Send message to

Do you want to send the message without a subject?
Please note that your message can be maximum 1000 characters long
Special characters '<', '>' are not allowed in subject and message
reCaptcha is invalid.
reCaptcha failed because of a problem with the server.

Your message has been sent

You can find the message in your personal profile at "My messages".

An error occured

Please try again.

Make an appointment with

So that you can make an appointment, the calendar will open in a new tab on the personal profile of your contact person.

Create an onsite appointment with

So that you can make an onsite appointment, the appointment request will open in a new tab.

Radar monitor © istockphoto.com/Maxiphoto
  • Industry News

Increased alertness required: So far there has not been a conflagration

Actors on behalf of the state have repeatedly made headlines with their actions. In the Ukraine conflict, the expected cyber battles have not yet been observed to the extent suspected, but DDos attacks, the use of malware and other techniques have been documented. The Federal Office for the Protection of the Constitution advises caution. This article deals with which threats exist and why the conflict in cyberspace has not yet escalated further.

Despite a wide variety of attacks on IT systems, spectacular or particularly effective cyber attacks have not yet been recorded in the Ukraine conflict. The reasons for this are complex.

So far, the large-scale cyber war feared by many experts in the context of the Ukraine conflict has failed to materialise. However, this can change at any time and it is advisable to be prepared for a possible escalation.

Currently, various forms of attack are being registered, which, however, differ only slightly from previously known attack vectors. Numerous DDoS attacks have been observed on both sides. These attacks, which are technically quite simple, regularly paralyse entire websites. They can be commissioned on the internet for little money, which is why they are popular with attackers who do not have specific expertise. However, these attacks are rarely very effective.

There were also numerous web defacements on both sides, mainly on government sites, authorities and public institutions. These attacks are also usually of low complexity. It is enough to find a poorly secured access to the web server to alienate pages or post new pages. Attackers are primarily interested in causing reputational damage. Since web presences are often hosted on external servers at internet providers, access to the internal IT network is usually not possible. Moreover, the manipulations are easy to remedy.

The situation is different when politically motivated attackers or actors with a state mandate use malware. Several Ukrainian systems have been hit by destructive malware attacks with so-called wipers. These malware are mainly aimed at deleting data or rendering systems unusable. Press reports mention HermeticWizard, for example, which affected various organisations, while IsaacWiper penetrated a Ukrainian government network and CaddyWiper is said to have affected only a few systems in unknown Ukrainian organisations. The exact extent of damage from these wipe attacks is not known and would certainly not be made public in wartime.

Measured against the potential of the cybercrime actors involved, the activities observed fell far short of the possibilities, according to various experts, and the feared digital conflagration has so far failed to materialize. The presumed reasons for this seem to be manifold. The New York Times believes that damage done with military weapons is much more effective. The online magazine Motherboard sees as an important reason that Ukraine has made the protection of its own IT systems much more effective in recent years. In contrast, the Financial Times emphasizes that cyber-attacks require long preparations, for which the small circle of people involved in the preparations for war lacked the time.
Increased caution in matters of cyber security is nevertheless advisable. "The BSI recognises an increased threat situation for Germany," states a situation assessment by the Federal Office for Information Security, BSI, which regularly publishes information on the development of the situation and recommendations for measures. The office warns: "Phishing emails with reference to the Ukraine war are already circulating in German."

The Federal Office for the Protection of the Constitution also advises caution and recommends taking concrete protective measures. "The war in Ukraine continues to be accompanied by extensive activities in cyberspace," the Federal Office for the Protection of the Constitution states on its website. The risk is high that this could lead to "spill-over effects and collateral damage on German agencies". However, companies or public institutions could not only be exposed to attacks by mistake, but could also be targeted: "Acts of cyber sabotage against companies in the CRITIS sectors, but also against the political sphere as well as against military institutions, are possible at any time," warns the BfV.

In another article, you will find out what effective protective measures can be look like.

Autor: Uwe Sievers
 
close

This content or feature is available to the it-sa 365 community. 
Please register or log in with your login data.