Today, Russo-Ukrainian cyberwarfare is a topic that has acquired great relevance in different areas. Both in personal life and in the work environment, Russo-Ukrainian cyberwarfare has generated a significant impact on the way people interact and function in their daily lives. Since its emergence, Russo-Ukrainian cyberwarfare has been the subject of study, debate and analysis, which has given rise to a multiplicity of perspectives and approaches on its importance and repercussions. In this article, we will explore various facets of Russo-Ukrainian cyberwarfare, from its origin to its evolution today, in order to better understand its influence on our society.
Informatic component of the confrontation between Russia and Ukraine
Russian–Ukrainian cyberwarfare is a component of the confrontation between Russia and Ukraine since the Revolution of Dignity in 2013-2014. Russian cyberweapon Uroburos had been around since 2005.[1] However, the first attacks on information systems of private enterprises and state institutions of Ukraine were recorded during mass protests in 2013. In 2013, Operation Armageddon, a Russian campaign of systematic cyber espionage on the information systems of government agencies, law enforcement, and defense agencies, began, thought to help Russia on the battlefield.[2]
Between 2013 and 2014, some information systems of Ukrainian government agencies were affected by a computer virus known as Snake / Uroborus / Turla.[2] In February–March 2014, as Russian troops entered Crimea communication centers were raided and Ukraine's fibre optic cables were tampered with, cutting connection between the peninsula and mainland Ukraine. Additionally Ukrainian Government websites, news and social media were shut down or targeted in DDoS attacks, while cell phones of many Ukrainian parliamentarians were hacked or jammed.[2][3] Ukrainian experts also stated the beginning of a cyberwar with Russia.[4]
Cybersecurity companies began to register an increase in the number of cyberattacks on information systems in Ukraine. The victims of Russian cyberattacks were government agencies of Ukraine, the EU, the United States, defense agencies, international and regional defense and political organizations, think tanks, the media, and dissidents.[2] As of 2015, researchers had identified two groups of Russian hackers who have been active in the Russian-Ukrainian cyber war: the so-called APT29 (also known as Cozy Bear, Cozy Duke) and APT28 (also known as Sofacy Group, Tsar Team, Pawn Storm, Fancy Bear).[2]
Attacks on the automated system "Elections", June 2014[9]
First Ukraine power grid hack, December 2015. Attacks using the Trojan virus BlackEnergy on energy companies in Ukraine which provide energy to Kyiv, Ivano-Frankivsk and Chernivtsi regions[10][11] This was the first successful cyber attack on a power grid.[10]
Paralysis of the State Treasury of Ukraine, December 2016[14][15]
2017 cyberattacks on Ukraine, Mass hacker supply-chain attack, June 2017 using Petya virus[16] According to the US Presidential Administration, this attack became the largest known hacker attack.[17]
2022 Ukraine cyberattack, attacks on Ukrainian government websites, January 2022, one day after US-Russian negotiations on Ukraine's future in NATO failed.[18][19]
Attacks in February 2022, after Russian troops invaded eastern regions of Ukraine, took down several major Ukrainian governmental and banking websites. U.S. intelligence attributed the attacks to Russian attackers, although the Russian government denied involvement.[20]
Russia has tried to block Starlink in Ukraine, which provides Internet access via satellite services. Starlink has countered those attacks by hardening the service's software.[21]Cyberattacks against Starlink appear to have been ineffective, in part because SpaceX quickly updates the system’s software, according to The Economist. The director of electronic warfare for the US Office of the Secretary of Defense has said the speed of the Starlink software response he witnessed to one attack was "eye-watering".[22] In August 2023, during Ukraine's counteroffensive, a Five Eyes report found that Russian hackers planted malwares designed to steal data to Starlink from the Androidtablets of Ukrainian soldiers.[23]Ukrainian Security Services said to have blocked some of the hacking attempts and conceded Russians had captured tablets on the battlefield and planted malwares on them.
Ukrainian cyberattacks
Operation "Prikormka (Groundbait)", May 2016[24][25]
“Channel One” break, June 2016 (hacking of the corporate server of the Russian "Channel One" by the Ukrainian Cyber Alliance of hackers FalconsFlame, Trinity and Rukh8)[31][32]
The Surkov Leaks, October 2016 — a leak of 2,337 e-mails and hundreds of attachments, which reveal plans for seizing Crimea from Ukraine and fomenting separatist unrest in Donbas (documents dated between September 2013 and December 2014).[33]
Russian-Ukrainian cyberwarfare amidst Russian invasion of Ukraine in 2022
In June 2022, Microsoft published the report on Russian cyber attacks, and concluded that state-backed Russian hackers "have engaged in "strategic espionage" against governments, think tanks, businesses and aid groups" in 42 countries supporting Kyiv.[35]
In April 2022, Microsoft report shared new details on Russian cyberwarfare against Ukraine, for instance Microsoft has reported that in some cases, hacking and military operations worked in tandem against Ukraine related target.[36][37]