Cyber threats and cyber influencing
- The latest hybrid influencing tool and form of threat
- Targeting information networks
- There are three types of malicious cyber activity: cyber intelligence (espionage), cyber-attacks, and data manipulation
- The purpose of cyber intelligence is to collect information
- Cyber-attacks – especially concerning the network infrastructures of society’s electricity, communications, water, financial and critical systems
- The purpose of cyber manipulation is to change the information stored on networks
- Recent trends
- Programs demanding ransom
- Cyber threats related to component and device vulnerabilities
- Covert military operations in cyberspace
- Information networking as a new form of conflict between states
- Critical infrastructure in many countries compromised, allowing vulnerabilities to be implanted in networks – vulnerabilities that could later be activated
- Cyber activities in the Russia-Ukraine war since 2022
Read more
This latest hybrid influencing tool and form of threat is still the most difficult to grasp, even though it has been used for twenty years. There are three ways to target cyber networks with malicious cyber activity: intelligence (espionage), attacks, and data manipulation (processing).
Cyber intelligence is similar to traditional intelligence and espionage activities, the purpose of which is to gather information. The information stolen through cyber intelligence may be kept secret for one’s own needs, or leaked for influencing purposes (e.g., Wiki Leaks) as part of hybrid influencing.
Two known hacker groups (APT 28 / Fancy Bear and APT 29 / Cozy Bear) with ties to Russian intelligence services are known to have carried out hostile espionage operations on the computer networks of other states. In 2015, APT 29 infiltrated the U.S. White House data network, as well as the networks of several organisations in Western Europe, Central and Eastern Asia, and Central and South America. APT 28 was also found to have broken into the networks of military and defence companies in America, Europe and Asia. It was also behind the intrusion into the networks of the German Reichstag and French TV5 Monde in 2015.
Covert data collection is not new, but the cyber dimension brings new tools and reduces costs. Cyber operations are low-cost, low-risk, and can yield good results – thus making them attractive to poorer countries as well.
A cyber-attack is a continuum of cyber intelligence and refers to an attack that targets, in particular, the cyber infrastructures of society’s electricity, communications, water, financial and critical systems. So far, there have been relatively few of them – but this activity has increased considerably in recent years.
The discovery of Stuxnet in Iranian computer systems in 2010 marked the introduction of a new type of cyber warfare method. This “world’s first digital weapon” differed from previous cyber malware in that, in addition to stealing data, it destroyed the physical devices controlled by computers. There were two different versions of the attack: the first damaged centrifuges at Iran’s nuclear enrichment plants, and the second manipulated the computer systems of those companies that were supplying Iran’s nuclear programme with industrial control and processing systems.
One of the most troubling cases has been the successful attack on the computer network of the Canadian company, Telvent (APT 1 / Comment Crew / Comment Panda), by a cyber task force linked to the Chinese army unit 61398. The Telvent company designs remote access software for valves, switches and safety systems for oil and gas pipeline companies and power grid operators. Telvent maintains detailed plans for more than half of all oil and gas pipelines in North and South America and has access to their systems.
Cyber-attacks on critical infrastructure, especially power grids, have occurred in connection with almost all recent political and military crises, including Estonia 2007, the Balkans, Georgia 2008, Ukraine since 2014, Syria and the rest of the Middle East.
In cyber manipulation, hacker groups can manipulate or alter data stored on a network, once they gain access to the system. Manipulation can be a serious challenge in the future. So far, most cyber intrusions have been data theft. The threat is that the intruder will start manipulating and modifying the data so that the network owner can no longer believe in, and trust, their own system. One of the most serious incidents of electronic manipulation occurred in 2013, when Syrian hackers gained access to the Associated Press Twitter account and tweeted false news about the White House explosion. This also had a direct impact on US stock prices. One of the first attempts to manipulate data to achieve political goals occurred during the 2016 US presidential election. Russian hackers who had gained access to the Illinois state’s voter database attempted to change the registry information – but, fortunately, without success.
Recent trends
During 2017, many cases of ransomware (WannaCry, NotPetya and BadRabbit) occurred in almost epidemic style. In 2018, it became clear how limited our capabilities are, in dealing with cyber threats related to side-channel attacks and vulnerabilities in microprocessors and various components and devices (tamped). Since 2019, covert military operations related to interstate conflicts have increasingly begun to take place in cyberspace, with the result that cyber researchers worldwide – ranging from financially motivated cyber criminals to state-sponsored cyber researchers – have begun to focus ever-increasing attention on it.
In recent years, the Internet of Things (IoT) has introduced a new dimension to the cyber world that can be utilised in cyber operations. Due to the low level of security in these devices, it is possible to access computer networks and spread malware through them.
The main focus of the cyber activities of states and the groups supported by them is intelligence. There are over a hundred such groups around the world, backed by organisations from nearly 20 countries, including China, India, Iran, Israel, Lebanon, Nigeria, Pakistan, Palestine, North Korea, Syria, Russia, Vietnam, Turkey, the United Arab Emirates and the United States. Several Western countries, such as Britain, France, Germany and the United States, operate in cyberspace through actors that are part of their intelligence and defence organisations.
Cyber operations, combined with other hybrid influencing methods, have provided states with opportunities to act in ways that can be conducted at least to some extent in secret, and so that their involvement in cases that come to light can be denied. Offensive cyber operations have been used especially in connection with the war in Ukraine and the related occupation of Crimea, as well as in the Middle East in connection with the Syrian civil war and the situation in Iran.
Concerning state-sponsored cyber operations, Russian actors are the most active and have caused the greatest damage. Since 2014, their main targets have been the Ukrainian government and its law enforcement agencies and armed forces. Since 2017, Russian activities have also been targeted against critical infrastructure and energy sectors (nuclear power plants, for example) in Europe and the United States. At least seven Russian groups, operating under varying names, have been identified.
Chinese groups have been found to focus mainly on the requirements set out in the government’s “Made in China 2025” plan for the technology, energy and healthcare sectors. In recent years, an increase in the activity of Chinese groups has been observed – which is, at least partly, related to the deterioration of US-China relations.
In recent years, Iranian groups have enhanced their activities with new tactics, techniques and procedures. These include, for example, strategic web compromisation campaigns and mobile malware which have been used against regional rivals, in order to restrict the activities of opposition groups in the country and to support their own “soft war” campaigns.
North Korean groups have also increased their activity recently. Among the targets focused on are the financial sector and intelligence operations directed at South Korea.
Cyber activities in the Russia-Ukraine war since 2022
The war between Russia and Ukraine has involved cyber warfare to an unprecedented extent. Russian cyber groups have been particularly active in intelligence gathering and through disinformation aimed at influencing the general mood in Ukraine and destroying state and commercial networks. Large-scale Russian-patriotic hacktivism has also been observed behind these activities in line with Russia’s ambitions, and Western actors have often been targeted.
Russia has long integrated cyber activities with its military operations – in particular, through distributed denial-of-service (DDoS) attacks. Activities since 2022 show that Russia is using a wide range of tools to achieve its goals.
The accompanying chart shows how the levels of Russian cyber activity changed during 2022. The activities are divided into intelligence gathering, disinformation operations and network destruction activities.
Ukrainian cyber actors have also retaliated against the Russian state and its allies throughout 2022. Russia’s military intelligence service, the GRU, appears to be responsible for many operations against Ukraine, but the FSB (the federal security service) has also supported the war by collecting intelligence. Cyber Action Teams were particularly active against Ukraine in 2022. Other, unidentified operations also targeted Ukrainian organisations and individuals for the probable purpose of gathering intelligence. They usually used phishing methods to gain access to email accounts.
In January 2022, prior to Russia’s invasion of Ukraine, ongoing reconnaissance activities aimed at Ukrainian targets were complemented by several devastating EMBER BEAR operations which defaced websites and spread malware. This was probably intended to weaken the Ukrainian Government’s ability to act. In addition, it involved attempts to psychologically influence Ukrainian citizens by claiming that the Ukrainian authorities would not be able to protect them in the case of a military incursion.
In February 2022, several DDoS attacks targeted Ukrainian government portals and financial institutions. The aim was to put pressure on Ukrainian citizens by interrupting their use of banking services. Western sources stated that at least some of the attacks were carried out by the GRU.
After the invasion began, Russia conducted several secret, destructive operations against Ukrainian computer networks. The aim was to deny Ukrainians access to energy supplies or state databases, for example, but covertly, without attracting public attention. Instead, the EMBER BEAR operations were carried out openly against Ukrainian government websites, and reports were made of data destruction and the leaking of public information, suggesting that this was a hacktivist activity.
On 23.2.2022, Russian cyber actors launched several attacks against Ukraine’s network infrastructure. The attacks used unprecedented, unique and highly destructive malware families and corrupted websites. In addition, within 48 hours, new data-destroying malware families (DriveSlayer, PartyTicket, IsaacWiper and AcidRain) were deployed in tandem with the military invasion launched by Russia on 24/02/2022.
AcidRain was deployed less than one hour after President Putin announced the start of a “special military operation”. This is noteworthy because it seemed specifically designed to interfere with the network segments of Viasat satellite communications – those segments that provide network access to Ukraine.
The actual impact of cyber operations on the Ukrainian government and armed forces is unclear, but it was felt beyond Ukraine’s borders. This disruption affected service providers across Europe, leading to outages for thousands of customers and disruptions in wind turbine network communications in some locations in Germany.
After the first week of war, Russia’s cyberattack activity intensified, although its capabilities and range of tools began to decline. The exception was VOODOO BEAR’s activities, which included the deployment of CaddyWiper, which began on 03/14/2022 and continued throughout the year, as well as attacks on Ukraine’s energy sector with the new CrashOverride program and several functions designed to wipe Linux and Solaris systems.
In the second half of 2022, Russian cyber activity shifted to focus more on intelligence gathering operations. This points to the military’s and Kremlin’s needs for greater situational awareness as the invasion of Ukraine stalled.
The identified operations included extensive attempts by Russian cyber task forces to phish for information on Ukrainian targets. Phishing activities have extensively targeted state actors such as laboratories, military equipment suppliers, logistics companies and NGOs. This reflects Russia’s efforts to gather intelligence on Western military support for Ukraine. Targeting NGOs may indicate a desire to retaliate against any organisations that may be involved in Russian war crimes investigations. Despite the emphasis on intelligence gathering, Russia’s devastating malware families, Prestige and RansomBoggs, disguised as ransomware, were deployed in October and November 2022.
The use of fake ransomware suggests that Russia intends to direct its cyber activity more towards targets where destructive operations are considered politically risky. The overall impact of Russia’s cyber activities in the context of the invasion of Ukraine is unclear. Russian cyber actors have participated in the military operation, and there have been wartime restrictions on operations. Devastating attacks often require extensive planning but are less effective than conventional warfare.
The war in Ukraine has not lived up to expectations of how cyber operations can support modern warfare. Attacks on key industries such as energy, telecommunications, transportation and media have not been as widespread as predicted. This suggests in part that Russia expected a swift and decisive victory over Ukraine and that functioning systems were needed in order to keep Ukraine running under the new regime.
Concerns in the early stages of the war about significant collateral damage to international networks were also not fully realized. The identified attacks mostly targeted Ukrainian networks. Nevertheless, sectors that have not been targeted until now may still be targeted as the war continues.
Ukraine has employed a well-functioning cyber defence. Ukraine, in cooperation with private actors and with the support of its allies, has succeeded in preventing and undermining many of Russia’s devastating cyber operations.
Sources and links
National and multinational government organisations:
The European Centre of Excellence for Countering Hybrid Threats (Hybrid CoE):
https://www.hybridcoe.fi/
European Union Institute for Strategic Studies (EUISS):
https://www.iss.europa.eu/)
The State Security Department of Lithuania:
https://www.vsd.lt/en/threats/threats-national-security-lithuania/
US Cybersecurity and Infrastructure Security Agency (CISA):
https://us-cert.cisa.gov/
Private companies and organisations monitoring and investigating cyber activity:
CrowdStrike:
crowdstrike.com
CSO:
www.csoonline.com
Eset:
eset.com
Trellix:
www.trellix.com
Intezer:
intezer.com
Kaspersky Lab:
kaspersky.com
Palo Alto Networks Unit 42:
paloaltonetworks.com