The cyberwarfare subject has come to light recently due to the attacks that preceded the conflict between Russia and Ukraine. However, this concept is not new and Ukraine is not the first country to suffer politically motivated cyberattacks.
Despite this, the definition of actions involving cyberwarfare still generates controversy among experts, and many people may confuse it with cyberterrorism, as we will explain in the next topics.
On the other hand, we know their damage exceeds a cyberattack action and involves specific motivations.
In this article, we will address the concept of cyberwarfare, pointing out its objectives and how it can impact the lives of the population. We also bring numerous important statistics on the subject. To facilitate your understanding, we divided our text into the following topics:
- What Are the Main Goals of Cyberwarfare?
- How Does Cyberwarfare Happen?
- Most Common Types of Attacks in Cyberwarfare
- Government-Associated Hack Gangs
- Sectors Attacked in Cyberwarfare
- Cyberwarfare Facts & Data
- Stuxnet: The Most Famous Event Linked to Cyberwarfare
- Is Cyberterrorism Synonymous with Cyberwarfare?
- Cybercrime, Cyberespionage, or Cyberwarfare?
- Cyberattack and Cyberdefense
- Cybersecurity as a Priority for Anatel (Brazil)
- Russia and Ukraine: Prospects for New Cyberattacks
Enjoy the read!
Cyberwarfare consists of one or several cyberattacks that have targeted a country, which can impact its government and civil infrastructure and harm the state, even putting lives at risk.
Experts have not yet reached a consensus on how to define which procedures relate to this concept.
The U.S. Department of Defense (DoD) understands cyberwarfare as malicious activities on the Internet that can threaten national security, without going into clarifying details about this definition. However, some interpret cyberwarfare as an action that can cause death.
In cyberwarfare, one country attacks the other, promoting hostility, and often this initiative comes from a terrorist organization or non-state actors.
Recently, several cases of cyberwarfare have been reported. However, there is still no unanimity when it comes to defining when a cyberattack is actually cyberwarfare.
-
What Are the Main Goals of Cyberwarfare?
There are several reasons for cyberwarfare. Malicious agents can often be determined to seek advantages in actual confrontations. This is what happens when the military centers of the countries are targeted by the attacks, which are intended to impact their strategy and operations.
Another goal of cyberwarfare is to impress people living in the target nation, causing problems for civilians, who may suffer from a lack of internet and energy, for example. In such cases, those who attack expect the government to be pressured by the population and do whatever is necessary to put an end to the conflict.
Another motivation related to cyberwarfare is the sabotage of adversary industries in order to make their projects unfeasible.
An example occurred in Iran in 2010, when the Stuxnet virus was implanted in the control systems of the uranium enrichment centrifuges. The idea was to interfere with their engines and promote damage inside the plant.
As there was no internet access, it is believed the virus was implanted by an infiltrator. What’s more, we are talking about a highly complex threat, which was probably commissioned by a nation interested in impacting Iran’s nuclear actions.
Cyberwarfare always results from the tension between the countries involved. The current Ukrainian war is a typical example: before the Russian invasion, this country was already the target of attacks on its digital systems, which may continue to occur.
The concern about cyberwarfare is recent. It was not long ago that people began to wonder if malicious agents could attack an entire city leaving it without electricity or making it impossible for a nation’s ATMs to work.
Nowadays, these are not only remote hypotheses but concrete facts. Despite seeming to be an element of a dystopian narrative, cyberwarfare is real, and its consequences go beyond what is usually reported as a hacker invasion.
Although we do not have proven cases of deaths related to cyberattacks, a single malicious action has already caused the loss of 10 billion dollars.
In practice, companies of all sizes may have their structures compromised to damage a government.
In addition, cyberwarfare is becoming increasingly threatening, especially with its frequent evolution in countries such as the United States, Russia, China, North Korea, and Iran.
-
How Does Cyberwarfare Happen?
To promote cyberwarfare, hackers can damage a country by attacking strategic targets and affecting the routine of the entire population or by reducing the resources of the armed forces in order to pressure their rulers to end the conflict.
This means they can act under the communications system of the target nation, even interfering with its media. Attacks that affect the supply of electricity are also common, causing great inconvenience to people.
Another goal of cyberwarfare is to invade systems of rival nations by gaining access to strategic secrets and influencing their operations.
Because of the potential of cyberwarfare, many countries rely on intelligence services that are tasked with preventing threats. Here’s how a cyberattack occurs:
- First, hackers evaluate existing information about their target in order to define their attack front.
- Then, the weak link of the network is found, which can be done by different methods, such as replicating a website used by the victim, or sending an attachment with viruses in an email.
- Next, the malicious agent tries to exploit this vulnerability in order to gain unauthorized access.
- Finally, they perform the activity they want within the system.
-
Most Common Types of Attacks in Cyberwarfare
Like the other hacker attacks, cyberwarfare can include a series of actions. One of them is overloading a web address, using several machines to access it.
With millions of access attempts per second, it is possible to paralyze the server that operates the resource and cause the service to stop.
This type of action, in cyberwarfare, may have the purpose of taking government websites off the air to compromise services and information provided to the population and cause confusion.
Another common type of attack is fake news – rumors made public with the interest of causing disinformation, generating tension and distrust between people in relation to their rulers, so that they do not get popular support.
In cyberwarfare, hackers can still act to get sensitive information from their target, such as strategic data about the war.
Another very serious hacker action when it comes to cyberwarfare is the interference in the population’s infrastructure, which paralyzes services such as the distribution of electricity or the internet, in order to put the population against their government.
In addition to these two examples, hackers can interfere with drinking water distribution, security services, and the financial market.
-
Government-Associated Hack Gangs
The Russian government has taken no action against ransomware and cybercrime gangs installed in the country, and the favor has apparently been returned by the Conti gang in the current context of the Ukraine invasion.
This group was known to attack medical facilities and law enforcement agencies in 2020, exploit the Log4J vulnerability to carry out ransomware attacks and victimize the Irish Health Services Executive, among other targets.
Recently, the gang went public through its dark website, used to receive payments from its victims and post private documents from non-ransom payers, and announced support for the Russian government and the goal of promoting retaliation.
In turn, the United States government warned the country’s organizations to prepare for a possible response.
As we suggest, the Russian government chooses to ignore the actions of the Conti gang, however, it has been questioned whether this bond is not stronger than previously thought, due to the current patriotic position of the group.
In contrast, the Conti gang strengthens its independence from the Russian government while declaring itself protective of Russia’s peaceful citizens and promising to respond to Western attacks on Russian-speaking regions.
On the US side, the Anonymous group has demanded the removal of Russian ISPs and the Russia Today news website, under the threat of hacking into the website of the Russian Ministry of Defense.
A recent report pointed out that groups of hackers associated with the North Korean government are renting elite hacker tools and access to hacked networks from TrickBot botnet operators.
Anchor was apparently developed for hacker gangs interested in economic espionage and operators of POS malware lines, but would have been used by nation-state hacker groups.
According to a report published by cybersecurity startup SentinelOne, the Lazarus Group – a cybercrime gang linked to North Korea – has allegedly rented access to an infected system through the TrickBot botnet and used the Anchor attack structure to install PowerRatankba, a PowerShell backdoor on an organization’s network.
Another Russian-led cybercrime gang is Revil, which used the Happy Blog website to extort companies and leak their data.
One of its attacks, which targeted the Colonial Pipeline, has led to a lack of gas on the east coast of the United States. According to the authorities, this attack used encryption software called DarkSide, created by members of Revil.
At the time, law enforcement and intelligence officials prevented the gang from taking action against other companies, and after the group compromised software management company Kaseya, the U.S. government tried to stop it from paralyzing organizations around the world.
7. Sectors Attacked in Cyberwarfare
In cyberwarfare, there are critical infrastructure sectors, which are those usually attacked by hackers to cause instability in the opposing government.
These sectors consist of vital services for the population of a country, whose interruption could impact safety, public health, economy, or other essential areas in the routine of people.
Some of the critical infrastructures are hydropower and energy systems, water networks, transport and communication services, government and military systems, and emergency services, which can be stopped, impacting the entire population.
According to the U.S. Cybersecurity and Infrastructure Agency (Cisa), there are 16 critical infrastructure sectors vital to this country and protected by Cisa. They are:
- Commercial Facilities Sector;
- Critical Manufacturing Sector;
- Defense Industrial Base Sector;
- Emergency Services Sector;
- Financial Services Sector;
- Food and Agriculture Sector;
- Government Facilities Sector;
- Health and Public Health Sector;
- Information Technology Sector;
- Nuclear Reactors, Materials, and Waste Sector;
- Transportation Systems Sector; and
- Water and Sewage Systems Sector.
Additionally, in 2010, U.S. security firm McAfee issued a report called “Under Firestorm. Critical Infrastructure in the Age of Cyberwarfare.”
To this end, threats to critical structures were assessed, based on information from 600 IT executives on cyberattacks and security practices.
This analysis allowed them to conclude that critical structures are constant targets of cyberattacks involving other nations, even if this is not declared.
We also add that cybercriminals can present different profiles and modes of action. Check them out:
- Cyber soldiers: These hackers are commonly government-sponsored and direct their attacks with actions that include spying, exposing sensitive data, extortion, and destroying critical infrastructure.
- Organized Cybercrime: These malicious agents carry out large-scale attacks, having access to the data of their victims and carrying out extortion, among other actions in order to obtain profits.
- Hacktivists: Here we refer to groups of hackers who act according to a political ideology and usually use non-violent but illegal digital means in their attacks. One of its most common actions is to use features that allow them to control millions of devices.
- Cyberterrorists: Cyberterrorists act by spreading terror among their victims. Their operations include the interruption of internet services, such as websites, theft and exposure of confidential data, and attacks on financial institutions and other critical infrastructure sectors.
-
Cyberwarfare Facts & Data
There is a lot of relevant data about cyberwarfare. Here are some of them:
- 26.3% of cyberwarfare attacks target the United States.
- 20% of global organizations believe cyber espionage is their biggest threat.
- Up to 64% of the world’s organizations have been the target of some kind of cyberattack.
- China and Russia are believed to be linked to up to 35% of all politically-motivated cyberattacks.
- The attacks related to espionage total 11% of the actions promoted in cyberwarfare and have the goal of collecting information from people, companies, and governments.
- Iran is one of the fastest-growing countries when it comes to cyberwarfare since 2009. In 2018, 144 universities and 33 companies in the US were targeted by Iranian hackers, who stole $3.4 billion in data.
- In 2018, two Chinese were accused of hacking American, Japanese, German, and Canadian organizations, among others. Among their targets, NASA stands out.
- It is believed that 69% of the cyberattacks and violations suffered by the United States in 2019 were caused by hackers who were abroad, which makes it more difficult to track them.
- In 2015, the Obama-Xi cyber agreement between China and the United States was held, which contributed to reducing attacks on U.S. targets. However, the agreement represented only a truce between the two countries. In 2018, Chinese hackers targeted hotel chains targeting VIPs and U.S. telecommunications companies.
- Between 2009 and 2018, the number of cyberwarfare-related attacks has increased by up to 440%, involving at least 56 countries.
- According to information from the New York Times, it is believed that since 2015, Russia has supported a group of 400 hackers who have devoted themselves entirely to cyberattacks.
- According to information from the University of Maryland, every 39 seconds, someone is the victim of a cyberattack.
- 62% of hacks consist of social engineering attacks, such as phishing. In addition, ransomware and DDoS attacks are also very common.
-
Stuxnet: The Most Famous Event Linked to Cyberwarfare
In 2010, a pest was identified that had the potential to impact industries. Stuxnet is not used to attack home computers, but Siemens industrial control systems (SCADA).
In practice, this malicious program is mirrored through flash drives and connects the hacked computers to a remote system, where stolen information, such as reports, is sent. With it, hackers can also access SCADA system settings remotely.
This system is used by industries of all sizes in order to control automated processes in the production line, without human presence. In 2010, Stuxnet was identified at the Iranian nuclear facilities in Natanz, as well as computers located in China, India, Indonesia, Australia, Pakistan, England, and the United States.
As mentioned earlier, it is believed the virus was inserted through a device installed on the plant’s computers, since there was no internet on site. It is speculated that the action was commissioned by a country interested in Iranian uranium enrichment centrifuges.
Here are other cases of cyberwarfare attacks:
After the release of The Interview, which negatively portrayed Kim Jong Un, an attack was carried out on Sony Pictures allegedly by hackers from the North Korean government.
According to the FBI, there are similarities between this action and malware attacks previously performed by North Koreans, including data deletion mechanisms, code, and encryption algorithms.
In 2007, Estonia transferred the Bronze Soldier, a statue depicting a Soviet soldier in uniform, from the center of Tallinn to a military cemetery. Subsequently, the country suffered a series of cyberattacks, which overwhelmed government, bank, and media websites with traffic in denial-of-service attacks, leaving them down.
- Ukrainian Artillery Rocket Forces
According to CrowdStrike, an organized group of Russian hackers called Fancy Bear allegedly attacked Ukrainian rocket and artillery forces between 2014 and 2016.
An Android app used by the D-30 artillery unit is believed to have been used to spread X-Agent malware.
This attack was successful, as it destroyed more than 80% of Ukraine’s D-30 howitzers.
In 2018, American businessman Elliott Broidy filed a lawsuit against the Qatar government, alleging that it had stolen and leaked his emails in order to discredit him.
The accusation involved Qatar emir’s brother, who allegedly organized a cyberwarfare campaign, along with other leaders in the country, and claimed 1,200 victims, known as “Qatar’s enemies.”
Human rights activists residing in China had their data violated in a 2009 cyber-attack directed at Google’s Chinese division. This intrusion gave access to internal codes of the organization’s services and users’ emails.
Those responsible were not identified, but it is believed the initiative came from Chinese agents interested in registering actions of opponents of the regime.
In September 2018, researchers stated that 36 governments attacked targets in at least 45 countries with Pegasus spyware.
According to Swiss authorities, two Russian spies were located in the Netherlands, preparing to attack the Swiss defense laboratory.
In October 2018, former U.S. President Donald Trump was alerted that Russia and China had access to calls made from an unsecured phone line.
At the same time, the Israel Defense Force requested the development of projects that would allow monitoring correspondence between social media users.
Following the death of a journalist investigating drug cartels in 2018, a group linked to the Mexican government allegedly used spyware to attack their colleagues.
- Chilean Interbank Network
After manipulating an employee to install malware during a fake job interview, North Korean hackers broke into the Chilean interbank network in December 2018.
In the same period, the United States, along with Canada, the United Kingdom, Australia, and New Zealand, accused China of promoting cyber espionage for 12 years to uncover the IP and sensitive business information of organizations from 12 countries.
Hundreds of German politicians had their private communications, financial data, and other personal information stolen in January 2019. This attack had members of all parties, except for the extreme right-wing AfD, as its political targets.
At the end of 2016, UN Civil Aviation Organizations were attacked by hackers linked to the Chinese government to use their access to spread malware to websites of various governments.
In March 2019, the UN Security Council revealed that North Korea had used hackers to prevent sanctions and stolen $670 million in currency and cryptocurrency over three years between 2015 and 2018.
- Hong Kong International Amnesty
In April 2019, Amnesty International’s Hong Kong office revealed it was targeted by Chinese cybercriminals who had access to personal data from its supporters.
In the same period, Lithuania’s Ministry of Defence was the target of a disinformation campaign, which spread rumors of corruption using counterfeit email addresses.
In May 2019, Iran spread fake news about the US, Israel, and Saudi Arabia using a network of websites and accounts developed for this specific purpose.
In July 2019, Microsoft stated it had identified about 800 cyberattacks carried out in the previous year, which targeted NGOs, discussion groups, and other types of political organizations.
Most of these attacks are believed to have originated in Russia, North Korea, and Iran.
Also in July 2019, email provider ProntonMail was targeted by a government-sponsored group seeking to access accounts of former intelligence officers and reporters for information on Russian intelligence actions.
In August 2019, Russian hackers used vulnerable IoT devices to access corporate networks. In the same period, hackers associated with the government of China attacked U.S. cancer institutes for information related to research against the disease.
- Huawei Business Operations Disruption
In September 2019, the US government was accused by Huawei of invading its intranet and internal systems to make its business operations impossible.
Recent Comments