Russian Cyberwar Methods Are Evolving

President Vladimir recentlyoffered to end the war in Ukraine if Kyiv agreed to drop its NATO membership ambitions and concede the four provinces of its territory that are claimed and occupied by Russian troops.These terms were swiftly rejected by the democratically elected Ukraine government. 

But the the Russian offer does suggest that they do not see a near term military victory in the disputed territory, and this could be the motive behind an evolution of its cyberwar tactics in the overall military conflict.

In particular, Russian cyber units have started to focus on targets tied to Ukrainian military objectives, trying to hack devices used by Ukrainian soldiers and getting access into command and control systems.This new approach to cyber operations marks a shift from attacking more strategic civilian targets like telecommunications and energy infrastructure.

It does look like that Russia has altered its approach to exploit the type of targets that could provide more direct battlefield advantages, and supporting its ground forces. These new priorities in the conflict may be an indication that they consider their cyber weapons are becoming a more effective alternative to conventional weapons.

While Russia has deployed a sustained campaign against Ukrainian critical infrastructure since the outset of the conflict in 2022, it has achieved no conclusive strategic advantage. Two years later, Russia has recalculated how it is using  its cyber weapons  and sophisticated hacking capabilities to achieve the type of asymmetric advantage which its very high level of capability can deliver. Although there is no sign that Russia has  abandoned its cyber efforts against critical infrastructure, it looks like cyber attacks against such targets are difficult to carry out and do achieve the anticipated results. 

If Russia’s tactical shift has a measurable impact, then it will be guide for how other militaries will start integrating their own cyber capabilities. Their true power may prove to be not as a 'first strike' weapon, but  a 'force multiplier' on the battlefield - a complement that reinforces conventional military operations.

The extent with which this new effort is successful remains to be seen, however, it is evident is that Russia has not achieved what it is wanted with respect to conducting cyber attacks against Ukraine’s critical infrastructures.

Damage and disruption have been caused but little else with respect to getting Ukraine to submit. This evolution plays to those areas in which cyber operations have been most effective -  stealing data, compromising devices, and surveilling targets in advance of conventional attacks.

If that is right, then we can expect that Russia’s new operational concepts will rapidly proliferate outside  Ukraine.

NCSC   |   Reuters   |    Dark Reading   |    RUSI   |   Europan Parliament   |   Oodaloop   

Image: Unsplash

You Might Also Read: 

Stronger Civilian Cyber Defences In Ukraine:


If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Cyber Crime Hothouses In Myanmar
The Paris Olympics: More Than Just Gold Medals Are At Stake »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Indelible Data

Indelible Data

Indelible Data is an established information security and technology consultancy and a Cyber Essentials Certification Body.

Contrast Security

Contrast Security

Contrast Security is the leader in modernized application security, embedding code analysis and attack prevention directly into software.

Blueliv

Blueliv

Blueliv is a leading provider of targeted cyber threat information and intelligence. We deliver automated and actionable threat intelligence to protect the enterprise and manage your digital risk.

Adeptis Group

Adeptis Group

Adeptis are experts in cyber security recruitment, providing bespoke staffing solutions to safeguard your organisation against ever-changing cyber threats.

Wind River

Wind River

Wind River delivers the technology and expertise that enables the deployment of safe, secure, and reliable intelligent connected systems.

Waratek

Waratek

Waratek is a pioneer in the next generation of application security solutions known as Runtime Application Self-Protection or RASP.

GreyCortex

GreyCortex

GreyCortex uses advanced artificial intelligence, machine learning, and data mining methods to help organizations make their IT operations secure and reliable.

ACM-CCAS

ACM-CCAS

ACM is a UKAS-accredited certification body helping businesses around the world perform to a higher standard. Our certifications include ISO 27001 and ISO 22301.

Slovak National Accreditation Service (SNAS)

Slovak National Accreditation Service (SNAS)

SNAS is the national accreditation body for Slovakia. The directory of members provides details of organisations offering certification services for ISO 27001.

Softcat

Softcat

Softcat offer a broad portfolio of IT services and solutions covering Hybrid Infrastructure, Cyber Security, Digital Workspace and IT Intelligence.

VanishID

VanishID

VanishID (formerly Picnic) is a gritty, pioneering team of intelligence and cybersecurity specialists focused on solving the security challenge of our time - social engineering.

Cyber Defense Technologies (CDT)

Cyber Defense Technologies (CDT)

Cyber Defense Technologies provides services and turn-key solutions to secure and maintain the integrity of your organization’s systems and data against attacks.

Jera IT

Jera IT

Jera IT provide fully managed IT support, cybersecurity services, telecoms systems, and IT strategy consultancy to businesses based in Aberdeen and the surrounding area.

Oak9

Oak9

Oak9's Security as Code platform dynamically secures Infrastructure as Code (IaC) and deployed cloud workloads, automatically.

Cyber Guards

Cyber Guards

Cyber Guards provide comprehensive, turn-key cyber security programs for small and mid-size business for about the cost of one full-time cybersecurity hire.

Prequel

Prequel

Prequel is your real-time problem detection and resolution platform, powered by the global reliability community.