Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5

Why haven't Russia's cyberattacks been more devastating? (Ukraine community)

#1
C C Offline
https://www.newyorker.com/news/daily-com...ooms-large

EXCERPTS: . . . Ukraine was second only to the U.S. in the number of cyberattacks it had experienced over the past year. Given this history, it stood to reason that future Russian incursions in Ukraine would likely involve cyber weapons. [...] the fact that devastating attacks haven’t occurred so far has raised doubts in some quarters about the viability and efficacy of using malicious software as a weapon of war.

There are many theories floating around as to why the Russians didn’t go all-out and take down Ukraine’s cellular networks, electric grid, municipal water supplies, and other crucial utilities, either in the run-up to war or in its first days. It may be that the Kremlin, high on its own propaganda, believed that the Russian army would conquer Ukraine in record time and install a puppet government that would need to have those services intact.

When that didn’t happen and the Russians began bombing cities, it made cyber weapons that could turn off the lights, say, largely beside the point [...] “If you’re already at a stage in a conflict where you’re willing to drop bombs, you’re going to drop bombs,” Jacquelyn Schneider ... told me. In other words, bombs are blunter, more peremptory instruments.

But it also may be that Russia never had the capabilities that its adversaries ascribed to it in the first place: unlike conventional weapons, which can be counted, cyber weapons are invisible until they are deployed, making it impossible for outsiders to assess the size and power of a nation’s cyber arsenal. Or it may be that the Russian generals prosecuting the war were skeptical of relying on weapons composed of zeros and ones.

Or that the Russians tried to replicate their earlier attacks but that Ukraine’s digital defenses, which are much stronger now, successfully fended them off. [...] After the 2017 cyberattack, Ukraine, with help from its allies, fortified its computer networks.

[...] something that has largely been lost in the musings about Russia’s failure ... to use cyber weapons to crippling effect in the war: Ukraine has actually been under a constant barrage of cyberattacks that began before the invasion. [...] Perhaps most crucial, on the morning of the invasion, hackers jammed the satellite signal that delivered broadband satellite Internet services to much of Ukraine and other parts of Europe ... The service has not been fully restored...

[...] In retrospect, it seems possible that the attack on Viasat was actually Russia’s opening gambit—a cyberattack intended to compromise Ukraine’s command-and-control systems—but was only marginally successful. Then, while the world was waiting for Russia to turn off the lights in Ukraine, the Kremlin was, instead, engaging in more targeted and strategic attacks.

Still, Russia might do something more comprehensive and destructive going forward. A cyber weapon can only be launched once; it is possible that the Kremlin is holding its most powerful malware in reserve. As Burt told me, although Russia’s cyber activity has not caused mass destruction, “it does not in any way reduce the risk that more aggressive and destructive attacks could be deployed in the future inside or outside Ukraine.” (MORE - missing details)
Reply
#2
stryder Offline
(Mar 23, 2022 06:12 AM)C C Wrote: https://www.newyorker.com/news/daily-com...ooms-large

EXCERPTS: . . . Ukraine was second only to the U.S. in the number of cyberattacks it had experienced over the past year. Given this history, it stood to reason that future Russian incursions in Ukraine would likely involve cyber weapons. [...] the fact that devastating attacks haven’t occurred so far has raised doubts in some quarters about the viability and efficacy of using malicious software as a weapon of war.

There are many theories floating around as to why the Russians didn’t go all-out and take down Ukraine’s cellular networks, electric grid, municipal water supplies, and other crucial utilities, either in the run-up to war or in its first days. It may be that the Kremlin, high on its own propaganda, believed that the Russian army would conquer Ukraine in record time and install a puppet government that would need to have those services intact.

When that didn’t happen and the Russians began bombing cities, it made cyber weapons that could turn off the lights, say, largely beside the point [...] “If you’re already at a stage in a conflict where you’re willing to drop bombs, you’re going to drop bombs,” Jacquelyn Schneider ... told me. In other words, bombs are blunter, more peremptory instruments.

But it also may be that Russia never had the capabilities that its adversaries ascribed to it in the first place: unlike conventional weapons, which can be counted, cyber weapons are invisible until they are deployed, making it impossible for outsiders to assess the size and power of a nation’s cyber arsenal. Or it may be that the Russian generals prosecuting the war were skeptical of relying on weapons composed of zeros and ones.

Or that the Russians tried to replicate their earlier attacks but that Ukraine’s digital defenses, which are much stronger now, successfully fended them off. [...] After the 2017 cyberattack, Ukraine, with help from its allies, fortified its computer networks.

[...] something that has largely been lost in the musings about Russia’s failure ... to use cyber weapons to crippling effect in the war: Ukraine has actually been under a constant barrage of cyberattacks that began before the invasion. [...] Perhaps most crucial, on the morning of the invasion, hackers jammed the satellite signal that delivered broadband satellite Internet services to much of Ukraine and other parts of Europe ... The service has not been fully restored...

[...] In retrospect, it seems possible that the attack on Viasat was actually Russia’s opening gambit—a cyberattack intended to compromise Ukraine’s command-and-control systems—but was only marginally successful. Then, while the world was waiting for Russia to turn off the lights in Ukraine, the Kremlin was, instead, engaging in more targeted and strategic attacks.

Still, Russia might do something more comprehensive and destructive going forward. A cyber weapon can only be launched once; it is possible that the Kremlin is holding its most powerful malware in reserve. As Burt told me, although Russia’s cyber activity has not caused mass destruction, “it does not in any way reduce the risk that more aggressive and destructive attacks could be deployed in the future inside or outside Ukraine.” (MORE - missing details)
Any decent attack requires planning. 

A script-kidding can "borrow" various programs and scripts from people if they know what they are attempting to aim at and launch something quickly, however without planning it would likely fail (Not to forget to mention that those "borrowed" programs likely have backdoors that the people "borrowed" from can access.  No honour amongst thieves borrowers.)

This means that if an attack is done on a network, the network has to be probed and understood before hand.  That means years of information has to be collected, this would of likely been done by various bots/scrappers.  It then requires getting all that data together and trying to piece together what it is you are looking at, it's a bit like six blind men describing and elephant, all that data might be like jigsaw pieces but their snapshots are taken at different intervals and while the front of the code might look the same the very architecture that it relies upon can be altered over time, with alterations caused by software/hardware updates and various configuration changes.

An attack also is only effective if it has a network to attack.  It's one of the main things I use to mention to some would-be's back in the day. 

Quote:"Don't pee in the pool, as nobody will want to swim and it will lead to shutting the pool down."

In otherwords leaving an intacted network doesn't mean that they haven't spliced into it and are listening to it, feeding it false information or attempting to use it with cyber-attacks. In fact it might even be the reason that they were refraining from using that network for communications in the firstplace (There were mentions of them using older analogue technologies with little to no encryption early on).

For instance a hack of a IP camera could allow a view point of somewhere that is being targetted, the camera could be used as a range finder if they have an exact position or identify people that can be snatched. It's known that a large number of those commercially viable security devices could easily be hacked for stalking, let alone coordinating attacks.

Personally I'd be more concerned that a Russian attack actually gets launch through Indian and Chinese networks, since they have far more machines available for botnetting. (Either through misconfiguration, old software or purposely being set for that task, such as bitcoining)
Reply


Possibly Related Threads…
Thread Author Replies Views Last Post
  Article The English traitors fighting for Russia in Ukraine (Putin community) C C 2 47 Mar 27, 2024 01:55 PM
Last Post: Zinjanthropos
  Elon Musk says SpaceX can’t afford to continue to pay for Starlink in Ukraine C C 6 235 Oct 15, 2022 09:01 PM
Last Post: Magical Realist
  Nukes might’ve been on destroyed Russian warship (Twitter community) C C 0 56 Apr 16, 2022 10:33 PM
Last Post: C C
  'Dark Watchers' have been spooking hikers for centuries (California community) C C 0 116 Mar 16, 2021 08:05 AM
Last Post: C C



Users browsing this thread: 1 Guest(s)