The Russia-Ukraine War: An Exploratory Study into the Potential Impact of Cyber Warfare on Asymmetric War Efforts

Authors

DOI:

https://doi.org/10.25159/2663-6689/15567

Keywords:

cyber warefare, combatant, asymmetric warefare, kinetic warfare, malware

Abstract

Purpose: The war in Ukraine brought attention to “new” tactics on the battlefield—namely cyber warfare. It is attracting increased attention from media and civilians, enabling civilians from countries outside of Ukraine to help fight for Ukraine. The impact of cyber warfare on kinetic war efforts is not well understood.

Methodology: Secondary data were collected, which included verified reports of cyber interventions in support of either party to the Russian-Ukraine war. Various cyber interventions are discussed in terms of the type of intervention, modus operandi, and potential effect. All data have been published in English by credible sources. The effect of cyber interventions will be analysed to determine their potential impact on states that are party to an asymmetrical war.

Findings: Cyber warfare can potentially act as a force multiplier in kinetic efforts through actionable intelligence collected. Currently, the effect of cyber warfare seems to be negligible, as neither party to the Russian-Ukraine war effort has achieved its political ideologies. In fact, the use of drones has brought about an escalation in violence.

Implications: A better understanding of cyber interventions and more effective application of these in a kinetic war could potentially aid a nation-state in achieving its ideological objectives faster, thereby reducing the intensity of the negative socioeconomic impact on nation-states not party to the conflict. Current scholarly debates about cyber warfare view the impact of cyber interventions in a kinetic effort as negligible. This article will point to a linchpin that could change the current opinion of scholars.

References

Aljazeera. 2024. “Russia-Ukraine War: List of Key Events, Day 920. September 2.” Accessed September 2, 2024. https://www.aljazeera.com/news/2024/9/2/russia-ukraine-war-list-of-key-events-day-920

Aljohani, Tawfiq M. 2024. “Cyberattacks on Energy Infrastructure as Modern War Weapons Part 1: Analysis and Motives.” IEEE Technology and Society Magazine, June 19: 59–69. https://doi.org/10.1109/MTS.2024.3395688 DOI: https://doi.org/10.1109/MTS.2024.3395688

Avast. 2022. “Avast Q1/2022 Threat Report: Cyber Warfare in Ukraine and Russia Dominates the Threat Landscape.” Accessed July 21, 2022. https://press.avast.com/avast-q1/2022-threat-report-cyber-warfare-in-ukraine-and-russia-dominates-the-threat-landscape

Avast Threat Research Team. 2022. “Help for Ukraine: Free Descriptor for Hermetic Ransom Ransomware.” Accessed November 3, 2022. https://decoded.avast.io/threatresearch/help-for-ukraine-free-decryptor-for-hermeticransom-ransomware/

Bäcker, Roman, and Joanna Rak. 2022. “Why Did Putin Go too far? The Rationality of Vladimir Putin’s decision to begin a war with Ukraine.” Society Register, 57–71. https://doi.org/10.14746/sr.2022.6.3.04 DOI: https://doi.org/10.14746/sr.2022.6.3.04

BBC. 2022a. “Ukraine Conflict: The Women Making Molotov Cocktails to Defend their City.” Accessed June 10, 2022. https://www.bbc.com/news/av/world-europe-60540341.

BBC. 2022b. “Ukraine Conflict: What we Know about the Invasion.” Accessed April 8, 2022. https://www.bbc.com/news/world-europe-60504334

Belton, Catherine. 2022. “Russia Will Stop ‘in a Moment’ if Ukraine Meets Terms—Kremlin.” Accessed January 16, 2023. https://www.reuters.com/world/kremlin-says-russian-military-action-will-stop-moment-if-ukraine-meets-2022-03-07/

Borger, Julian. 2022. “Russia Deploys up to 20,000 Mercenaries in Battle for Ukraine’s Donbas Region.” Accessed June 13, 2022. https://www.theguardian.com/world/2022/apr/19/russia-deployed-20000-mercenaries-ukraine-donbas-region#:~:text=Russia%20deploys%20up%20to%2020%2C000%20mercenaries%20in%20battle%20for%20Ukraine’s%20Donbas%20region,-This%20article%20is&text=Russia%20has%20de

Brantly, Aaron F. 2016. “The Decision to Attack: Military and Intelligence Cyber Decision-Making. Athens: University of Georgia Press.” https://doi.org/10.1353/book45365 DOI: https://doi.org/10.1353/book45365

Brathwaite, Kirstin J. H. 2018. “Effective in Battle: Conceptualizing Soldiers’ Combat.” Defence Studies, 1–18. https://doi.org/10.1080/14702436.2018.1425090 DOI: https://doi.org/10.1080/14702436.2018.1425090

CERT-UA. 2022. “Cyber Attack of the Sandworm Group (UAC-0082) on Energy Facilities of Ukraine Using Malware Industroyer2 and CaddyWiper (CERT-UA#4435).” Accessed September 2, 2022. https://cert.gov.ua/article/39518.

Chahal, Jasmeen K., Abhinav Bhandari, and Sunny Behal. 2019. “Distributed Denial of Service Attacks: A Threat or Challenge.” New Review of Information Networking 24 (1): 31–103. https://doi.org/10.1080/13614576.2019.1611468 DOI: https://doi.org/10.1080/13614576.2019.1611468

Chin, Christopher H., Nicholas P. Schaeffer, Christopher J. Parker, and Joseph O. Janke. 2023. “When Dragons Watch Bears. Information Warfare Trends and Implications for the Joint Force.” Joint Forces Quarterly (109): 63–73.

Clark, David H., and William Reed. 2003. “A Unified Model of War Onset and Outcome.” The Journal of Politics 65 (1): 69–91. https://doi.org/10.1111/1468-2508.t01-1-00004 DOI: https://doi.org/10.1111/1468-2508.t01-1-00004

Clarke, Richard A., and Robert Knake. 2010. Cyber War. HarperCollins.

Council on Foreign Relations. 2022a. “Targeting of Moscow Stock Exchange and Sberbank Websites.” Accessed August 5, 2022. https://www.cfr.org/cyber-operations/targeting-moscow-stock-exchange-and-sberbank-websites

Council on Foreign Relations. 2022b. “Ukrainian IT-Army.” Accessed August 5, 2022. https://www.cfr.org/cyber-operations/ukrainian-it-army#:~:text=The%20Ukrainian%20IT%20Army%20is,target%20Russian%20infrastructure%20and%20websites

Cybersecurity and Infrastructure Security Agency. 2022a. “AA22-057A.” Accessed September 2 and November 3, 2022. https://www.cisa.gov/uscert/ncas/alerts/aa22-057a

Cybersecurity and Infrastructure Security Agency. 2022b. “AR22-115C.” Accessed September 2 and November 3, 2022. https://www.cisa.gov/uscert/ncas/analysis-reports/ar22-115c

Dasari, Kishorebabu, Srinivas Mekala, and Jhansi Rani Kaka. 2024. “Evaluation of UDP-Based DDoS Attack Detection by Neural Network Classifier with Convex Optimization and Activation Functions.” Ingénierie des Systèmes d’Information, 1031–1042. https://doi.org/10.18280/isi.290321 DOI: https://doi.org/10.18280/isi.290321

Disbalancer. 2022. “Disbalancer UA.” Accessed September 2, 2022. https://disbalancer.com/

ESET Research. 2022. “Industroyer2: Industroyer Reloaded.” Accessed November 3, 2022. https://www.welivesecurity.com/2022/04/12/industroyer2-industroyer-reloaded/

FortiGuard. 2022. “Industroyer2 Discovered Attacking Critical Ukrainian Verticals.” Accessed September 2, 2022. https://www.fortiguard.com/threat-signal-report/4494/industroyer2-discovered-attacking-critical-ukrainian-verticals

FortiGuard Labs. 2022. “HermeticWiper Malware.” Accessed September 2, 2022. https://www.fortiguard.com/outbreak-alert/hermeticwiper-malware#:~:text=A%20destructive%20malware%20known%20as,used%20against%20organizations%20in%20Ukraine.&text=Malware%20actors%20have%20deployed%20destructive,unprovoked%20Russian%20attack%20against%20U

Green, James A. 2015. Cyber Warfare: A Multidisciplinary Analysis. Oxon: Routledge. https://doi.org/10.4324/9781315761565 DOI: https://doi.org/10.4324/9781315761565

International Committee of the Red Cross. n.d. “Cyber Warfare.” Accessed July 7, 2022. https://casebook.icrc.org/a_to_z/glossary/cyber-warfare

IT-Army of Ukraine. 2022. “Instruction.” Accessed September 2, 2022. https://itarmy.com.ua/instruction/?lang=en.

Jha, U. C. 2014. “Cyber Warfare and the Laws of War.” Journal of the United Service Institution of India CXLIV (595). Accessed September 9, 2024. https://www.usiofindia.org/publication-journal/cyber-warfare-and-the-laws-of-war.html

Johannesson, Jokull, and David Clowes. 2020. “Energy Resources and Markets: Perspectives on the Russia-Ukraine War.” European Review. https://doi.org/10.1017/S1062798720001040 DOI: https://doi.org/10.1017/S1062798720001040

Kaspersky. 2022a. “ATT&CK for ICS: Industroyer.” Accessed November 3, 2022. https://www.kaspersky.com/enterprise-security/mitre/industroyer

Kaspersky. 2022b. “Elections GoRansom: A Smoke Screen for the HermeticWiper Attack.” Accessed September 2, 2022. https://securelist.com/elections-goransom-and-hermeticwiper-attack/105960/

Lendon, Brad. 2024. “Ukraine Carries Out One of its Biggest-ever Drone Attacks on Russia.” September 2. Accessed September 2, 2024. https://edition.cnn.com/2024/09/02/europe/ukraine-big-drone-attack-russia-intl-hnk/index.html.

Marples, David R. 2004. The Collapse of the Soviet Union, 1985–1991. 1st edition. Harlow: Routledge.

Mehra, Tanya, and Abigail Thorley. 2022. “Foreign Fighters, Foreign Volunteers and Mercenaries in the Ukrainian Armed Conflict.” Accessed November 18, 2022. https://icct.nl/publication/foreign-fighters-volunteers-mercenaries-in-ukraine/

Microsoft Digital Security Unit. 2022. “Special Report: Ukraine. An Overview of Russia’s Activity in Ukraine.” Microsoft. Accessed July 21, 2022. https://query.prod.cms.rt.microsoft.com/cms/api/am/binary/RE4Vwwd

Microsoft. 2022. “DoS:Win32/FoxBlade.A!dha.” Accessed September 2, 2022. https://www.microsoft.com/en-us/wdsi/threats/malware-encyclopedia-description?Name=DoS:Win32/FoxBlade.A!dha

Microsoft Security Response Centre. 2022. “Cyber Threat Activity in Ukraine: Analysis and Resources.” Accessed September 2, 2022. https://msrc-blog.microsoft.com/2022/02/28/analysis-resources-cyber-threat-activity-ukraine/#updated-malware-details

Milov, Vladimir. 2024. “How Strong Is Russian Public Support for the Invasion of Ukraine?” January 9. Accessed August 30, 2024. https://www.atlanticcouncil.org/blogs/ukrainealert/how-strong-is-russian-public-support-for-the-invasion-of-ukraine-2/

Ministry of Digital Transformation of Ukraine. 2022. mincifri-it-armiya-blokuye-rosijski-sajti-za-dekilka-hvilin-golovni-peremogi-ukrayini-na-kiberfronti. Accessed August 5, 2022. https://www.kmu.gov.ua/en/news/mincifri-it-armiya-blokuye-rosijski-sajti-za-dekilka-hvilin-golovni-peremogi-ukrayini-na-kiberfronti

NIST Joint Task Force. 2020. “NIST.SP.800-53r5.” Accessed September 2, 2022. https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r5.pdf

North Atlantic Treaty Organisation. n.d. “NATO on the Map.” Accessed December 7, 2022. https://www.nato.int/nato-on-the-map/#lat=54.388336465780746&lon=5.084606600000003&zoom=0&layer-1

North Atlantic Treaty Organisation. 2024. “Relations with Ukraine. July 19.” Accessed August 30, 2024. https://www.nato.int/cps/en/natohq/topics_37750.htm

Orye, Erwin, and Olaf Maennel. 2019. “Recommendations for Enhancing the Results of Cyber Effects.” 2019 11th International Conference on Cyber Conflict: Silent Battle. Tallinn: NATO CCD COE Publications. https://doi.org/10.23919/CYCON.2019.8756649 DOI: https://doi.org/10.23919/CYCON.2019.8756649

Paganini, Pierluigi. 2022. “DoubleZero-wiper-hit-ukraine.” Accessed September 2, 2022. https://securityaffairs.co/wordpress/129417/malware/doublezero-wiper-hit-ukraine.html

Qureshi, Waseem A. 2021. “The Ethics of Asymmetric Warfare.” Cardozo International and Comparative Law Review V (1): 233–273. Accessed August 14, 2024. https://search-ebscohost-com.ezproxy.iielearn.ac.za/login.aspx?direct=true&db=asn&AN=162716633&site=ehost-live&scope=site

Regan, Joseph, and Ivan Belcic. 2022. “What-is-malware#topic-4.” Accessed September 2, 2022. https://www.avg.com/en/signal/what-is-malware#topic-4

Revay, Gergely. 2022. “An Overview of the Increasing Wiper Malware Threat.” Accessed November 18, 2022. https://www.fortinet.com/blog/threat-research/the-increasing-wiper-malware-threat

Rubel, Mohammad, and Sazzad M Hossain. 2022. “Analyze the Causes of the Russian-Ukraine War with Waltz’s Three Images (Individual, Domestic Politics, International System).” Journal of Social Science III (5): 1113–1121. https://doi.org/10.46799/jss.v3i5.407 DOI: https://doi.org/10.46799/jss.v3i5.407

Schectman, Joel, Christopher Bing, and James Pearson. 2022. “Ukrainian Cyber Resistance Group Targets Russian Power Grid, Railways.” Accessed August 5, 2022. https://www.reuters.com/technology/ukrainian-cyber-resistance-group-targets-russian-power-grid-railways-2022-03-01/

SecureReading. 2022. “DoubleZero Wiper Hits Ukrainian Enterprises.” Accessed November 3, 2022. https://securereading.com/doublezero-wiper-hits-ukrainian-enterprises/

Shinkman, Paul D. 2022. “How Ukraine Survived 6 Months of War and Took the Fight to Russia.” Accessed January 16, 2023. https://www.usnews.com/news/articles/2022-08-26/how-ukraine-survived-6-months-of-war-and-took-the-fight-to-russia

Shore, Jennifer. 2022. “Analysis: Don’t Underestimate Ukraine’s Volunteer Hackers.” Accessed August 19, 2022. https://foreignpolicy.com/2022/04/11/russia-cyberwarfare-us-ukraine-volunteer-hackers-it-army/

Soesanto, Stefan. 2022. “The IT-Army of Ukraine Structure, Tasking, and Ecosystem. June.” Accessed August 19, 2022. https://css.ethz.ch/content/dam/ethz/special-interest/gess/cis/center-for-securities-studies/pdfs/Cyber-Reports-2022-06-IT-Army-of-Ukraine.pdf

Statista. 2022. “Comparison of the Military Capabilities of Russia and Ukraine as of 2022.” Accessed April 11, 2022. https://www.statista.com/statistics/1296573/russia-ukraine-military-comparison/

Stockholm International Peace Research Institute. 2024. SIPRI Military Expenditure Database. Solna. https://doi.org/10.55163/CQGC9685 DOI: https://doi.org/10.55163/CQGC9685

Trebesch, Christoph, Arianna Antezza, Katelyn Bushnell, Pietro Bomprezzi, Yelmurat Dyussimbinov Catharina Chambino, Celina Ferrari, Andre Frank, et al. 2024. “The Ukraine Support Tracker: Which Countries Help Ukraine and how.” Kiel Working Paper, Berlin: Kiel Institute for the World Economy, 1–75. Accessed August 29, 2024. https://www.ifw-kiel.de/publications/ukraine-support-tracker-data-20758/

Uberti, David. 2022. “Volunteer Hackers Join Ukraine’s Fight Against Russia.” Accessed August 5, 2022. https://www.wsj.com/articles/volunteer-hackers-join-ukraines-fight-against-russia-11646082782

Van Brugen, Isabel. 2022. “Kyiv Citizens Asked to Use Molotov Cocktails Against Russian Invaders.” Accessed June 10, 2022. https://www.newsweek.com/kyiv-citizens-asked-use-molotov-cocktails-russian-invasion-obolon-1682596

Zafra, Mariano, Max Hunder, Anurag Rao, and Kiyada Sudev. 2024. “How Drone Combat in Ukraine is Changing Warfare.” March 26. Accessed September 2, 2024. https://www.reuters.com/graphics/ukraine-crisis/drones/dwpkeyjwkpm/

Published

2024-10-01

How to Cite

Snyman, Susan. “The Russia-Ukraine War: An Exploratory Study into the Potential Impact of Cyber Warfare on Asymmetric War Efforts”. Politeia, 19 pages . https://doi.org/10.25159/2663-6689/15567.

Issue

Section

Articles
Received 2023-12-08
Accepted 2024-09-13
Published 2024-10-01