Geopolitics: Victor Zhora on Cataloging Cyberwar Crime Evidence Against Russian Hackers Targeting Ukraine
Introduction
Cyberattacks have played a significant role in the war in Ukraine, with Russian hackers targeting satellite systems, executing disinformation campaigns, carrying out cyberespionage, and spreading propaganda. However, there is a growing question about whether these cyberattacks could be considered war crimes, particularly when they are directly tied to civilian atrocities. In a recent episode of the Safe Mode podcast, Victor Zhora, the deputy chairman of the State Service of Special Communications and Information Protection of Ukraine, explores this question and many other facets of the ongoing war in Ukraine.
The Role of Cyber in the Conflict
Zhora explains that the war in Ukraine has seen a range of cyberattacks, including influence operations, data collection, and destructive operations. These cyberattacks are often coordinated with kinetic attacks on critical infrastructure, such as missile strikes on regions and simultaneous attacks on local internet service providers. One example cited is an attack on a private energy company’s network infrastructure, followed by missile strikes on their thermal power plants. Zhora emphasizes that all of these cyberattacks are coordinated and associated with Russian state actors or state-sponsored groups.
Support from the U.S. and Western Companies
Zhora acknowledges the support Ukraine has received from the U.S. and Western companies in defending against Russian cyberattacks. This support includes software, hardware, cloud infrastructures, consultancy, and threat intelligence. Zhora calls for a broader coalition to be formed to deal with Russian aggression and emphasizes the need for more resources to enhance cyber resilience in Ukraine. He also highlights the importance of information sharing and cooperation between countries to identify and hold responsible those behind the cyberattacks.
Defining Cyberwar Crimes and Holding Perpetrators Accountable
Zhora proposes the concept of cyberwar crimes and suggests that cyberattacks directly tied to civilian casualties or impacting critical infrastructure could be considered war crimes. He emphasizes the need for a discussion among lawyers, prosecutors, and governments to clearly identify the criteria for these crimes. Zhora also mentions that Ukraine is working on identifying cases that could be considered cyberwar crimes and collecting evidence to be sent to the International Criminal Court. He believes that this could be an effective way of bringing the perpetrators to justice.
Concerns for the Future
Zhora expresses concerns about the aggressor’s tactics of targeting service providers and supply chains to gain access and bring more impact to Ukraine‘s infrastructure. He emphasizes the need to maintain stability in cyberspace, particularly in the energy sector, while the counter offensive continues. Zhora concludes by expressing optimism that Ukraine will ultimately prevail in the war, despite the ongoing challenges.
Editorial
The ongoing war in Ukraine has seen a significant escalation in cyberattacks, with Russian hackers targeting various aspects of Ukraine‘s infrastructure. The question of whether these cyberattacks can be considered war crimes is a complex and novel one. While there is no precedent for prosecuting digital war crimes, it is important to have discussions among legal experts, prosecutors, governments, and international bodies like the International Criminal Court to define the criteria for such crimes.
This discussion is crucial in holding the perpetrators accountable and establishing a clear framework for addressing cyber aggression in future conflicts. The support Ukraine has received from the U.S. and Western companies in defending against these cyberattacks is commendable. However, more resources and collaboration are needed to enhance Ukraine‘s cyber resilience and prevent future cyber incidents.
The formation of a broader coalition to address Russian cyber aggression is essential. This coalition should include states with responsible behavior in cyberspace, united in the goal of stopping Russian cyberattacks and holding those responsible accountable. Limiting the access of the aggressor to technologies and identifying the exact individuals behind these attacks are important steps towards addressing cyberwar crimes.
In conclusion, the war in Ukraine has highlighted the need for a comprehensive approach to cybersecurity. As digital attacks become increasingly prevalent in conflicts, the international community must adapt and establish legal frameworks to address cyberwar crimes. Only through collective efforts can we effectively combat cyber aggression and protect civilian populations.
Advice
In light of the escalating cyber conflict in Ukraine, it is crucial for individuals, organizations, and governments to prioritize cybersecurity measures. Some key recommendations include:
1. Invest in cybersecurity infrastructure and capabilities to protect critical information systems and networks.
2. Stay informed about the latest cyber threats and vulnerabilities in order to proactively mitigate risks.
3. Collaborate with international partners and cybersecurity experts to share threat intelligence and best practices.
4. Support initiatives that aim to hold perpetrators of cyberwar crimes accountable, such as advocating for international legal frameworks.
5. Promote ethical hacking and responsible cybersecurity practices to ensure a strong defense against cyberattacks.
6. Encourage governments and international bodies to provide assistance and resources to countries facing cyber aggression.
By implementing these measures and fostering international collaboration, we can enhance cyber resilience and deter future cyber conflicts.
<< photo by Roman Synkevych >>
The image is for illustrative purposes only and does not depict the actual situation.
You might want to read !
- The Urgent Need to Address Software Supply Chain Security: Insights from OWASP
- “Safeguarding Data Integrity: SAP’s Swift Response to PowerDesigner Vulnerability”
- Why Policy-Making Should Take the Driver’s Seat in the AI Journey
- The Rise of RedHotel: China’s Dominant Cyberspy Group
- Russian Hackers’ New Tactics: Shifting from Disruption to Subversion
- Microsoft Unveils Russian Hackers’ Sophisticated Phishing Techniques on Microsoft Teams
- The Rise of DDoSia: Exploring the Rapid Growth of a Russian Hacktivist Platform
- CISA Raises Concerns About UEFI Security in Exclusive Report
- The Shapeshifting Tactics of Russian APT ‘BlueCharlie’: Evading Detection Through Infrastructure Swaps
- The Cyber Frontier: How North Korea’s Espionage Breach Puts Russian Rocket Bureau at Risk
- Is Automated Pentesting the Future of Cybersecurity?
- UK Think Tank Calls for Increased Ransomware Reporting to Strengthen Cyberinsurance Governance
- Microsoft Empowers AI Red Teams with Guidance and Resources
- “Wall Street’s Crocodile Duo Admit to Massive Cryptocurrency Corruption”
- “The Sinister Scales of Wall Street: Unveiling the Guilty Pleas in Massive Cryptocurrency Scandal”
- Critical Cybersecurity Agencies Unite to Expose the Top Exploited Vulnerabilities of 2022
- Major Security Flaw Exposes Widespread Vulnerabilities in Milesight Industrial Router