The dire predictions about a Russian cyber onslaught haven’t come true in 
Ukraine.

At least not yet.

By Joseph Menn and Craig Timberg  Today at 5:40 p.m. EST 
https://www.washingtonpost.com/technology/2022/02/28/internet-war-cyber-russia-ukraine/


For more than a decade, military commanders and outside experts have laid out 
blueprints for how cyberwar would unfold: military and civilian networks would 
be knocked offline, cutting-edge software would sabotage power plants, and 
whole populations would be unable to get money, gas or refrigerated food.

But while Russia’s invasion of Ukraine has spawned all manner of cyberattacks 
and defences, few are playing out the way the experts thought they would.

As of Monday, five days after tanks moved into Ukraine, the Internet and other 
key Ukrainian infrastructure were still functioning, the outgunned Ukrainian 
military was still coordinating effectively and Russia’s vaunted disinformation 
capabilities were failing to persuade Ukrainians that resistance is futile.

“We imagined this orchestrated unleashing of violence in cyberspace, this 
ballet of attacks striking Ukraine in waves, and instead of that we have a 
brawl. And not even a very consequential brawl, just yet,” said Jason Healey, a 
former White House staffer for infrastructure protection and intelligence 
officer who’s now a research scholar on cyber conflict at Columbia University.

A vastly larger, more powerful military — one especially feared for its 
cyber-military prowess — has allowed Ukrainians almost unfettered access to the 
Internet.  This has helped them get weapons to citizens and harness social 
media to rally global political support through direct, emotional appeals 
backed by stirring visuals.

“It’s certainly not what anyone predicted,” said Dmitri Alperovitch, a longtime 
cybersecurity executive and U.S. government adviser who heads Silverado Policy 
Accelerator.

Ukraine’s core cyberdefense has done better than expected because it focused on 
the issue after Russian hackers briefly knocked out power to swaths of the 
country in 2015 and 2016, said David Cowan, a veteran cybersecurity venture 
capitalist and corporate director, and because it has had help from American 
and European experts.

“I would have thought that by now Russia would have disabled a lot more 
infrastructure around communications, power and water,” Cowan said. “If Russia 
were attacking the U.S., there would be more cyber damage.”

The absence of major disruptions predicted by cyberwar doctrine has allowed 
Ukraine’s President Volodymyr Zelensky to deliver propaganda coups with little 
more than a smartphone and a data link.

Images of civilian casualties, the brutal shelling of cities and also some 
Russian losses have undermined that nation’s claims of a limited and humane 
“special military operation.”

A viral audio clip of Ukrainian soldiers on a tiny island telling a Russian 
warship to “go f--- yourself” has become a defining moment of national 
resistance.

“It’s become a global participatory thing. Everybody thinks they’re part of 
it,” said Doug Madory, director of Internet analysis for Kentik, which tracks 
global data flows. “It would be a lot harder to do all that if there was a 
blackout.”

Ukraine has not escaped unscathed, and some experts warn that cyberattacks or 
Internet outages could grow as Russia’s invasion intensifies in the face of 
unexpectedly stout resistance.

Russia or its allies already have deployed software to wipe data off some 
Ukrainian computers, including border control offices. But such intrusions are 
not nearly as widespread as in past attacks such as NotPetya, in which fake 
ransomware attributed to the Russian government caused billions of dollars in 
damages, much of it in Ukraine.

“I do not think the destructive malware had an impact of any significance,” 
said Vikram Thakur, head of threat intelligence at Broadcom’s Symantec division.

Russia also may be holding back to some extent, for strategic reasons or 
because the timeline for the invasion was so closely held that cyber teams did 
not know what to target or when.

An invading army might be expected to quickly cut backbone cables or switch 
them off through hacks, said Madory, a former Air Force communications 
engineering officer.

But neither has happened. And Madory isn’t sure why.

“Is it following the playbook? I don’t know if we have the right playbook,” 
Madory said. “So far the Internet is still up.”

“You need to develop access and know how those targets are going to fit into 
the overall plan of the campaign,” said Trey Herr, director of the Cyber 
Statecraft Initiative at the Atlantic Council.

He and other experts point to several possible explanations, starting with the 
possibility that the Russians thought Ukraine would fall so quickly that it 
wasn’t necessary to damage systems they would want operational once an 
occupation began.

Disabled telecommunication systems — or ones that are bombed — can require 
costly, time-consuming repairs.

It’s also possible that the Russians themselves needed a functioning 
telecommunications system, including high-speed data links, for their own 
communications.

Images from Ukraine have shown Russian soldiers appearing to use smartphones. 
Modern militaries typically have sophisticated radios for battlefield 
communications, but glitches might have forced reliance on Internet-based 
systems instead.

Finally, there are downsides to using even the most sophisticated cyberweapons. 
A system shut down by a hacker can’t be used for ongoing intelligence 
gathering, typically a high priority in wartime. Even destroyed computers can 
be replaced ― sometimes within just a few hours.

“If I wipe a bunch of their computers today, I can’t do that tomorrow,” said 
Jake Williams, a former National Security Agency hacker, now on the faculty of 
the information security research group IANS. “A big question is: When do you 
pull the trigger?”

The best time, he said, is typically at the beginning of a conflict, when 
depriving victims of the ability to detect attacks and communicate with the 
outside world can be demoralizing. By the time tanks are rolling in the streets 
and cities are being bombed, the most effective moment for cyberattacks often 
has passed.

Many experts said they expected more serious cyberattacks to come in the next 
few weeks, in Ukraine and elsewhere.

“Putin has not initiated significant retaliation yet for any U.S., E.U., NATO 
sanctions, probably because he is too busy dealing with the surprising level of 
Ukrainian resistance and failures by the Red Army,” said Richard Clarke, the 
first White House cyber coordinator and author of one of the first books on 
cyberwarfare.

“We still believe retaliation, including cyberattacks, is coming.”

Columbia’s Healey said that the more Russia is isolated from Western markets 
and financial networks, the less it has to lose by attacking them.

But for now, Ukraine has rallied to its side a stunningly broad, hodgepodge 
alliance to fight back on the Internet.

Tech savvy cabinet member Mykhailo Fedorov successfully appealed to Tesla 
founder Elon Musk to distribute Starlink satellite Internet terminals that 
would withstand cellular network disruptions, and he asked PayPal and credit 
card companies to stop processing payments in Russia.

More surprisingly, Fedorov welcomed the contributions from activist hackers, 
forming a volunteer “IT Army” and urging it to hack Russian government and 
commercial sites.

Existing cyber activist networks have taken up the cause with glee.

One of the most popular Twitter accounts promoting the loose Anonymous 
movement, YourAnonNews, has been suggesting unorthodox tactics to its more than 
7 million followers, such as leaving business reviews on Google maps that pass 
along to ordinary Russians banned information about events in Ukraine.

Though some covert government operatives could be using the cover of Anonymous 
to contribute to attacks, one of the account’s administrators said it was not 
working directly with any officials. “We see many Anonymous activists 
participating, and the support is overwhelming,” the person said.

On Monday, some Russian news sites were hacked and briefly defaced with calls 
for Russia to pull back.

Even the most widely expected alliance, between the Russian government and 
organized criminal ransomware groups that have long been tolerated or 
encouraged there, are not following the script.

The ransomware gang Conti was first out of the gate with a public comment, 
declaring that it was loyal to Russia and that it would respond to any attacks 
on it with renewed penetration of U.S. critical infrastructure.

But like many Russian-speaking crime groups, Conti has members in Ukraine, some 
of whom objected fiercely, said Dmitry Smilyanets, a former Russian hacker who 
analyzes the gangs for security company Recorded Future.

The pushback prompted a revised statement that Conti was beholden to no 
government.

But one angry participant in the group’s closed chats still leaked more than a 
year’s worth of private discussions that named victims and included drafts of 
payment demands.

“That leak will destroy Conti,” Smilyanets said.

--
_______________________________________________
Link mailing list
[email protected]
https://mailman.anu.edu.au/mailman/listinfo/link

Reply via email to