“We’ve never seen so many different players come out this way before,” says Adam Meyers, vice president of US cybersecurity firm CrowdStrike.
But when millions of people in city centers are under heavy artillery bombardment, what is the real value of leaked databases and disabled websites? And how much impact has this international “army” really had? It’s hard to say. When the IT Army sends an IP address, the target often goes down બદલે usually earlier. Many Russian sites now operate only within Russia because they reject all foreign connections, defending against international attacks without historical hypotheses on this scale.
But the denial of service attack is technically simple, easily reversible, and far less destructive than the Ukrainian Molotov cocktail, which is aimed at repelling Russian missiles and invading forces attacking city centers.
All of this plays a role in the ongoing information war in both countries and around the world. Russia’s attacks on the Ukrainian government and financial institutions in the days leading up to the invasion appeared to be designed to undermine confidence in Kiev’s leadership. Similarly, efforts by the Ukrainian government to remove Russian government sites and launch its own messages within Russia are similar to the Kiev information war brand. On the ground and on the cyber front the Ukrainian resistance is strengthened by the support of the West, which is the decisive lifeline when the country’s capital is almost completely surrounded.
“Cyber is a tool used in warfare and espionage,” says Meyers. “There is an open armed conflict. This is no different than asking the Ukrainian people to come to the country to take Kalashnikovs and help fight the Russians on the ground. “
But the picture looks a little different when you’re in Washington or London. For years, Western governments have condemned cyber-attacks on Russian soil. What happens now that Ukraine is openly appealing to hackers for help?
Former Russian analyst Michael E. “Even though the United States government says ‘we do not allow hacktivists to use American routers to carry out DDoS attacks on your state propaganda sites,’ Russia may not think so,” says Van Landingham. At the CIA. “Russia uses cyber tools as an extension of state power. And Russian leaders reflect a lot. I think they will see attacks by anonymous or any Western group as attacks promoted by Western governments. “
Much of what Ukraine’s IT army is promoting is clearly a crime in the United States and in every Western country. But the situation raises more than legal questions; It also pushes new ethical and geopolitical questions to the forefront.
“Western governments should strictly enforce the law against hacking against anyone who tries to defame Russian sites or DDoS or do anything.” [illegal] In the cyber realm, “says Van Landingham. “This is the only signal we have to show that this is not a CIA conspiracy, this is not a cyber command attack – this is the person here, and here is what we are doing about it.”
Despite the chaotic atmosphere, the apparent lack of verifiable large-scale cyber operations to coincide with Russia’s invasion of Ukraine is a major unknown phenomenon throughout the war. Russia has launched devastating cyber attacks on Ukraine in recent years but has so far stuck with conventional warfare since its invasion. The question is whether it can still turn to cyber in the coming weeks and months as the war progresses.