{"id":8643,"date":"2022-03-14T00:00:00","date_gmt":"2022-03-14T00:00:00","guid":{"rendered":"https:\/\/ncjolt.org\/?p=8643"},"modified":"2022-03-14T17:28:31","modified_gmt":"2022-03-14T17:28:31","slug":"the-digital-battleground-of-the-ukraine-russia-war","status":"publish","type":"post","link":"https:\/\/journals.law.unc.edu\/ncjolt\/blogs\/the-digital-battleground-of-the-ukraine-russia-war\/","title":{"rendered":"The Digital Battleground of the Ukraine-Russia War"},"content":{"rendered":"\n<p>Russia\u2019s recent invasion of Ukraine has accentuated contemporary political tensions and drawn commentaries on parallels to past geopolitical <a href=\"https:\/\/www.washingtonpost.com\/national-security\/2022\/03\/09\/ukraine-russia-iron-curtain\/\">disputes<\/a>. One unprecedented facet of the invasion, however, is <a href=\"https:\/\/www.wsj.com\/articles\/the-russia-ukraine-cyberwar-could-outlast-the-shooting-war-11646456442?mod=tech_lead_pos6\">digital warfare<\/a>, an aspect of modern conflict that has yet to coincide with a war of this magnitude and will have significant effects on actors far removed from Eastern Europe, as Russia attackers use Ukraine as a <a href=\"https:\/\/hbr.org\/2022\/03\/what-russias-ongoing-cyberattacks-in-ukraine-suggest-about-the-future-of-cyber-warfare\">testing ground<\/a> for new cyber weapons.&nbsp;&nbsp;<\/p>\n\n\n\n<p>Months before its militants crossed the border into Ukraine, Russia initiated cyberattacks on Ukraine\u2019s digital infrastructure. The source of a cyberattacks can be difficult to accurately attribute, and often the accused source has plausible deniability, with complicated masking techniques protecting attackers\u2019 identities. <a href=\"https:\/\/hbr.org\/2022\/03\/what-russias-ongoing-cyberattacks-in-ukraine-suggest-about-the-future-of-cyber-warfare\">Strong evidence<\/a>, however, has tied Russian hackers to major hacking events across the globe. Over the past <a href=\"https:\/\/www.forbes.com\/sites\/jodywestby\/2020\/12\/20\/russia-has-carried-out-20-years-of-cyber-attacks-that-call-for-international-response\/?sh=4206bded6605\">twenty years<\/a>, Russia has developed into a haven for hackers and cyberattacking groups, many of whom act with state support, and attacks from Russia have become increasingly more sophisticated and malicious.<\/p>\n\n\n\n<p>Ukraine is not blind to Russia\u2019s cyber warfare tactics. Since <a href=\"https:\/\/hbr.org\/2022\/03\/what-russias-ongoing-cyberattacks-in-ukraine-suggest-about-the-future-of-cyber-warfare\">2015<\/a>, shortly after Russia\u2019s initial invasion and successful annexation of Ukraine\u2019s Crimean Peninsula, Russian hackers have been tied to various cyberattacks in Ukraine, with targets including electrical power grids, government agencies, and the national banking system. Now, just before Russia\u2019s current invasion began, Ukraine was targeted with a <a href=\"https:\/\/www.nytimes.com\/2022\/02\/28\/us\/politics\/ukraine-russia-microsoft.html\">never-before-seen<\/a> \u201cwiper\u201d malware designed to wipe data stored at Ukrainian government agencies and financial institutions to erode the country\u2019s ability to communicate and function economically. New versions of \u201cwiper\u201d malware have been discovered since, with each new malware more destructive than the last and even designed to spread additional \u201cwipers\u201d to other vulnerable computers in the country\u2019s network. In 2017, similar malware was responsible for the NotPetya attack attributed to Russia, which caused billions of dollars of damages to major international companies like FedEx, leading <a href=\"https:\/\/www.wsj.com\/articles\/the-russia-ukraine-cyberwar-could-outlast-the-shooting-war-11646456442?mod=tech_lead_pos6\">experts<\/a> to fear another potentially catastrophic attack to occur in Ukraine.<\/p>\n\n\n\n<blockquote class=\"wp-block-quote\"><p>Ukraine is seemingly Russia\u2019s focal target for cyberattacks right now, but global cyberwar is <a href=\"https:\/\/hbr.org\/2022\/03\/what-russias-ongoing-cyberattacks-in-ukraine-suggest-about-the-future-of-cyber-warfare\">likely to spread<\/a>, particularly as Russia faces isolation from the West.<\/p><\/blockquote>\n\n\n\n<p>While the \u201cwiper\u201d malware\u2019s impact has been minimal so far, Russian hackers have also launched \u201c<a href=\"https:\/\/www.wsj.com\/articles\/the-russia-ukraine-cyberwar-could-outlast-the-shooting-war-11646456442?mod=tech_lead_pos6\">denial of service<\/a>\u201d attacks to flood government and banking websites with fake traffic to make them inaccessible to users and government and bank officials. In addition to attempting to hamper activity in Ukraine, all of these devices are designed to <a href=\"https:\/\/www.wsj.com\/articles\/the-russia-ukraine-cyberwar-could-outlast-the-shooting-war-11646456442?mod=tech_lead_pos6\">demoralize<\/a> Ukrainians psychologically, suggesting to Ukrainians that Russia has technological superiority in the conflict and the upper hand in cyberspace.<\/p>\n\n\n\n<p>Ukraine is seemingly Russia\u2019s focal target for cyberattacks right now, but global cyberwar is <a href=\"https:\/\/hbr.org\/2022\/03\/what-russias-ongoing-cyberattacks-in-ukraine-suggest-about-the-future-of-cyber-warfare\">likely to spread<\/a>, particularly as Russia faces isolation from the West due to widespread economic sanctions from the United States and its European allies as they continues to support Ukrainian resistance to the invasion. In the first weeks of Russia\u2019s assault on Ukraine, cyberattacks have <a href=\"https:\/\/www.economist.com\/europe\/2022\/03\/01\/cyber-attacks-on-ukraine-are-conspicuous-by-their-absence\">been more limited and less organized than expected<\/a>, leading to optimism that Russia\u2019s cyber capabilities are not as devastating as previous attacks would suggest. As the conflict persists, however, Russia will continue to be secluded in the global economy, and will be incentivized to develop further cyber weapons in retaliation.<\/p>\n\n\n\n<p>One potential expansion of the Russia-Ukraine cyberwar is Russia targeting crucial Western companies, such as <a href=\"https:\/\/www.wsj.com\/articles\/the-russia-ukraine-cyberwar-could-outlast-the-shooting-war-11646456442?mod=tech_lead_pos6\">Shell<\/a>, that have recently started to pull their operations out of the country. Russia could launch cyberattacks against companies like Shell to dissuade other Western firms from following these companies out of Russia for fear of a similar attack being launched against their own cyber infrastructure. Attacks on oil-and-gas companies are of particular concern to Western countries, especially given the devastating impact of the <a href=\"https:\/\/www.wsj.com\/articles\/fbi-suspects-criminal-group-with-ties-to-eastern-europe-in-pipeline-hack-11620664720?mod=article_inline\">Colonial Pipeline cyberattack<\/a> in 2021. Though that attack was not orchestrated by the Russian state, Russia is capable of similar attacks that could cripple transportation within the borders of the United States and other NATO member countries.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-full is-resized\"><img loading=\"lazy\" src=\"https:\/\/journals.law.unc.edu\\\/ncjolt\/wp-content\/uploads\/sites\/4\/2022\/03\/John-Dean-Image.png\" alt=\"\" class=\"wp-image-8644\" width=\"370\" height=\"277\" srcset=\"https:\/\/journals.law.unc.edu\/ncjolt\/wp-content\/uploads\/sites\/4\/2022\/03\/John-Dean-Image.png 826w, https:\/\/journals.law.unc.edu\/ncjolt\/wp-content\/uploads\/sites\/4\/2022\/03\/John-Dean-Image-300x225.png 300w\" sizes=\"(max-width: 370px) 100vw, 370px\" \/><\/figure><\/div>\n\n\n\n<p>While global cyber warfare may seem unlikely, international actors now have unprecedented digital capabilities that can leave governments and private companies vulnerable, especially given the <a href=\"https:\/\/hbr.org\/2022\/03\/what-russias-ongoing-cyberattacks-in-ukraine-suggest-about-the-future-of-cyber-warfare\">interdependence of crucial infrastructure<\/a>\u2014particularly the connectivity of electricity and communications. Research has shown that, while past cyberattacks have not been as damaging as anticipated, most past attacks were <a href=\"https:\/\/hbr.org\/2022\/03\/what-russias-ongoing-cyberattacks-in-ukraine-suggest-about-the-future-of-cyber-warfare\">likely test runs of cyberweapons<\/a>, and cyberattacks have the potential to be far more devastating to data and physical infrastructure.<\/p>\n\n\n\n<p>Government and private actors must be on high alert to avoid the potentially catastrophic impact of expanded cyber warfare, and collaboration between governments and tech companies can be crucial to resisting attacks. Fortunately, positive steps are being made. In Ukraine, following the release of \u201cwiper\u201d malware, <a href=\"https:\/\/www.nytimes.com\/2022\/02\/28\/us\/politics\/ukraine-russia-microsoft.html\">Microsoft virus detection systems<\/a> were able to erase the malware. The company has since been sharing the details of the code with other European nations in hopes of thwarting other cyberattacks on Russia\u2019s enemies. While only a small stride toward ensuring cyber peace, collaboration like this will be paramount to avoiding global cyber warfare.<\/p>\n\n\n\n<p><strong>John Dean<\/strong><\/p>\n\n\n\n<p>John attended the University of North Carolina at Chapel Hill for college, double majoring in History and Political Science. In law school, John is involved as a staff member for the North Carolina Journal of Law &amp; Technology.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Russia\u2019s recent invasion of Ukraine has accentuated contemporary political tensions and drawn commentaries on parallels to past geopolitical disputes. One unprecedented facet of the invasion, however, is digital warfare, an aspect of modern conflict that has yet to coincide with a war of this magnitude and will have significant effects on actors far removed from <a href=\"https:\/\/journals.law.unc.edu\/ncjolt\/blogs\/the-digital-battleground-of-the-ukraine-russia-war\/\" class=\"more-link\">&#8230;<\/a><\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[51],"tags":[337,299,163,335,338,336],"_links":{"self":[{"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/posts\/8643"}],"collection":[{"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/comments?post=8643"}],"version-history":[{"count":2,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/posts\/8643\/revisions"}],"predecessor-version":[{"id":8647,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/posts\/8643\/revisions\/8647"}],"wp:attachment":[{"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/media?parent=8643"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/categories?post=8643"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/tags?post=8643"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}