Trending News
Home / Cyber / Intensified cyber warfare actvities erupted amid growing tensions between Governments

Intensified cyber warfare actvities erupted amid growing tensions between Governments

Russia has sent more than 100,000 soldiers to the nation’s border with Ukraine, threatening a war unlike anything Europe has seen in decades. Though there hasn’t been any shooting yet, cyber operations are already underway.

In Jan 2022, hackers defaced dozens of government websites in Ukraine, a technically simple but attention-grabbing act that generated global headlines. More quietly, they also placed destructive malware inside Ukrainian government agencies, an operation first discovered by researchers at Microsoft. It’s not clear yet who is responsible, but Russia is the leading suspect.

 

But while Ukraine continues to feel the brunt of Russia’s attacks, government and cybersecurity experts are worried that these hacking offensives could spill out globally, threatening Europe, the United States, and beyond.

 

Moscow’s seizure of the Crimea Peninsula, perceived Russian military support of separatist rebels in eastern Ukraine, Western retaliation by imposing sanctions on Russian interests has resulted in heightened tensions between Washington and Moscow, with their relations reaching at their lowest point since decades. The recent reports also cite intensified cyber warfare activities against each other which have been going on since last decade. In Russia, the battery of economic sanctions has incentivized cyber espionage activities to steal the information of pharmaceutical, defense, aviation, and petroleum companies.

 

June 13th 2021, Carbis Bay, Cornwall: G7 Leaders demand that the Russian government takes action against people conducting cyber-attacks against western interests from within its borders. Moscow must stop its ‘destabilising behaviour and malign activities’, the joint missive reads. Two weeks before G7, a White House press briefing suggested that President Biden hadn’t ruled out taking retaliatory action against Russia, for alleged state-sponsored cyber attacks on US industry. This came after hackers (apparently based in Russia) got into the computer networks of meat packing firm JBS, and Colonial Pipeline, which supplies gasoline from Texas to New Jersey. The hackers threatened to cause disruption or delete files unless a ransom in cryptocurrency was paid. JBS subsequently paid out $11m to protect its systems, Colonial $4.4m.

 

President Putin has denied all such criticisms of his government, calling Western accusations ridiculous and absurd. Russian officials have also accused the USA of interfering in governmental processes around the world and carrying out cyber attacks in Russia and Iran.

 

In 2014, Computer security firm Symantec has discovered computer malware, called “Regin”, probably run by a western intelligence agency deployed against internet service providers and telecoms companies, mainly in Russia and Saudi Arabia as well as Mexico, Ireland and Iran. The malware has the ability to steal passwords, monitor Internet traffic and recover deleted files once it is installed, the security research firm said. The malware is in some respects is more advanced in engineering terms than Stuxnet, which was developed by US and Israel government hackers in 2010 to destroy one-fifth of Iran’s centrifuges for Uranium purification.

 

Cyberwarfare is emerging as the next frontier of war. The states target the enemy’s energy sources, electricity grids, health systems, traffic control systems, water supplies, communications and sensors through cyber warfare. For instance, the cybersecurity systems of Ukraine and Iran came under attack recently.

 

A new joint effort by NATO members, the European Union, Australia, New Zealand and Japan will call out and confront the threat posed by Chinese state-sponsored cyberattacks. The nations will share intelligence on cyberthreats and collaborate on network defenses and security, said a senior Biden administration official. The group will publicly blame China’s Ministry of State Security for a massive cyberattack on Microsoft Exchange email servers earlier this year. The brazen Microsoft Exchange server attack became public in March and is believed to have hit at least 30,000 American organizations and hundreds of thousands more worldwide. In July 2021, the FBI, National Security Agency and Cybersecurity and Infrastructure Security Agency released a new advisory listing 50 tactics, techniques and procedures that Chinese state-sponsored hackers employ.

 

For now, the multinational cybersecurity effort is focused on cooperative security and threat alerts, and not on retaliation. The White House has raised the Microsoft attacks with senior members of the Chinese government, “making clear that the [People’s Republic of China] actions threaten security, confidence, and stability in cyberspace,” said the senior official.

 

Military tensions have increased over the past year between China and rival powers including the United States and India, with flashpoints like the Himalayan border, Taiwan and the South China Sea. China’s military budget — the second largest in the world after the US, though still less than a third of Washington’s — is set to increase by 6.8 percent in 2021, the finance ministry announced in March.

 

The attack on India’s power grid was along similar lines. 2021 report by the cybersecurity company Recorded Future describes a sophisticated cyber campaign by Chinese agents aimed at Indian targets. The report outlines how a Chinese state-supported group – dubbed Red Echo – managed to install malware in India’s critical civilian infrastructure, including electric power organizations, seaports, and railways. Recorded Future’s report is clear in their conclusion that Red Echo’s cyber intrusions are directly linked to the Sino-Indian conflict along the mountainous northern border. Rather than targeting military infrastructure, the Chinese attackers deliberately chose to strike civilian infrastructure.

 

Engaging in cyber warfare makes it less risky for nations to attack each other, if risk is counted in terms of loss of life and physical damage to buildings and infrastructure, that is. “It’s the cheapest and easiest form of warfare ever,” says Professor Steve Andriole, an expert in business technology from Villanova University in the USA.

 

To date, at least according to the information publicly available, India has not responded to these attacks. A retaliatory, offensive cyber campaign targeting Chinese critical civilian infrastructure could set off a tit-for-tat sequence of events and fuel an escalation spiral in the cyber domain and beyond.

 

 

About Rajesh Uppal

Check Also

India looks for collaborations to counter growing Chinese threat in Indian Ocean

The IOR is the region around the Indian Ocean. It includes the 22 member nations …

One comment

  1. Fantastic goods from you, man. I’ve remember your stuff previous to and you’re simply
    extremely great. I actually like what you’ve bought right here,
    really like what you are saying and the way in which you are saying it.
    You make it entertaining and you continue to care for to keep it wise.
    I can’t wait to learn much more from you. That is actually a terrific website.

Leave a Reply

Your email address will not be published. Required fields are marked *

error: Content is protected !!