malware against its critical national infrastructure at scale. Cyjax think that Russia may turn its attention to more cost-effective tactics outside of the region in an effort to disrupt supply chains and deter the West from supplying its ally. 

In particular, analysts at Cyjax have made multiple predictions on how the country will strategise over the cold months:

  •  Russia will likely choose to keep some cyber attack resources in reserve rather than exhausting them all during this war, to ensure that they retain offensive and defensive capabilities should they be invaded themselves.
  •  Hacktivism will be a core component of Russia’s campaign, due to its low operational cost and the level of plausible deniability.
  •  Cyjax has observed a number of hacktivist groups increasing in activity namely: UserSec, SiergedSec, NoName057, AnonymousSudan, AnonymousRussia, and Killnet.
  •  In an effort to disrupt military supply chains in 2024, Russia will continue to target the CNI of Ukraine’s allies; it is likely cyber defences outside of Ukraine have remained comparatively weak as they have not been so heavily targeted in comparison to those of Ukraine.
  •  Cyjax has observed many pro-Kremlin hacktivist collectives switching their targeting away from Ukraine to attacks on organisations based in Israel and those countries supporting it. 

“The West’s support to Ukraine’s cyber defences has stagnated Russian attacks, putting the Russia in a difficult position as it struggles to find resources for a cyber and kinetic attack... which is why it makes sense that it would turn its attention to western critical infrastructure to induce war fatigue and disrupt supply chains" according to Roman Faithful, Cyber Intelligence Lead at Cyjax. 

Although military experts anticipate less activity on the ground over the winter period, businesses and cyber security experts should be on their guard for any irregular activity and bolster their defences across the cyber and information space over what could be a very difficult winter in Ukraine.

Image: Alexandra Koch

You Might Also Read: 

Online Conflict In Gaza & Ukraine:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Joint Opposition To Online Threats From North Korea
Artificial Intelligence Is Good For The Legal Profession »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Digital Shadows

Digital Shadows

Digital Shadows is a cyber threat intelligence company that helps clients discover sensitive data exposed through social media, cloud services and mobile devices

L3Harris United Kingdom

L3Harris United Kingdom

L3Harris UK (formerly L3 TRL Technology) designs and delivers advanced electronic warfare and cyber security solutions for the protection of people, infrastructure and assets.

CybergymIEC

CybergymIEC

CybergymIEC is a global leader in cyber defense solutions and training services.

Silensec

Silensec

Silensec is a management consulting, technology services and training company specialized in information security.

PRESENSE Technologies

PRESENSE Technologies

PRESENSE Technologies specializes in monitoring and enforcing IT security policies at critical points in the network and on end systems.

Viscount Systems

Viscount Systems

Viscount Systems is a global security software solutions company that is changing the way access control is deployed and managed in the enterprise.

LSoft Technologies

LSoft Technologies

LSoft Technologies is a leader in data recovery software technologies.

HackControl

HackControl

HackControl services include penetration tests, security audits, block chain audits and brand and anti-phishing protection.

Phoenix Cybersecurity

Phoenix Cybersecurity

Phoenix Cybersecurity Services and Managed Security Services help clients just like you take full advantage of leading cybersecurity technologies and industry best practices.

SHe CISO Exec

SHe CISO Exec

SHe CISO Exec is a sustainable global training and mentoring platform in information security and leadership.

blueAllianceIT

blueAllianceIT

blueAlliance IT is an investment and growth platform that unites local MSP and IT companies around the nation, helping them to grow and operate competitively.

VISTA InfoSec

VISTA InfoSec

VISTA InfoSec is a global Information Security Consulting firm with offices based in US, UK, Singapore and India.

DeNexus

DeNexus

DeNexus is the leading provider of cyber risk modeling for industrial networks. Our Mission is to build the Global Standard for Industrial Cyber Risk Quantification.

HORNE

HORNE

HORNE is a professional services firm supporting clients in public, private & government sectors nationwide.

Security Compliance Associates (SCA)

Security Compliance Associates (SCA)

The sole focus of SCA is safeguarding critical information and complying with information security regulations.

AddSecure

AddSecure

AddSecure is a leading European provider of secure IoT connectivity and end-to-end solutions.