{"id":10303,"date":"2022-02-18T13:03:03","date_gmt":"2022-02-18T13:03:03","guid":{"rendered":"http:\/\/TheNextWeb=1380806"},"modified":"2022-02-18T13:03:03","modified_gmt":"2022-02-18T13:03:03","slug":"the-conflict-in-ukraine-proves-cyber-attacks-are-now-weapons-of-war","status":"publish","type":"post","link":"https:\/\/www.londonchiropracter.com\/?p=10303","title":{"rendered":"The conflict in Ukraine proves cyber-attacks are now weapons of war"},"content":{"rendered":"\n<p>For the past few weeks, Russia has been deploying military forces into strategic positions on Ukraine\u2019s borders. However, there is another, virtual dimension to the escalating conflict: cyber-attacks on the Ukrainian government and business websites and services.<\/p>\n<p>Attacks on Ukraine\u2019s information systems are part of a type of <a href=\"https:\/\/theconversation.com\/cyber-attacks-what-is-hybrid-warfare-and-why-is-it-such-a-threat-164091\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">hybrid warfare<\/a> that Russia has been fine tuning for the past <a href=\"https:\/\/researchprofiles.canberra.edu.au\/en\/publications\/russias-hybrid-warfare-in-the-east-the-integral-nature-of-the-inf\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">couple of decades<\/a> but is now far more sophisticated.<\/p>\n<p>Cyber espionage and information warfare have become an intrinsic part of recent conflicts and happen on a regular basis between <a href=\"https:\/\/www.csis.org\/programs\/strategic-technologies-program\/significant-cyber-incidents\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">conflicting powers<\/a>. However, governments do not usually publicly claim responsibility for this type of activity, since this could put them in a position of declaring war against the targeted country and provoking counterattacks and sanctions from the <a href=\"https:\/\/www.cambridge.org\/core\/books\/tallinn-manual-on-the-international-law-applicable-to-cyber-warfare\/50C5BFF166A7FED75B4EA643AC677DAE\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">international community<\/a>. Therefore, evidence that Russia is definitely behind these attacks is hard to establish.<\/p>\n<p>Cyber-attacks are often attributed to hacker groups with nationalist motivations, who justify their political agendas without explicitly verifying any <a href=\"https:\/\/apps.dtic.mil\/sti\/pdfs\/AD1032208.pdf\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">state backing<\/a>.<\/p>\n<p>In January, there was a spate of attacks by Belarusian hackers believed to be <a href=\"https:\/\/www.computerweekly.com\/news\/252512087\/Russian-backed-hackers-defaced-Ukrainian-websites-as-cover-for-dangerous-malware-attack\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">supporting Russia<\/a>. They launched a series of malware attacks against Ukrainian computer systems with many government and other websites being defaced with provocative and intimidating messages.<\/p>\n<p>In mid-February, there was another round of <a href=\"https:\/\/apnews.com\/article\/russia-ukraine-technology-business-europe-russia-e791990f60841b599f664c34f58403de\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">cyber-attacks,<\/a> this time targeting the Ukrainian army website, ministerial websites, and some of the major banks, including PrivatBank, preventing online payments and use of banking apps.<\/p>\n<p>These latest attacks were mainly distributed denial of service (DDOS) attacks, where a huge number of small packets of information are sent to websites and servers from multiple sources. This information overload causes the servers and computer systems targeted to slow down or collapse because of the swarm of <a href=\"https:\/\/link.springer.com\/book\/10.1007\/978-3-319-71758-6\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">information requests<\/a>.<\/p>\n<p>Russian involvement in those cyber-attacks is suspected. The attacks follow the pattern of similar tactics with alleged <a href=\"https:\/\/researchprofiles.canberra.edu.au\/en\/publications\/russias-hybrid-warfare-in-the-east-the-integral-nature-of-the-inf\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Russian backing<\/a> over the past two decades in Ukraine, Estonia, and Georgia, <a href=\"https:\/\/apps.dtic.mil\/sti\/pdfs\/AD1032208.pdf\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">including attacks<\/a> on communications infrastructures and power grids.<\/p>\n<p>The US president and EU officials are now discussing increasing cyberspace defenses against such attacks or imposing <a href=\"https:\/\/www.france24.com\/en\/americas\/20220216-us-allies-ready-to-retaliate-for-russian-cyberattacks-on-ukraine-say-officials\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">sanctions if required<\/a>.<\/p>\n<p>Despite all of this, Ukrainian officials have refrained from explicitly mentioning the Russian state as being <a href=\"https:\/\/www.theguardian.com\/world\/2022\/jan\/14\/ukraine-massive-cyber-attack-government-websites-suspected-russian-hackers\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">behind these attacks<\/a>.<\/p>\n<h2>The pandemic and cyber-attacks<\/h2>\n<p>The above hybrid threats are also exacerbated by Ukraine\u2019s (and other countries\u2019) increasing reliance on information systems and the internet for important functions, such as banking, commercial activity, and even healthcare.<\/p>\n<p>Clearly, this transition accelerated during the pandemic and also because of <a href=\"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/14616696.2020.1804973\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">lockdowns<\/a> forcing citizens to use the internet for work and leisure more <a href=\"https:\/\/www.bbc.co.uk\/news\/technology-55486157\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">extensively than before<\/a>.<\/p>\n<p>During the pandemic, cyber-attacks have also <a href=\"https:\/\/www.interpol.int\/en\/content\/download\/15526\/file\/COVID-19%20Cybercrime%20Analysis%20Report-%20August%202020.pdf\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">increased internationally<\/a>.<\/p>\n<h2>Not just in Ukraine<\/h2>\n<p>Other countries in the region are also worried about the tactics spilling over their borders. Latvia has expressed concerns about cybersecurity risks if <a href=\"https:\/\/eng.lsm.lv\/article\/society\/defense\/latvia-will-face-security-risks-if-russia-attacks-ukraine-defense-ministry.a443435\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">tensions continue<\/a>.<\/p>\n<p>The current conflict could also have much wider cybersecurity implications with concerns raised about potential attacks <a href=\"https:\/\/www.youtube.com\/watch?v=Bc5mxd4O1SI\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">on US targets<\/a> should military escalation bring interventions from Ukraine\u2019s western allies against Russia.<\/p>\n<p>After all, it is only a few years since the \u201cNotPetya\u201d cyber-attack against Ukrainian infrastructural systems extended beyond the Ukrainian borders and caused extensive disruption to the information systems of international organizations with significant <a href=\"https:\/\/www.ft.com\/content\/8e1e8176-2279-4596-9c0f-98629b4db5a6\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">financial impact<\/a>. And recently, Microsoft <a href=\"https:\/\/blogs.microsoft.com\/on-the-issues\/2022\/01\/15\/mstic-malware-cyberattacks-ukraine-government\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">sounded the alarm<\/a> after its security team discovered destructive covert malware on Ukrainian government systems.<\/p>\n<p>The level of cyber-attacks in Ukraine suggests they are an inevitable part of future political and national conflicts and potentially could have a far-reaching influence on people\u2019s lives.<\/p>\n<p>For example, the impact on the already <a href=\"https:\/\/www.bma.org.uk\/advice-and-support\/nhs-delivery-and-workforce\/pressures\/nhs-backlog-data-analysis\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">overstretched NHS<\/a>, and consequently to all of us, would be insurmountable if on top of dealing with the pandemic, its systems were hit by some major computer virus, initially developed to destabilize Ukrainian information systems. The chaos generated by the WannaCry ransomware <a href=\"https:\/\/www.google.com\/url?q=https:\/\/www.england.nhs.uk\/wp-content\/uploads\/2018\/02\/lessons-learned-review-wannacry-ransomware-cyber-attack-cio-review.pdf&amp;sa=D&amp;source=docs&amp;ust=1645028530553931&amp;usg=AOvVaw0SsMrc3mHZMpdyewGzGHoT\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">a few years ago<\/a> would be unsustainable in the current climate.<\/p>\n<p>The pandemic has accelerated our transition into a more global, hybrid living environment, and with this shift, cyberwarfare causes even more widespread problems than a few years ago. To paraphrase a quote attributed to sci-fi author <a href=\"https:\/\/en.wikipedia.org\/wiki\/William_Gibson\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">William Gibson<\/a>: \u201cThe future is already here and it is becoming even more evenly distributed.\u201d For better or worse.<!-- Below is The Conversation's page counter tag. Please DO NOT REMOVE. --><img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/counter.theconversation.com\/content\/177266\/count.gif?distributor=republish-lightbox-basic\" alt=\"The Conversation\" width=\"1\" height=\"1\" class=\"js-lazy\"><!-- End of code. If you don't see any code above, please get new code from the Advanced tab after you click the republish button. The page counter does not collect any personal data. More info: https:\/\/theconversation.com\/republishing-guidelines --><\/p>\n<p><noscript><img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/counter.theconversation.com\/content\/177266\/count.gif?distributor=republish-lightbox-basic\" alt=\"The Conversation\" width=\"1\" height=\"1\" class><\/noscript><\/p>\n<p><em>Article by <a href=\"https:\/\/theconversation.com\/profiles\/vasileios-karagiannopoulos-704070\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Vasileios Karagiannopoulos<\/a>, Reader in Cybercrime and Cybersecurity, <a href=\"https:\/\/theconversation.com\/institutions\/university-of-portsmouth-1302\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">University of Portsmouth<\/a><\/em><\/p>\n<p><em>This article is republished from <a href=\"https:\/\/theconversation.com\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">The Conversation<\/a> under a Creative Commons license. Read the <a href=\"https:\/\/theconversation.com\/ukraine-how-cyber-attacks-became-so-important-to-the-conflict-177266\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">original article<\/a>.<\/em><\/p>\n<p> <a href=\"https:\/\/thenextweb.com\/news\/conflict-ukraine-proves-cyber-attacks-are-weapons-of-war\">Source<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>For the past few weeks, Russia has been deploying military forces into strategic positions on Ukraine\u2019s borders. However, there is another, virtual dimension to the escalating conflict: cyber-attacks on the Ukrainian government&#8230;<\/p>\n","protected":false},"author":1,"featured_media":10304,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/www.londonchiropracter.com\/index.php?rest_route=\/wp\/v2\/posts\/10303"}],"collection":[{"href":"https:\/\/www.londonchiropracter.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.londonchiropracter.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.londonchiropracter.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.londonchiropracter.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=10303"}],"version-history":[{"count":0,"href":"https:\/\/www.londonchiropracter.com\/index.php?rest_route=\/wp\/v2\/posts\/10303\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.londonchiropracter.com\/index.php?rest_route=\/wp\/v2\/media\/10304"}],"wp:attachment":[{"href":"https:\/\/www.londonchiropracter.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=10303"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.londonchiropracter.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=10303"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.londonchiropracter.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=10303"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}