If there’s one thing we learned in this months-long run of the Ukraine-Russia war, it is that Russian troops are not only demoralized but have fallen short of expectations. Moreover, many of the factors of their loss could be attributed to poor military leadership compared to Ukraine’s highly streamlined directives from their generals.
Nonetheless, Russia continues to attack Ukrainians in more ways than the battle on the borders. One way they’re doing that is by cyber warfare.
Russia has been using highly sophisticated cyber-attacks to achieve its strategic objectives in Ukraine. According to reports, the Russia-affiliated hacker group “Sandworm” has conducted multiple successful hacking campaigns targeting Ukrainian government institutions, military networks, and critical infrastructure such as the electricity grid. For example, in April 2016, Sandworm deployed a powerful malware dubbed “Industroyer2” to attack Ukraine’s power grid resulting in an extended blackout across a large country area.
“Sandworm, which Microsoft calls Iridium, is an arm of the Russian military intelligence unit known as the GRU, according to the U.S. government. It shut off power in parts of Ukraine in 2015. In 2017, it unleashed the NotPetya malware in a global attack that did an estimated $10 billion worth of damage. And this fall, Sandworm’s ransomware known as “Prestige” targeted transportation and related logistics industries.”
“The Prestige campaign may highlight a measured shift in IRIDIUM’s destructive attack calculus, signaling increased risk to organizations directly supplying or transporting humanitarian or military assistance to Ukraine,” according to a Microsoft Threat Intelligence Center (MSTIC) blog post. “More broadly, it may represent an increased risk to organizations in Eastern Europe that may be considered by the Russian state to be providing support relating to the war.”
Russian cyber-attacks have also been used to sabotage essential military communications systems in Ukraine. A malicious software called “Viasat” was used to compromise and delete data from hundreds of Ukrainian machines. This malicious program was believed to be part of an effort by Russian forces to disrupt communications within the Ukrainian Armed Forces before their invasion of Crimea. Additionally, according to research published by the International Institute for Strategic Studies (IISS), Russia has employed various types of malware and exploits against Ukrainian military systems throughout the conflict.
Moreover, cyber espionage has become an integral part of Russia’s strategy towards its neighbor. Instead of relying solely on physical operations or intelligence gathering to gain information about their opponents, Russia uses advanced cyber tools for infiltration and surveillance. According to research conducted by security firm FireEye Inc., Russian hackers have targeted more than 200 organizations in the US, Ukraine and other countries. with spear phishing emails containing malicious links or attachments designed to steal sensitive information from victims’ networks.
Russian forces have also employed cyber attacks to disrupt everyday life and create chaos among noncombatants living near the battlefields in eastern Ukraine. For example, Sandworm was linked with a series of distributed denial-of-service (DDoS) attacks against sites belonging to banks or media outlets that supported the Ukrainian government’s stance on the conflict in 2014 and 2015. Additionally, pro-Russian hackers were found responsible for numerous other cyber incidents, such as website defacement operations that aimed at intimidating users who were interacting with content related to Ukraine’s ongoing war with Russian separatists.
If there’s one thing we learned in this months-long run of the Ukraine-Russia war, it is that Russian troops are not only demoralized but have fallen short of expectations. Moreover, many of the factors of their loss could be attributed to poor military leadership compared to Ukraine’s highly streamlined directives from their generals.
Nonetheless, Russia continues to attack Ukrainians in more ways than the battle on the borders. One way they’re doing that is by cyber warfare.
Russia has been using highly sophisticated cyber-attacks to achieve its strategic objectives in Ukraine. According to reports, the Russia-affiliated hacker group “Sandworm” has conducted multiple successful hacking campaigns targeting Ukrainian government institutions, military networks, and critical infrastructure such as the electricity grid. For example, in April 2016, Sandworm deployed a powerful malware dubbed “Industroyer2” to attack Ukraine’s power grid resulting in an extended blackout across a large country area.
“Sandworm, which Microsoft calls Iridium, is an arm of the Russian military intelligence unit known as the GRU, according to the U.S. government. It shut off power in parts of Ukraine in 2015. In 2017, it unleashed the NotPetya malware in a global attack that did an estimated $10 billion worth of damage. And this fall, Sandworm’s ransomware known as “Prestige” targeted transportation and related logistics industries.”
“The Prestige campaign may highlight a measured shift in IRIDIUM’s destructive attack calculus, signaling increased risk to organizations directly supplying or transporting humanitarian or military assistance to Ukraine,” according to a Microsoft Threat Intelligence Center (MSTIC) blog post. “More broadly, it may represent an increased risk to organizations in Eastern Europe that may be considered by the Russian state to be providing support relating to the war.”
Russian cyber-attacks have also been used to sabotage essential military communications systems in Ukraine. A malicious software called “Viasat” was used to compromise and delete data from hundreds of Ukrainian machines. This malicious program was believed to be part of an effort by Russian forces to disrupt communications within the Ukrainian Armed Forces before their invasion of Crimea. Additionally, according to research published by the International Institute for Strategic Studies (IISS), Russia has employed various types of malware and exploits against Ukrainian military systems throughout the conflict.
Moreover, cyber espionage has become an integral part of Russia’s strategy towards its neighbor. Instead of relying solely on physical operations or intelligence gathering to gain information about their opponents, Russia uses advanced cyber tools for infiltration and surveillance. According to research conducted by security firm FireEye Inc., Russian hackers have targeted more than 200 organizations in the US, Ukraine and other countries. with spear phishing emails containing malicious links or attachments designed to steal sensitive information from victims’ networks.
Russian forces have also employed cyber attacks to disrupt everyday life and create chaos among noncombatants living near the battlefields in eastern Ukraine. For example, Sandworm was linked with a series of distributed denial-of-service (DDoS) attacks against sites belonging to banks or media outlets that supported the Ukrainian government’s stance on the conflict in 2014 and 2015. Additionally, pro-Russian hackers were found responsible for numerous other cyber incidents, such as website defacement operations that aimed at intimidating users who were interacting with content related to Ukraine’s ongoing war with Russian separatists.
Using these various forms of cyber warfare has enabled Russia to gain crucial advantages over its opponents during armed conflicts without resorting to classic military tactics that would otherwise risk further international condemnation and economic sanctions imposed by western countries. It should be noted that as technology advances at an unprecedented rate, so too do states like Russia continue building capability and capacity when it comes to engaging in modern warfare through cyberspace.
As someone who’s seen what happens when the truth is distorted, I know how unfair it feels when those who’ve sacrificed the most lose their voice. At SOFREP, our veteran journalists, who once fought for freedom, now fight to bring you unfiltered, real-world intel. But without your support, we risk losing this vital source of truth. By subscribing, you’re not just leveling the playing field—you’re standing with those who’ve already given so much, ensuring they continue to serve by delivering stories that matter. Every subscription means we can hire more veterans and keep their hard-earned knowledge in the fight. Don’t let their voices be silenced. Please consider subscribing now.
One team, one fight,
Brandon Webb former Navy SEAL, Bestselling Author and Editor-in-Chief
Barrett is the world leader in long-range, large-caliber, precision rifle design and manufacturing. Barrett products are used by civilians, sport shooters, law enforcement agencies, the United States military, and more than 75 State Department-approved countries around the world.
PO Box 1077 MURFREESBORO, Tennessee 37133 United States
Scrubba Wash Bag
Our ultra-portable washing machine makes your journey easier. This convenient, pocket-sized travel companion allows you to travel lighter while helping you save money, time and water.
Our roots in shooting sports started off back in 1996 with our founder and CEO, Josh Ungier. His love of airguns took hold of our company from day one and we became the first e-commerce retailer dedicated to airguns, optics, ammo, and accessories. Over the next 25 years, customers turned to us for our unmatched product selection, great advice, education, and continued support of the sport and airgun industry.
COMMENTS
There are on this article.
You must become a subscriber or login to view or post comments on this article.