IT Pro is supported by its audience. When you purchase through links on our site, we may earn an affiliate commission. Learn more

National security leaders fear Ukraine conflict could inform a 'blueprint' for cyber war

Learning from the successes and failures of the ongoing conflict could help foreign adversaries carry out more effective cyber attacks in the future, according to one national cyber security chief

ICC building in Newport - the venue for CYBERUK 2022

Leaders of national cyber security agencies addressed CYBERUK 2022 today, telling of the most remarkable learnings from the war between Russia and Ukraine, with one fearing that it could inform a blueprint for cyber warfare in the future. 

“We all understood that [the war in Ukraine] was going to be the first exercise and integration of cyber [attacks] with kinetic effects,” said Abigail Bradshaw, head of the Australian Cyber Security Centre (ACSC). “Our concern was that others would be watching this playbook for the purpose of learning from its highs and lows, and fine-tuning that."

Asked what he would take away from observing the war in Ukraine from the perspective of cyber warfare strategy, Paul Chichester, director of operations at the UK’s National Cyber Security Centre (NCSC), said the key theme is resilience and getting the basics right.

“Resilience is the answer, and you can see, the Russians have been making the Ukrainians match fit for the last six years,” he said. “So through that lens, if you look at the amazing work the Ukrainians have done and the support they've had, I think that's played into it as well.

“If you really focus on the basics, and you focus on the resilience side, and you build your defences, and you focus more on yourself and less than your adversary, actually, that plays much to your favour, when perhaps you find yourself faced with that conflict. I think, very much, resilience is the line that we would draw from this.”

GCHQ director Sir Jeremy Fleming opened proceedings with a speech partially themed around the conflict in Ukraine and said the so-called cyber war that the industry expected to break out was somewhat “overblown”.

However, Sir Jeremy said there was still abroad range of activity that has taken place in the region and Ukraine’s cyber security capabilities were highly effective in stifling Russia’s attempts in cyber space.

Related Resource

Security awareness training strategies for account takeover protection

Why you need an inside-the-perimeter strategy for internal threats

Security awareness training strategies for account takeover protection - whitepaper from MimecastFree download

The NCSC “has seen what looks like” activity that has spilt over into other countries as Russian operatives continue to target those who oppose its actions.

Later in the day, news broke that the UK officially attributed the cyber attacks on Ukraine in the early stages of the invasion - the attacks on government websites and on Viasat - to Russia.

Lindy Cameron, CEO at the NCSC, told members of the press that this is a prime example of the spillover from cyber attacks Sir Jeremy alluded to earlier in the day. 

Fears of spillover effects of cyber attacks were first voiced by the NCSC earlier this year. There is a historical precedent for Russian-linked cyber attacks directed at Ukraine impacting the wider Western world. 

The NotPetya attack in 2017, for example, crippled systems not only in Ukraine but wider into the West and even some reported cases in Russia too.

Cameron also said the level of spillover is not as significant as that seen in the 2017 malware attacks.

“This is the clearest example we've seen so far of [spillover] happening and therefore reinforcing our messages about the importance of raising resilience,” she said.

The unprecedented rise in hacktivism was another notable takeaway for the experts addressing delegates, with both Cameron and Juhan Lepassaar, executive director at ENISA, saying the activity by the likes of the IT Army of Ukraine was “a concern”.

Given that hacktivism is still hacking - a crime - Cameron said “we would like to see people sticking to the rules, but it’s understandable."

Featured Resources

Activation playbook: Deliver data that powers impactful, game-changing campaigns

Bringing together data and technology to drive better business outcomes

Free Download

In unpredictable times, a data strategy is key

Data processes are crucial to guide decisions and drive business growth

Free Download

Achieving resiliency with Everything-as-a-Service (XAAS)

Transforming the enterprise IT landscape

Free Download

What is contextual analytics?

Creating more customer value in HR software applications

Free Download

Recommended

What is cyber warfare?
Security

What is cyber warfare?

20 May 2022
Hackers could use new Wslink malware in highly targeted cyber attacks
malware

Hackers could use new Wslink malware in highly targeted cyber attacks

1 Nov 2021
FBI raids Chinese POS business following cyber attack claims
malware

FBI raids Chinese POS business following cyber attack claims

27 Oct 2021
Malware developers create malformed code signatures to avoid detection
malware

Malware developers create malformed code signatures to avoid detection

24 Sep 2021

Most Popular

16 ways to speed up your laptop
Laptops

16 ways to speed up your laptop

13 May 2022
Preparing for the 3G sunset
Network & Internet

Preparing for the 3G sunset

18 May 2022
(ISC)2 launches free scheme to get 100,000 UK citizens into cyber security
Careers & training

(ISC)2 launches free scheme to get 100,000 UK citizens into cyber security

17 May 2022