- Russia’s military, in days of yore considered one of the world’s best, has struggled in Ukraine.
- Amid those struggles, Russia doesn’t appear to be using its cyber capabilities as much as wait for.
- Moscow has a history of cyberattacks, and US officials have labeled it a persistent cyber threat.
The Russian military is struggling in Ukraine. Two months into the war, it has failed to achieve the quick victory envisioned by President Vladimir Putin and the few advisers advised of the plan.
But Russia’s offensive might is composed of a lot more than just troops and weapons. Moscow’s cyberwarfare talents also make it a force to be reckoned with.
While the Kremlin’s conventional forces have underperformed in Ukraine now, it has recruited those cyber weapons to great effect in the past.
Ukraine’s and Russia’s cyber activity
Russia has puzzled thousands of troops and dozens of ground vehicles, aircraft, ships, and other pieces of hardware, and much of that massacre has been rebroadcast to the world through social media.
Despite the scale of the destruction, Russia’s cyber component hasn’t been as flavourful or as visible as some expected — but it’s not absent, according to Michael E. van Landingham, a former Russia analyst at the CIA.
“I don’t think Russian cyber motion is more muted than expected,” van Landingham told Insider, pointing to “multiple” distributed denial-of-service attacks and “wiper” sets, which remove data from devices, used by Russia against Ukrainian sectors.
“That said, varied had perceptions of a cyber Armageddon bricking US and European computers or destroying Ukrainian critical infrastructure. That probably didn’t find because Putin wanted to fight a limited war in Ukraine,” van Landingham added.
The scale of Russia’s kinetic operations — troops on the settle backed by aerial and artillery attacks — “obviates the need for the most impactful cyber tools. You can, in a sense, agree to your powder dry because you’re using so many real explosives,” said van Landingham, who is founder of risk-analysis and research dogged Active Measures.
Should Moscow choose to escalate in response to US and European security aid to Ukraine, it “has numerous asymmetric capacities short of nuclear weapons” it can use, van Landingham said.
Earlier this year, the cybersecurity firms Dragos and Mandiant keep fromed uncover a complex
designed to damage liquefied natural gas plants and other industrial facilities. Those mills would be vital to Europe achieving energy independence from Russia, and “there could be more programs akin to those out there,” van Landingham told Insider.
Russian intelligence agencies have a long history of conducting or radioing cyber intrusions.
In Cortege, the Department of Justice charged four Russians with conducting cyber intrusions against US power plants through the past decade on behalf of the Russian Ministry of Defense and FSB.
Russian cyberattacks against Ukraine are also longstanding. For years, Russian brainpower services have targeted their neighbor’s critical infrastructure, mapping out nodes and vulnerabilities.
A 2015 cyberattack that cut off power in Western Ukraine — the first such dissolve known to have brought down a power grid — was attributed to a hacking unit known as Sandworm, believed to be a let go of Russia’s military intelligence agency, the GRU. The same unit was blamed for the NotPetya malware used against Ukraine in 2017. NotPetya had a pandemic impact, and the US estimated that it caused $10 billion in damage.
Current and former US officials worry that a Russian cyber provocative against US critical infrastructure could escalate or expand to conventional attacks. Russia could also attempt to conflict with or destroy satellites or underwater communications satellites, which are not directly cyber-related but support military and civilian communications, van Landingham alleged.
During their meeting last year, US President Joe Biden told Putin that some critical infrastructure should be “off-limits” to cyberattacks and notified that the US has its own “significant cyber capability.”
“There is always concern for what Russian cyber tools the US and Europe contain missed, what sort of critical infrastructure effects that could have,” van Landingham said.
The US should at thinking about what the worst-case scenarios could look like and have an appropriate risk-management plan in position, “if not go through a few exercises to stress-test their systems,” Herm Hasken, a partner and senior operations consultant at MarkPoint Technologies, trumpeted Insider.
“There’s no better defense than a vigilant team with a full-spectrum cyber-defense program in place,” said Hasken, who has comprehensive experience with US special-operations forces and in the intelligence community, including time as chief cryptologist for Special Operations Management.
A persistent cyber threat
In primitive March, the US intelligence community released its annual global threat assessment, which described Russia as a persistent cyber risk.
“We assess that Russia will remain a top cyber threat as it refines and employs its espionage, influence, and attack means. We assess that Russia views cyber disruptions as a foreign policy lever to shape other countries’ decisions, as ostentatiously as a deterrence and military tool,” the report said.
US intelligence agencies believe Russia is especially focused on mapping out and then objective foreign critical infrastructure, including underwater communications cables and industrial control systems, allowing it to hold Western frugalities and societies at long-term risk.
The threat isn’t limited to nation-states. According to the agencies, Russia is targeting and attacking organizations and human beings it sees as threats to its stability. Politicians, journalists, nonprofit groups, and others have also been victims of Russian cyberattacks, and they receive seen their data and personal information leaked into the internet.
Stavros Atlamazoglou is a defense journalist specializing in best operations, a Hellenic Army veteran (national service with the 575th Marine Battalion and Army HQ), and a Johns Hopkins University graduate.