Modern Australian
Times Advertising

Russia is using an onslaught of cyber attacks to undermine Ukraine's defence capabilities

  • Written by Mamoun Alazab, Associate Professor, Charles Darwin University
Russia is using an onslaught of cyber attacks to undermine Ukraine's defence capabilities

As Ukrainian cities come under air attack from Russian forces, the country has also suffered the latest blows in an ongoing campaign of cyber attacks. Several of Ukraine’s bank and government department websites crashed on Wednesday, the BBC reports.

The incident follows a similar attack just over a week ago, in which some 70 Ukrainian government websites crashed. Ukraine and the United States squarely blamed Russia.

With a full-scale invasion now evident, Ukraine can expect to contend soon with more cyber attacks. These have the potential to cripple infrastructure, affecting water, electricity and telecommunication services – further debilitating Ukraine as it attempts to contend with Russian military aggression.

A critical part of Russia’s operations

Cyber attacks fall under the traditional attack categories of sabotage, espionage and subversion.

They can be carried out more rapidly than standard weapon attacks, and largely remove barriers of time and distance. Launching them is relatively cheap and simple, but defending against them is increasingly costly and difficult.

After Russia’s withdrawal from Georgia in 2008, President Vladimir Putin led an effort to modernise the Russian military and incorporate cyber strategies. State-sanctioned cyber attacks have since been at the forefront of Russia’s warfare strategy.

The Russian Main Intelligence Directorate (GRU) typically orchestrates these attacks. They often involve using customised malware (malicious software) to target the hardware and software underpinning a target nation’s systems and infrastructure.

Among the latest attacks on Ukraine was a distributed denial of service (DDoS) attack.

According to Ukraine’s minister of digital transformation, Mykhailo Fedorov, several Ukrainian government and banking websites went offline as a result. DDoS attacks use bots to flood an online service, overwhelming it until it crashes, preventing access for legitimate users.

A destructive “data-wiping” software has also been found circulating on hundreds of computers in Ukraine, according to reports, with suspicion falling on Russia.

On February 15, Ukraine’s cyber police said citizens were receiving fake text messages claiming ATMs had gone offline (although this wasn’t confirmed). Many citizens scrambled to withdraw money, which caused panic and uncertainty.

Ongoing onslaught

In December 2015, the GRU targeted Ukraine’s industrial control systems networks with destructive malware. This caused power outages in the western Ivano-Frankivsk region. About 700,000 homes were left without power for about six hours.

Read more: Cyberattack on Ukraine grid: here's how it worked and perhaps why it was done

This happened again in December 2016. Russia developed a custom malware called CrashOverride to target Ukraine’s power grid. An estimated one-fifth of Kiev’s total power capacity was cut for about an hour.

More recently, US officials charged six Russian GRU officers in 2020 for deploying the NotPetya ransomware. This ransomware affected computer networks worldwide, targeting hospitals and medical facilities in the United States, and costing more than US$1 billion in losses.

NotPetya was also used against Ukrainian government ministries, banks and energy companies, among other victims. The US Department of Justice called it “some of the world’s most destructive malware to date”.

Another Russia-sponsored attack that began as early as January 2021 targeted Microsoft Exchange servers. The attack provided hackers access to email accounts and associated networks all over the world, including in Ukraine, the US and Australia.

Russia’s 2008 invasion of Georgia was accompanied by a well-coordinated cyber attack run by state-sponsored hackers. These were primarily DDoS attacks that forced a number of Georgian government and commercial websites offline. Getty Images

International cyber aid

Ukraine faces serious risks right now. A major cyber attack could disrupt essential services and further undermine national security and sovereignty.

The support of cyber infrastructure has been recognised as an important aspect of international aid. Six European Union countries (Lithuania, Netherlands, Poland, Estonia, Romania and Croatia) are sending cyber security experts to help Ukraine deal with these threats.

Australia has also committed to providing cyber security assistance to the Ukrainian government, through a bilateral Cyber Policy Dialogue. This will allow for exchanges of cyber threat perceptions, policies and strategies. Australia has also said it will provide cyber security training for Ukrainian officials.

The international implications of the Russia-Ukraine situation have been noted. Last week New Zealand’s National Cyber Security Centre released a General Security Advisory encouraging organisations to prepare for cyber attacks as a flow-on effect of the crisis.

The advisory provides a list of resources for protection and strongly recommends that organisations assess their security preparedness against potential threats.

The Australian Cyber Security Centre has since issued similar warnings.

Evading responsibility

Historically, Russia has managed to evade much of the responsibility for cyber attacks. In conventional warfare, attribution is usually straightforward. But in cyberspace it is very complex, and can be time-consuming and costly.

It’s easy for a country to deny its involvement in a cyber attack (both Russia and China routinely do so). The Russian embassy in Canberra has also denied involvement in the latest attacks against Ukraine.

One reason plausible deniability can usually be maintained is because cyber attacks can be launched from an unwitting host. For example, a victim’s compromised device (called a “zombie” device) can be used to continue a chain of attacks.

So while the operation may be run by the perpetrator’s command and control servers, tracing it back to them becomes difficult.

Authors: Mamoun Alazab, Associate Professor, Charles Darwin University

Read more https://theconversation.com/russia-is-using-an-onslaught-of-cyber-attacks-to-undermine-ukraines-defence-capabilities-177638

What Not to Pack When Moving: The Essential Guide to Smart Packing

Moving house is one of those all-encompassing events in life and most people focus their energy on deciding what to pack. But knowing what not to pa...

From Assistance to Independence: Progression in Daily Living Skills

The ultimate goal of many support systems is to empower individuals to lead lives defined by autonomy and self-reliance. While some support requiremen...

The Cost Difference Between Early Repairs and Delayed Replacement

Automotive maintenance often involves a choice between addressing a small issue immediately or waiting until a component fails completely. When it c...

What Is a Stainless Steel Bar? Applications, Benefits, and Buying Tips

Stainless steel is one of the most widely used materials across industrial and commercial sectors, known for its strength, corrosion resistance, and...

Scholars in Developing Nations Depending on Z library

Access to books often shapes the course of study for scholars who live in regions with thin library shelves and slow supply chains. Many students wo...

6 Cheapest POS Systems in Australia (2026)

The cheapest POS systems in Australia for 2026 are POSApt, Square, Zeller, Loyverse, Epos Now, and Shopify POS (Lite). However, “cheap” does no...

The Ultimate Guide to Automating Your Weekend Yard Chores

We all look forward to the weekend as a chance to unwind after a long week of work. You probably picture yourself relaxing on the patio with a cold ...

How Ignoring Regular Car Servicing Can Lead to Costly Repairs

Owning a car gives you a sweet sense of freedom and comfort. You can go wherever you want, whenever you want. But with that freedom comes responsibili...

Someone Trips at Your Fundraiser. Now What? Understanding Public Liability for NFPs

Three months of planning. Volunteers giving up their weekends. Sponsorships chased, catering sorted, tables decorated. And then, about an hour into ...

Stainless Steel Tube: A Complete Specification Guide for Engineers, Project Managers, and Industrial Buyers

Few materials in the industrial and manufacturing world are as universally relied upon — or as frequently misspecified — as stainless steel tube...

How to Choose the Right Barber Shears Scissors for Professional Results

Since a barber is only as good as their tool, choosing the right barber shear scissor must not be taken lightly. Most barbers end up buying the first ...

Why Commercial Construction Companies Play A Critical Role In Modern Urban Development

Urban development requires highly organised planning, engineering expertise, and professional construction teams capable of delivering complex build...

Essential Features for Comfortable Family Caravan Trips

Choosing the right van for family travel requires careful consideration of how the space will be used on a daily basis. Families have specific needs...

Chatswood Tutor: Helping Students Achieve Academic Success With Personalised Learning

Education plays a crucial role in shaping a student’s future, and many students benefit from additional academic support outside the classroom. A pr...

How External Consulting Can Guide Enterprise IT Strategy and Procurement

Internal IT teams carry deep operational knowledge, but that familiarity can create blind spots in strategic decisions. An external IT consultant br...

Why Sports Nutrition Australia Is Important for Performance and Recovery

Athletes and fitness enthusiasts place significant demands on their bodies during training and competition. Maintaining energy levels, supporting mu...

How Body Contouring Bundoora Helps Improve Shape And Confidence

Modern aesthetic treatments have made it possible to refine body shape without the need for invasive surgery. One of the most popular non-surgical o...

Why Plantation Shutters Are a Stylish and Practical Choice for Modern Homes

Window coverings play a major role in the comfort, privacy, and overall design of a home. Homeowners often look for solutions that provide both visu...