• Zine
  • Anonymous
  • Green
  • IT
  • Gadgets
  • Tech
  • Cloud
  • Data
  • Network
  • Security
  • Hosting
    • Sunset Host Co
    • Radio Host Co
  • Media
    • WSCA News
    • Sunset Crypto
    • Sustainable Action Now
    • Life.Style Magazine
    • Sunset Daily
    • Sunset Music News
    • Pro Merch Sports News
    • Explore New Jersey
    • Explore NJ News
    • The Zine Weekly
Facebook Twitter Instagram
Wednesday, May 18
Facebook Twitter Instagram
The Zine Weekly
  • Zine

    Cloudways Review 2022: Features, Pricing & More

    May 18, 2022

    Increased Cyber activity in Trinidad and Tobago and the region – IT Industry Today

    May 18, 2022

    Qualcomm and AMD collaborate to optimize FastConnect platform

    May 18, 2022

    Aqua Security creates first unified scanner for cloud native security

    May 18, 2022

    Elon University / Today at Elon / #ElonGrad 2022 spotlight: Grace Holmes, exercise science

    May 18, 2022
  • Anonymous

    Buffalo shooting suspect kept plans from family, he wrote

    May 18, 2022

    Femcels: The ‘involuntarily celibate’ women who say they are barred from sex and romance | Society

    May 17, 2022

    Eurovision 2022: Russian hackers targeted contest, say Italian police

    May 16, 2022

    How Netflix Is a Joke Addresses a Film Distribution Flaw

    May 14, 2022

    How to Fight Foreign Hackers With Civil Litigation

    May 14, 2022
  • Green

    Environmentalists oppose more life for California nuke plant

    May 18, 2022

    Scientists create renewable biocement made entirely from waste materials

    May 16, 2022

    Proposed improvements to SiC MOSFET power converter technology overcome existing challenges

    May 14, 2022

    Emerging hydrogen storage technology could increase energy resilience

    May 11, 2022

    Microgrid demo to lend a helping hand in India’s green energy transition

    May 9, 2022
  • IT

    Cloudways Review 2022: Features, Pricing & More

    May 18, 2022

    Query event logs with PowerShell to find malicious activity

    May 18, 2022

    Indian Tablet Market Grew 68 Percent in Q1 2022 With Lenovo on Top: Cybermedia Research

    May 17, 2022

    How to download YouTube videos

    May 16, 2022

    Roe v. Wade reversal could hinder data privacy rights

    May 16, 2022
  • Gadgets

    Vi Data Delight Offer With Monthly Extra Data Launched for Hero Unlimited Prepaid Plans: Details

    May 18, 2022

    Google is remaking search, maps for the TikTok generation

    May 17, 2022

    Apex Legends Mobile Review: The Resemblance Is Uncanny

    May 16, 2022

    Our study suggests they boost intelligence in children

    May 16, 2022

    Realme TechLife Watch SZ100 India Launch Date Set for May 18, Teased to Offer Up to 12-Day Battery Life

    May 15, 2022
  • Tech

    My Favorite Things on the Internet

    May 17, 2022

    Two Twitter bosses ousted ahead of Elon Musk $44bn takeover

    May 13, 2022

    4D composite printing could improve the wings of drones

    May 11, 2022

    How to delete unused styles using VBA in Word

    May 9, 2022

    Best Gas Credit Cards in May 2022

    May 6, 2022
  • Cloud

    Aqua Security creates first unified scanner for cloud native security

    May 18, 2022

    Innovatrics, Blaize partner on AI ready-to-deploy facial recognition technology

    May 17, 2022

    To Drive Technological Progress, We Need Worker Power

    May 16, 2022

    The age of discontinuity | The Manila Times

    May 15, 2022

    Alibaba Cloud-UCSI to support digital economy

    May 15, 2022
  • Data

    Elon University / Today at Elon / #ElonGrad 2022 spotlight: Grace Holmes, exercise science

    May 18, 2022

    1547 adds capacity to Orangeburg, NY, data center

    May 17, 2022

    Real-time Analytics News for Week Ending May 14

    May 16, 2022

    Greatest REIT Wannabes Of All-Time: Part I

    May 15, 2022

    Metaverse: ‘Train your robots in the virtual world’ (CXOTalk interview)

    May 15, 2022
  • Network

    Qualcomm and AMD collaborate to optimize FastConnect platform

    May 18, 2022

    U.N. and advocates raise concerns of abortion access for Ukrainian refugees in Poland

    May 17, 2022

    Ansible vs Puppet | Compare DevOps Tools

    May 17, 2022

    Why Build in Web3

    May 16, 2022

    Broadband Nutrition Labels and Deployment See Renewed Focus in Washington

    May 15, 2022
  • Security

    Increased Cyber activity in Trinidad and Tobago and the region – IT Industry Today

    May 18, 2022

    Is a Social Credit System Coming for Us?

    May 18, 2022

    Venezuelan doctor accused of selling computer programs to steal data in the US

    May 17, 2022

    Food Truck Festival Giveaway Rules

    May 16, 2022

    Tricity grapples with a new epidemic: Cyber crime

    May 15, 2022
  • Hosting
    1. Sunset Host Co
    2. Radio Host Co
    Featured

    Announcing Reliable VPS Server Hosting Provider with Thailand Bangkok based IP – TheServerHost – IT Industry Today

    By Sunset Host CoMay 18, 20220
    Recent

    Announcing Reliable VPS Server Hosting Provider with Thailand Bangkok based IP – TheServerHost – IT Industry Today

    May 18, 2022

    Announcing Reliable Dedicated Server Hosting Provider with Australia, Sydney, Melbourne based IP – TheServerHost – IT Industry Today

    May 17, 2022

    Announcing Reliable Dedicated Server Hosting Provider with USA, US, New York, California, Texas based IP – TheServerHost – IT Industry Today

    May 16, 2022
  • Media
    1. WSCA News
    2. Sunset Crypto
    3. Sustainable Action Now
    4. Life.Style Magazine
    5. Sunset Daily
    6. Sunset Music News
    7. Pro Merch Sports News
    8. Explore New Jersey
    9. Explore NJ News
    10. The Zine Weekly
    Featured
    Recent

    Cloudways Review 2022: Features, Pricing & More

    May 18, 2022

    Increased Cyber activity in Trinidad and Tobago and the region – IT Industry Today

    May 18, 2022

    Qualcomm and AMD collaborate to optimize FastConnect platform

    May 18, 2022
The Zine Weekly
You are at:Home » The real story behind Russia-Ukraine cyber wars
Anonymous

The real story behind Russia-Ukraine cyber wars

Sunset Host CoBy Sunset Host CoApril 5, 2022No Comments10 Mins Read
Facebook Twitter Pinterest LinkedIn Tumblr Email
Share
Facebook Twitter LinkedIn Pinterest Email

“Russian president is likely to use cyber attacks as a form of retaliation against our country for its action to counter Russias incursion in Ukraine.”

– President of USA, Joe Biden at Business Roundtable quarterly meeting, March 2022

“In March 2022, hackers associated with Russian IP addresses have been scanning the network of 5 US energy companies and 18 US companies in other sectors like defence and financial services, hunting for zero day( still undiscovered ) vulnerabilities to execute disruptive and destructive cyber activity. “

– FBI

“We will unleash full wrath of world hackers, key components of your Government (Russian)would be hijacked. Websites of Duma ,Ministry of Defence, State control tv R.com and of Russian stock exchange have already been taken down.”

– Hacker collective, the Anonymous, sympathetic to Ukraine, March 2022

Welcome to the scary world of new age hybrid warfare where cyber attacks are sine-qua-non to any military exercise.

Ever wondered what following hacker groups have in common?

-FancyBear, SandWorm, Conti,Turla; all Russian and allegedly responsible for hacking Presidential elections in Ukraine and launching ‘NotPetya’ attacks causing mayhem on critical infrastructure of Ukraine.

– Groups like Bureau 121, The Lazarus group owing allegiance to North Korea and allegedly responsible for 2016 Bangladesh National Bank cyber heist of more than USD 90 million, launching WannaCry worldwide ransomware attacks (for more information on WannaCry ransomware attacks kindly refer to the author‘s column dated February 24 2022), hack on Sony pictures in November 2014 for allegedly mocking supreme leader of North Korea wherein Lazarus hacker Park Jin Hyok was held responsible and put on FBI wanted list, though North Korea denies his existence.

– Hacker groups IRGC(Islamic Revolutionary Guard Corps),owing allegiance to Iran and infamous for iconic cyber attacks against Aramco oil refinery in Saudi Arabia rendering more than 30,000 computers useless.

– MI5, MI6, GCHQ(Government communication headquarter) of UK, capable of tapping data flowing through underground sea cables i.e. approximately 25% of global data.

– Unit 8200 of Israel allegedly launched world‘s most sophisticated cyber-attack Stuxnet to stymie Iran‘s nuclear ambitions.

– PLA unit 61486, APT 31, APT 41, StonePanda, RedEcho groups affiliated to China and as per report in New York Times, allegedly responsible for sensational power outage in Mumbai, a city of 20 million people, wherein trains were shut down and stock market closed, while hospitals had to switch to emergency power to keep ventilators running amid Covid outbreak. This happened while Chinese and Indian troops clashed in remote Galwan Valley, bashing each other to death with clubs and rocks.

The common thread running through all the aforesaid hacker groups is that they are all allegedly ‘elite nation state actors’ : Hacker collectives churning out bespoke malware to attack critical infrastructure of adversary states. With the support of nation states, they launched cyber attacks with incredible sophistication to emaciate critical infrastructure like power plants, banking systems, nuclear plants, transportation systems of inimical regimes in order to ‘soften’ them before launching an all-out physical military campaign on the ground. They have also earned the moniker ‘Advanced Persistent Threat (APT) actors.

Operation Olympic games

It was early 2010, the furrows  on the brows of Israeli authorities and NSA officials of USA had deepened. Iran was behaving like a rogue state, it was rapidly developing nuclear offensive capabilities, masquerading them as civil nuclear energy facilities. It had stopped cooperating with International Atomic Energy Agency, IAEA and closed its nuclear fuel enrichment plants to inspection.

Israel knew a nuclearised Iran would tilt the balance of power in the region and the very existence of tiny Jew state would be jeoparadised. Full-scale preparations had begun to modify missiles and  bomb Iran’s nuclear facilities. This could have spawned a massive war culminating into major loss of life. In spite of such massive risks, Israel knew that Iran has to be stopped for the sake of its own survival.

Just in the nick of time, a Eureka moment dawned, when allegedly the technology advisor to Israel prime minister, in consultation with the chief scientist in NSA instead decided to launch operation Olympic games.

An operation to design and deploy the world’s most sophisticated cyber weapon called Stuxnet(name derived from keywords in its code), without firing a bullet. Stuxnet discovered by scientist Serjey Ulasen and its propagation studied first by cyber security firm ‘VirusBlockAda’, was the most sophisticated piece of malware ever discovered and its effects ingenious and terrifying. It opened the Pandora’s box of the state actors’ executed cyber warfare.

Stuxnet sabotaged Uranium nuclear fuel enrichment facility in Netanz, Iran, which was highly fortified and airgapped ,i.e. not connected to internet.

The chief Nuclear Physicist of Pakistan, Dr AQ Khan, had sold the centrifuges for enrichment of uranium to Iran and their operation was studied meticulously by researchers in Mosad  and NSA. Accordingly, bespoke Stuxnet was curated. It is speculated that external contractors, overcame the air-gapping  by introducing Stuxnet via USB flash drive in Siemens’ Programmable Logic Controllers PLCs, which are small computers that control industrial automation in practically all sectors including airlines, power plants, water purification plants, nuclear plants etc.

Cyber sabotage of PLCs can bring a whole nation down to its knees. This was the beginning of hybrid warfare and launch of the state of the art digital weapon, equipped with immense speed, precision and agility, sans any ground troops. Incredibly, in just a few minutes, zombie centrifuges started to spin at supersonic speeds, tearing themselves apart. Stuxnet’s baptism by fire, ensured for the first time, irreversible physical damage due to a cyber weapon leading to complete derailment of Iran‘s nuclear programme.

Stuxnet proved to be Iran‘s nightmare, which gave a death blow and was the sole reason why Iran, till date, could not become an acclaimed nuclear weapon state.

The story behind Russia Ukraine cyber wars

-In 2014, Russia annexed Crimea, which was part of erstwhile Ukraine. It was followed by Russia backed insurgency in Eastern Ukraine, which has resulted in more than 20,000 deaths till date. The year marked the  beginning of full blown cyber-war between Russia and Ukraine, continuing till today when Ukraine has become the epicentre of full-scale Russian invasion.

– In 2014, it is reported that Russian state hackers attacked the Ukrainian Central Election Commission computer systems to rig the Presidential elections. The Election Commission’s compromised computer systems prior to recovery, displayed landslide victory to Ultra – Nationalist – Right winger, Mr Yarrosh, showing that he secured 37% votes, though in reality he got just 1%. The Russian channel 1 bulletin was quick to declare Yarrosh victorious by exactly the same numbers. Significantly, the hacked election results were foiled and Moderate candidate with 79% vote share was finally declared victorious.

– Winter was in its full fury  in December 2015, it was difficult to survive without warmth induced by air-conditioners in subzero conditions on the eve of Christmas in Kiev, the capital city of Ukraine. It is speculated that  APT state collective SandWorm introduced malware BlackEnergy in the computer systems of power plants in Kiev. Lo and behold, militaristic use of cyber-weapon BlackEnergy started remotely switching of the substations, plunging large parts of Kiev into wintry, eerie darkness. 2.3 lac Ukrainians faced extreme chill for six hours and over 30 of them succumbed .

It was established that SandWorm conducted attacks from computers with IP addresses originating from Russia in such a brazen way that the IP address were not even masked.  KillDisk, a secondary malware wiped off the entire data including the list of clients and their outstanding payments. It is pertinent to note that September 12, 2020, power outage in Mumbai also had all the tell-tale signs of cyber sabotage and the  14 Trojan Horses or hidden malware discovered during an official enquiry revealed that they belonged to the same family of malware as BlackEnergy, which caused the Ukrainian power outage.

– Another power plant cyber sabotage occurred in Kiev in December 2016, when another malware ‘Industroyer’, ensured 20% of Kiev faced blackout for over six hours.

– Another litany of powerful cyber attacks swamped Ukraine in June 2017. An incarnation of ‘Petya’ ransomware, which was renamed as ‘NotPetya’  afflicted computer systems of wide spectrum of Ukraine organisation, banks, defence ministry, leading newspapers, electricity firms, health services et cetera.

NotPetya utilised ‘eternal blue’ exploit in Microsoft Windows operating system and multiplied exponentially causing widespread mayhem by encrypting data and large computer files were entirely wiped off.

Consequently, Radiation monitoring station at Chernobyl nuclear plant went off-line. Similarly, International Airport, Railways and Central Bank were all massively crippled. It was indeed a full-fledged, well planned and surgically executed multi-theatre hybrid war launched to cause atrophy in defence capabilities of Ukraine.

Corporations like Vodafone, Kyivstar, Kyiv Metro, Maersk, WPP, FedEx, Saint Gobain had to shut down operations. As an illustration, owing to shut down of Maersk, one of the biggest shipping companies of the world, thousands of ships with millions of containers were left stranded in the high seas.

The ‘NotPetya’ attacks allegedly caused catastrophic loss of USD 10 billion to the economy with losses of USD384 million to Saint Gobain alone. A piquant observation vis-a-vis ‘NotPetya’ attacks,allegedly caused by APT FancyBear group was that they were masqueraded as ransomware attacks demanding ransom of paltry USD 300 in bitcoins, but in reality they infiltrated admin level protocols and totally wiped out data and crippled computers.

The origin of ‘NotPetya’ attacks is believed to be from compromised auto update system of highly popular tax accounting software ‘Medoc’. No sooner than a client updated the Medoc, NotPetya  totally devastated the networked computers.

As a retaliation in March 2022, the vice prime minister of Ukraine declared the formation of Ukrainian IT army, with two lakh recruits with the aim to “stymie Russian propaganda, disinformation campaign and disrupt digital infrastructure of Russia”. This has spawned a full blown hybrid war. International hacker collective – the ‘Anonymous’ came in support of Ukrainian government against the tyrannical invasion  and claimed to have launched a no-holds-barred cyber-attack on critical infrastructure of Russia.

No wonder, Moscow stock exchange website was down, Sberbank’s website was knocked off and even Conti hackers group’s, sympathetic to Russia, systems were hacked. As a counter attack, in March 2022, Ukrainian foreign affairs website was hacked and a scary message flashed on it, which read “Ukrainians be afraid and expect worse”. Just a week ago, FBI had declared four Russian hackers as wanted with reward of USD 10 million each, for targeting nuclear and electrical plans in 135 countries and attempting to cause physical damage by cyber weapons.

State actor cyber attacks are being preferred as they cost very little, are easier to carry out, provide deniability, laced with scarce diplomatic repercussions. Stuxnet attack proved pathbreaking and states quickly realised that cyber attacks can be utilised to achieve political, commercial and military goals.

However, the APT groups blur the distinction between criminal organisations and government authorities. The state cyber-actors are presently being deployed for:

– Espionage , culling out corporate secrets, technological advances and political intelligence.

– Attacking critical infrastructure to diminish defensive capabilities.

– Spreading disinformation to bring down credibility and influence public opinion.

– Testing capabilities of adversaries.

It is imperative that cyber security is acknowledged as prominent parameter of national security else the day is not far when cyber military weapons may derail trains,poison water supplies, cripple power grids or even set off nuclear missiles.

Facebook
Twitter
Linkedin
Email


Disclaimer

Views expressed above are the author’s own.



END OF ARTICLE



Share this:

  • Twitter
  • Facebook

Related

Mumbai blog Voices blog Yashasvi Yadav blog
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleUK workers oppose Facebook’s censoring of German Socialist Equality Party’s anti-war video
Next Article Researchers uncover a hardware security vulnerability on Android phones
Sunset Host Co
  • Website
  • Facebook
  • Twitter
  • Pinterest
  • Instagram
  • Tumblr
  • LinkedIn

Related Posts

Buffalo shooting suspect kept plans from family, he wrote

May 18, 2022

Femcels: The ‘involuntarily celibate’ women who say they are barred from sex and romance | Society

May 17, 2022

Eurovision 2022: Russian hackers targeted contest, say Italian police

May 16, 2022

Leave A Reply Cancel Reply

Categories
  • Anonymous (98)
  • Cloud (153)
  • Data Center (136)
  • Gadgets (176)
  • Green Tech (40)
  • Hosting solutions (98)
  • IT News (100)
  • Network (145)
  • Security (138)
  • Tech (97)
  • Web hosting (58)
  • Zine
  • Anonymous
  • Green
  • IT
  • Gadgets
  • Tech
  • Cloud
  • Data
  • Network
  • Security
  • Hosting
    • Sunset Host Co
    • Radio Host Co
  • Media
    • WSCA News
    • Sunset Crypto
    • Sustainable Action Now
    • Life.Style Magazine
    • Sunset Daily
    • Sunset Music News
    • Pro Merch Sports News
    • Explore New Jersey
    • Explore NJ News
    • The Zine Weekly

Subscribe to Updates

Get the latest tech news from the Zine at the Sunset Host Co. and the Radio Host Co.

Cloudways Review 2022: Features, Pricing & More

May 18, 2022

Increased Cyber activity in Trinidad and Tobago and the region – IT Industry Today

May 18, 2022

Qualcomm and AMD collaborate to optimize FastConnect platform

May 18, 2022

Aqua Security creates first unified scanner for cloud native security

May 18, 2022

Elon University / Today at Elon / #ElonGrad 2022 spotlight: Grace Holmes, exercise science

May 18, 2022

Announcing Reliable VPS Server Hosting Provider with Thailand Bangkok based IP – TheServerHost – IT Industry Today

May 18, 2022

Vi Data Delight Offer With Monthly Extra Data Launched for Hero Unlimited Prepaid Plans: Details

May 18, 2022

Environmentalists oppose more life for California nuke plant

May 18, 2022
Copyright © 2022. The Zine Weekly, an SCA Entertainment & Media Company. All Rights Reserved.

Type above and press Enter to search. Press Esc to cancel.