Modern Australian
Times Advertising

As Russia wages cyber war against Ukraine, here's how Australia (and the rest of the world) could suffer collateral damage

  • Written by Paul Haskell-Dowland, Professor of Cyber Security Practice, Edith Cowan University
As Russia wages cyber war against Ukraine, here's how Australia (and the rest of the world) could suffer collateral damage

The Australian Cyber Security Centre is asking organisations and businesses to be on high alert amid Russia’s cyber attack bombardment of Ukraine.

The United Kingdom’s National Cyber Security Centre issued a similar warning, as have New Zealand and the United States Department of Homeland Security.

The Australian Cyber Security Centre has said it is not aware of any specific direct threat to Australia, but that the country could be affected by “unintended disruption or uncontained malicious cyber activities”.

It wouldn’t be the first time a Russian cyber attack has caused serious collateral damage to nations that aren’t its intended target.

Attacks so far

Ukraine has suffered through a sustained digital assault from Russia over the past few weeks. One of the most penetrative attacks came on Wednesday, cutting off access to several Ukrainian government and banking websites – followed by more on Thursday.

These were distributed denial of service attacks, in which the perpetrator knocks targeted websites offline by flooding them with bot traffic.

Meanwhile, experts at the internet security company ESET identified a malicious data-wiping malware called “HermeticWiper” circulating on hundreds of computers in Ukraine, Latvia and Lithuania – which they said may have been months in the making.

According to reports, experts from software company Symantec found the malware had affected Ukrainian government contractors in Latvia and Lithuania and a Ukrainian bank.

Read more: Russia is using an onslaught of cyber attacks to undermine Ukraine's defence capabilities

How the impact will be felt

Australia’s risk in the face of ongoing cyber attacks from Russia would almost certainly come in the form of a “spill over” effect.

For example, if a Ukrainian bank is targeted and goes offline, this would still impact Australians who use that bank to receive or send money to Ukraine. Attacks on banks are particularly alarming when you consider Ukraine’s dire need for financial aid and economic support right now.

All global business conducted with, or through, the bank will be affected – and the impact could reach virtually anywhere in the world. Similarly, distributed denial of service attacks on Ukrainian news media would also have global ramifications, by limiting the exchange of crucial information.

Another concern is the potential for Russia to cut off gas supplies flowing through Ukraine to Europe, either directly or through a cyber-enabled attack (the Colonial Pipeline attack being a recent example). This also introduces significant market instability, resulting in shortages and driving up prices (including for Australia).

Australian companies are a part of global supply chains. Many will have interests in Russia and/or Ukraine. Thus they will also have digital, and potentially even direct network connections with them, through a virtual private network – which allows users to establish a private network over a public internet connection (and which can be used to spread malware between connected devices).

Once a “wiper” malware – the likes of that currently circulating in Ukraine – gets enough footing, it can spread across countries within minutes. If an office in Canberra with a virtual private network connection based in Ukraine becomes compromised, it can allow the malware to jump countries.

The NotPetya malware attack in 2017 is a pertinent example. This “self-propogating” malware spread globally and caused billions of dollars’ worth of damage. It, too, was attributed to a Russian source by investigators, and traced back to the update mechanism for a tax-accounting software application used widely in Ukraine.

Read more: Three ways the 'NotPetya' cyberattack is more complex than WannaCry

Leveraging the chaos

Apart from malicious Russian state-sponsored cyber crime, the current mayhem unfolding in Ukraine provides opportunity for cyber criminals more generally, too.

It’s very difficult to attribute cyber crime. While experts can analyse code taken from malware, this is usually a slow and costly process. Cyber criminals the world over may want to take advantage of the chaos, and try to carry out attacks they may not otherwise get away with.

Among all the noise, and with so many Ukrainians (including cyber security professionals) either displaced or fleeing, the chances of being caught may be lower. Also, it is likely any major cyber affliction will be blamed on Russia – at least initially.

At the same time, we might see an increase in phishing and scam attempts as a result of the crisis. Opportunistic criminals use global narratives to add credibility to their scams. For instance, they may send phishing emails posing as a Ukrainian citizen desperate for emergency funds.

How can businesses protect themselves?

A critical step in a defensive posture for companies and organisations in Australia is to determine their exposure level. This means being acutely aware of any direct or indirect connection with Ukraine and Russia, and the online systems and supply chains these countries partake in.

Employers also have a duty of care to employees who may have loved ones or other connections in Ukraine, and may be more vulnerable to various forms of cyber attacks exploiting the current situation.

And of course, the most basic cyber security advice is once more relevant. That is, individuals, businesses and organisations must take special care to ensure all devices are up-to-date and have software patches installed.

The 2017 NotPetya attacks were, in part, successful because the malware exploited a vulnerability in Microsoft Windows – even though a patch to fix it was available at the time. But the massive number of devices that hadn’t been patched meant NotPetya could spread without constraint.

In the case of Ukraine, where pirated software is common, this issue is particularly prevalent. Complications with (or a lack of) proper software licensing means updates may not be accessed or installed.

Authors: Paul Haskell-Dowland, Professor of Cyber Security Practice, Edith Cowan University

Read more https://theconversation.com/as-russia-wages-cyber-war-against-ukraine-heres-how-australia-and-the-rest-of-the-world-could-suffer-collateral-damage-177909

3PL Logistics Australia Driving Smarter Supply Chains And Faster Deliveries

In a world where customers expect speed almost as much as quality, logistics has become the silent heartbeat of every successful business. Behind th...

Why Professional Electrical Services Are Essential For Modern Properties

Electricity powers almost every aspect of daily life, from lighting and appliances to complex systems in homes and businesses. This makes choosing a...

What Not to Pack When Moving: The Essential Guide to Smart Packing

Moving house is one of those all-encompassing events in life and most people focus their energy on deciding what to pack. But knowing what not to pa...

From Assistance to Independence: Progression in Daily Living Skills

The ultimate goal of many support systems is to empower individuals to lead lives defined by autonomy and self-reliance. While some support requiremen...

The Cost Difference Between Early Repairs and Delayed Replacement

Automotive maintenance often involves a choice between addressing a small issue immediately or waiting until a component fails completely. When it c...

What Is a Stainless Steel Bar? Applications, Benefits, and Buying Tips

Stainless steel is one of the most widely used materials across industrial and commercial sectors, known for its strength, corrosion resistance, and...

Scholars in Developing Nations Depending on Z library

Access to books often shapes the course of study for scholars who live in regions with thin library shelves and slow supply chains. Many students wo...

6 Cheapest POS Systems in Australia (2026)

The cheapest POS systems in Australia for 2026 are POSApt, Square, Zeller, Loyverse, Epos Now, and Shopify POS (Lite). However, “cheap” does no...

The Ultimate Guide to Automating Your Weekend Yard Chores

We all look forward to the weekend as a chance to unwind after a long week of work. You probably picture yourself relaxing on the patio with a cold ...

How Ignoring Regular Car Servicing Can Lead to Costly Repairs

Owning a car gives you a sweet sense of freedom and comfort. You can go wherever you want, whenever you want. But with that freedom comes responsibili...

Someone Trips at Your Fundraiser. Now What? Understanding Public Liability for NFPs

Three months of planning. Volunteers giving up their weekends. Sponsorships chased, catering sorted, tables decorated. And then, about an hour into ...

Stainless Steel Tube: A Complete Specification Guide for Engineers, Project Managers, and Industrial Buyers

Few materials in the industrial and manufacturing world are as universally relied upon — or as frequently misspecified — as stainless steel tube...

How to Choose the Right Barber Shears Scissors for Professional Results

Since a barber is only as good as their tool, choosing the right barber shear scissor must not be taken lightly. Most barbers end up buying the first ...

Why Commercial Construction Companies Play A Critical Role In Modern Urban Development

Urban development requires highly organised planning, engineering expertise, and professional construction teams capable of delivering complex build...

Essential Features for Comfortable Family Caravan Trips

Choosing the right van for family travel requires careful consideration of how the space will be used on a daily basis. Families have specific needs...

Chatswood Tutor: Helping Students Achieve Academic Success With Personalised Learning

Education plays a crucial role in shaping a student’s future, and many students benefit from additional academic support outside the classroom. A pr...

How External Consulting Can Guide Enterprise IT Strategy and Procurement

Internal IT teams carry deep operational knowledge, but that familiarity can create blind spots in strategic decisions. An external IT consultant br...

Why Sports Nutrition Australia Is Important for Performance and Recovery

Athletes and fitness enthusiasts place significant demands on their bodies during training and competition. Maintaining energy levels, supporting mu...