The Russia-Ukraine War: An Exploratory Study into the Potential Impact of Cyber Warfare on Asymmetric War Efforts
DOI:
https://doi.org/10.25159/2663-6689/15567Keywords:
cyber warefare, combatant, asymmetric warefare, kinetic warfare, malwareAbstract
Purpose: The war in Ukraine brought attention to “new” tactics on the battlefield—namely cyber warfare. It is attracting increased attention from media and civilians, enabling civilians from countries outside of Ukraine to help fight for Ukraine. The impact of cyber warfare on kinetic war efforts is not well understood.
Methodology: Secondary data were collected, which included verified reports of cyber interventions in support of either party to the Russian-Ukraine war. Various cyber interventions are discussed in terms of the type of intervention, modus operandi, and potential effect. All data have been published in English by credible sources. The effect of cyber interventions will be analysed to determine their potential impact on states that are party to an asymmetrical war.
Findings: Cyber warfare can potentially act as a force multiplier in kinetic efforts through actionable intelligence collected. Currently, the effect of cyber warfare seems to be negligible, as neither party to the Russian-Ukraine war effort has achieved its political ideologies. In fact, the use of drones has brought about an escalation in violence.
Implications: A better understanding of cyber interventions and more effective application of these in a kinetic war could potentially aid a nation-state in achieving its ideological objectives faster, thereby reducing the intensity of the negative socioeconomic impact on nation-states not party to the conflict. Current scholarly debates about cyber warfare view the impact of cyber interventions in a kinetic effort as negligible. This article will point to a linchpin that could change the current opinion of scholars.
References
Aljazeera. 2024. “Russia-Ukraine War: List of Key Events, Day 920. September 2.” Accessed September 2, 2024. https://www.aljazeera.com/news/2024/9/2/russia-ukraine-war-list-of-key-events-day-920
Aljohani, Tawfiq M. 2024. “Cyberattacks on Energy Infrastructure as Modern War Weapons Part 1: Analysis and Motives.” IEEE Technology and Society Magazine, June 19: 59–69. https://doi.org/10.1109/MTS.2024.3395688 DOI: https://doi.org/10.1109/MTS.2024.3395688
Avast. 2022. “Avast Q1/2022 Threat Report: Cyber Warfare in Ukraine and Russia Dominates the Threat Landscape.” Accessed July 21, 2022. https://press.avast.com/avast-q1/2022-threat-report-cyber-warfare-in-ukraine-and-russia-dominates-the-threat-landscape
Avast Threat Research Team. 2022. “Help for Ukraine: Free Descriptor for Hermetic Ransom Ransomware.” Accessed November 3, 2022. https://decoded.avast.io/threatresearch/help-for-ukraine-free-decryptor-for-hermeticransom-ransomware/
Bäcker, Roman, and Joanna Rak. 2022. “Why Did Putin Go too far? The Rationality of Vladimir Putin’s decision to begin a war with Ukraine.” Society Register, 57–71. https://doi.org/10.14746/sr.2022.6.3.04 DOI: https://doi.org/10.14746/sr.2022.6.3.04
BBC. 2022a. “Ukraine Conflict: The Women Making Molotov Cocktails to Defend their City.” Accessed June 10, 2022. https://www.bbc.com/news/av/world-europe-60540341.
BBC. 2022b. “Ukraine Conflict: What we Know about the Invasion.” Accessed April 8, 2022. https://www.bbc.com/news/world-europe-60504334
Belton, Catherine. 2022. “Russia Will Stop ‘in a Moment’ if Ukraine Meets Terms—Kremlin.” Accessed January 16, 2023. https://www.reuters.com/world/kremlin-says-russian-military-action-will-stop-moment-if-ukraine-meets-2022-03-07/
Borger, Julian. 2022. “Russia Deploys up to 20,000 Mercenaries in Battle for Ukraine’s Donbas Region.” Accessed June 13, 2022. https://www.theguardian.com/world/2022/apr/19/russia-deployed-20000-mercenaries-ukraine-donbas-region#:~:text=Russia%20deploys%20up%20to%2020%2C000%20mercenaries%20in%20battle%20for%20Ukraine’s%20Donbas%20region,-This%20article%20is&text=Russia%20has%20de
Brantly, Aaron F. 2016. “The Decision to Attack: Military and Intelligence Cyber Decision-Making. Athens: University of Georgia Press.” https://doi.org/10.1353/book45365 DOI: https://doi.org/10.1353/book45365
Brathwaite, Kirstin J. H. 2018. “Effective in Battle: Conceptualizing Soldiers’ Combat.” Defence Studies, 1–18. https://doi.org/10.1080/14702436.2018.1425090 DOI: https://doi.org/10.1080/14702436.2018.1425090
CERT-UA. 2022. “Cyber Attack of the Sandworm Group (UAC-0082) on Energy Facilities of Ukraine Using Malware Industroyer2 and CaddyWiper (CERT-UA#4435).” Accessed September 2, 2022. https://cert.gov.ua/article/39518.
Chahal, Jasmeen K., Abhinav Bhandari, and Sunny Behal. 2019. “Distributed Denial of Service Attacks: A Threat or Challenge.” New Review of Information Networking 24 (1): 31–103. https://doi.org/10.1080/13614576.2019.1611468 DOI: https://doi.org/10.1080/13614576.2019.1611468
Chin, Christopher H., Nicholas P. Schaeffer, Christopher J. Parker, and Joseph O. Janke. 2023. “When Dragons Watch Bears. Information Warfare Trends and Implications for the Joint Force.” Joint Forces Quarterly (109): 63–73.
Clark, David H., and William Reed. 2003. “A Unified Model of War Onset and Outcome.” The Journal of Politics 65 (1): 69–91. https://doi.org/10.1111/1468-2508.t01-1-00004 DOI: https://doi.org/10.1111/1468-2508.t01-1-00004
Clarke, Richard A., and Robert Knake. 2010. Cyber War. HarperCollins.
Council on Foreign Relations. 2022a. “Targeting of Moscow Stock Exchange and Sberbank Websites.” Accessed August 5, 2022. https://www.cfr.org/cyber-operations/targeting-moscow-stock-exchange-and-sberbank-websites
Council on Foreign Relations. 2022b. “Ukrainian IT-Army.” Accessed August 5, 2022. https://www.cfr.org/cyber-operations/ukrainian-it-army#:~:text=The%20Ukrainian%20IT%20Army%20is,target%20Russian%20infrastructure%20and%20websites
Cybersecurity and Infrastructure Security Agency. 2022a. “AA22-057A.” Accessed September 2 and November 3, 2022. https://www.cisa.gov/uscert/ncas/alerts/aa22-057a
Cybersecurity and Infrastructure Security Agency. 2022b. “AR22-115C.” Accessed September 2 and November 3, 2022. https://www.cisa.gov/uscert/ncas/analysis-reports/ar22-115c
Dasari, Kishorebabu, Srinivas Mekala, and Jhansi Rani Kaka. 2024. “Evaluation of UDP-Based DDoS Attack Detection by Neural Network Classifier with Convex Optimization and Activation Functions.” Ingénierie des Systèmes d’Information, 1031–1042. https://doi.org/10.18280/isi.290321 DOI: https://doi.org/10.18280/isi.290321
Disbalancer. 2022. “Disbalancer UA.” Accessed September 2, 2022. https://disbalancer.com/
ESET Research. 2022. “Industroyer2: Industroyer Reloaded.” Accessed November 3, 2022. https://www.welivesecurity.com/2022/04/12/industroyer2-industroyer-reloaded/
FortiGuard. 2022. “Industroyer2 Discovered Attacking Critical Ukrainian Verticals.” Accessed September 2, 2022. https://www.fortiguard.com/threat-signal-report/4494/industroyer2-discovered-attacking-critical-ukrainian-verticals
FortiGuard Labs. 2022. “HermeticWiper Malware.” Accessed September 2, 2022. https://www.fortiguard.com/outbreak-alert/hermeticwiper-malware#:~:text=A%20destructive%20malware%20known%20as,used%20against%20organizations%20in%20Ukraine.&text=Malware%20actors%20have%20deployed%20destructive,unprovoked%20Russian%20attack%20against%20U
Green, James A. 2015. Cyber Warfare: A Multidisciplinary Analysis. Oxon: Routledge. https://doi.org/10.4324/9781315761565 DOI: https://doi.org/10.4324/9781315761565
International Committee of the Red Cross. n.d. “Cyber Warfare.” Accessed July 7, 2022. https://casebook.icrc.org/a_to_z/glossary/cyber-warfare
IT-Army of Ukraine. 2022. “Instruction.” Accessed September 2, 2022. https://itarmy.com.ua/instruction/?lang=en.
Jha, U. C. 2014. “Cyber Warfare and the Laws of War.” Journal of the United Service Institution of India CXLIV (595). Accessed September 9, 2024. https://www.usiofindia.org/publication-journal/cyber-warfare-and-the-laws-of-war.html
Johannesson, Jokull, and David Clowes. 2020. “Energy Resources and Markets: Perspectives on the Russia-Ukraine War.” European Review. https://doi.org/10.1017/S1062798720001040 DOI: https://doi.org/10.1017/S1062798720001040
Kaspersky. 2022a. “ATT&CK for ICS: Industroyer.” Accessed November 3, 2022. https://www.kaspersky.com/enterprise-security/mitre/industroyer
Kaspersky. 2022b. “Elections GoRansom: A Smoke Screen for the HermeticWiper Attack.” Accessed September 2, 2022. https://securelist.com/elections-goransom-and-hermeticwiper-attack/105960/
Lendon, Brad. 2024. “Ukraine Carries Out One of its Biggest-ever Drone Attacks on Russia.” September 2. Accessed September 2, 2024. https://edition.cnn.com/2024/09/02/europe/ukraine-big-drone-attack-russia-intl-hnk/index.html.
Marples, David R. 2004. The Collapse of the Soviet Union, 1985–1991. 1st edition. Harlow: Routledge.
Mehra, Tanya, and Abigail Thorley. 2022. “Foreign Fighters, Foreign Volunteers and Mercenaries in the Ukrainian Armed Conflict.” Accessed November 18, 2022. https://icct.nl/publication/foreign-fighters-volunteers-mercenaries-in-ukraine/
Microsoft Digital Security Unit. 2022. “Special Report: Ukraine. An Overview of Russia’s Activity in Ukraine.” Microsoft. Accessed July 21, 2022. https://query.prod.cms.rt.microsoft.com/cms/api/am/binary/RE4Vwwd
Microsoft. 2022. “DoS:Win32/FoxBlade.A!dha.” Accessed September 2, 2022. https://www.microsoft.com/en-us/wdsi/threats/malware-encyclopedia-description?Name=DoS:Win32/FoxBlade.A!dha
Microsoft Security Response Centre. 2022. “Cyber Threat Activity in Ukraine: Analysis and Resources.” Accessed September 2, 2022. https://msrc-blog.microsoft.com/2022/02/28/analysis-resources-cyber-threat-activity-ukraine/#updated-malware-details
Milov, Vladimir. 2024. “How Strong Is Russian Public Support for the Invasion of Ukraine?” January 9. Accessed August 30, 2024. https://www.atlanticcouncil.org/blogs/ukrainealert/how-strong-is-russian-public-support-for-the-invasion-of-ukraine-2/
Ministry of Digital Transformation of Ukraine. 2022. mincifri-it-armiya-blokuye-rosijski-sajti-za-dekilka-hvilin-golovni-peremogi-ukrayini-na-kiberfronti. Accessed August 5, 2022. https://www.kmu.gov.ua/en/news/mincifri-it-armiya-blokuye-rosijski-sajti-za-dekilka-hvilin-golovni-peremogi-ukrayini-na-kiberfronti
NIST Joint Task Force. 2020. “NIST.SP.800-53r5.” Accessed September 2, 2022. https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r5.pdf
North Atlantic Treaty Organisation. n.d. “NATO on the Map.” Accessed December 7, 2022. https://www.nato.int/nato-on-the-map/#lat=54.388336465780746&lon=5.084606600000003&zoom=0&layer-1
North Atlantic Treaty Organisation. 2024. “Relations with Ukraine. July 19.” Accessed August 30, 2024. https://www.nato.int/cps/en/natohq/topics_37750.htm
Orye, Erwin, and Olaf Maennel. 2019. “Recommendations for Enhancing the Results of Cyber Effects.” 2019 11th International Conference on Cyber Conflict: Silent Battle. Tallinn: NATO CCD COE Publications. https://doi.org/10.23919/CYCON.2019.8756649 DOI: https://doi.org/10.23919/CYCON.2019.8756649
Paganini, Pierluigi. 2022. “DoubleZero-wiper-hit-ukraine.” Accessed September 2, 2022. https://securityaffairs.co/wordpress/129417/malware/doublezero-wiper-hit-ukraine.html
Qureshi, Waseem A. 2021. “The Ethics of Asymmetric Warfare.” Cardozo International and Comparative Law Review V (1): 233–273. Accessed August 14, 2024. https://search-ebscohost-com.ezproxy.iielearn.ac.za/login.aspx?direct=true&db=asn&AN=162716633&site=ehost-live&scope=site
Regan, Joseph, and Ivan Belcic. 2022. “What-is-malware#topic-4.” Accessed September 2, 2022. https://www.avg.com/en/signal/what-is-malware#topic-4
Revay, Gergely. 2022. “An Overview of the Increasing Wiper Malware Threat.” Accessed November 18, 2022. https://www.fortinet.com/blog/threat-research/the-increasing-wiper-malware-threat
Rubel, Mohammad, and Sazzad M Hossain. 2022. “Analyze the Causes of the Russian-Ukraine War with Waltz’s Three Images (Individual, Domestic Politics, International System).” Journal of Social Science III (5): 1113–1121. https://doi.org/10.46799/jss.v3i5.407 DOI: https://doi.org/10.46799/jss.v3i5.407
Schectman, Joel, Christopher Bing, and James Pearson. 2022. “Ukrainian Cyber Resistance Group Targets Russian Power Grid, Railways.” Accessed August 5, 2022. https://www.reuters.com/technology/ukrainian-cyber-resistance-group-targets-russian-power-grid-railways-2022-03-01/
SecureReading. 2022. “DoubleZero Wiper Hits Ukrainian Enterprises.” Accessed November 3, 2022. https://securereading.com/doublezero-wiper-hits-ukrainian-enterprises/
Shinkman, Paul D. 2022. “How Ukraine Survived 6 Months of War and Took the Fight to Russia.” Accessed January 16, 2023. https://www.usnews.com/news/articles/2022-08-26/how-ukraine-survived-6-months-of-war-and-took-the-fight-to-russia
Shore, Jennifer. 2022. “Analysis: Don’t Underestimate Ukraine’s Volunteer Hackers.” Accessed August 19, 2022. https://foreignpolicy.com/2022/04/11/russia-cyberwarfare-us-ukraine-volunteer-hackers-it-army/
Soesanto, Stefan. 2022. “The IT-Army of Ukraine Structure, Tasking, and Ecosystem. June.” Accessed August 19, 2022. https://css.ethz.ch/content/dam/ethz/special-interest/gess/cis/center-for-securities-studies/pdfs/Cyber-Reports-2022-06-IT-Army-of-Ukraine.pdf
Statista. 2022. “Comparison of the Military Capabilities of Russia and Ukraine as of 2022.” Accessed April 11, 2022. https://www.statista.com/statistics/1296573/russia-ukraine-military-comparison/
Stockholm International Peace Research Institute. 2024. SIPRI Military Expenditure Database. Solna. https://doi.org/10.55163/CQGC9685 DOI: https://doi.org/10.55163/CQGC9685
Trebesch, Christoph, Arianna Antezza, Katelyn Bushnell, Pietro Bomprezzi, Yelmurat Dyussimbinov Catharina Chambino, Celina Ferrari, Andre Frank, et al. 2024. “The Ukraine Support Tracker: Which Countries Help Ukraine and how.” Kiel Working Paper, Berlin: Kiel Institute for the World Economy, 1–75. Accessed August 29, 2024. https://www.ifw-kiel.de/publications/ukraine-support-tracker-data-20758/
Uberti, David. 2022. “Volunteer Hackers Join Ukraine’s Fight Against Russia.” Accessed August 5, 2022. https://www.wsj.com/articles/volunteer-hackers-join-ukraines-fight-against-russia-11646082782
Van Brugen, Isabel. 2022. “Kyiv Citizens Asked to Use Molotov Cocktails Against Russian Invaders.” Accessed June 10, 2022. https://www.newsweek.com/kyiv-citizens-asked-use-molotov-cocktails-russian-invasion-obolon-1682596
Zafra, Mariano, Max Hunder, Anurag Rao, and Kiyada Sudev. 2024. “How Drone Combat in Ukraine is Changing Warfare.” March 26. Accessed September 2, 2024. https://www.reuters.com/graphics/ukraine-crisis/drones/dwpkeyjwkpm/
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2024 Unisa PressAccepted 2024-09-13
Published 2024-10-01