Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity NewswireSecurity Leadership and ManagementLogical SecurityCybersecurity NewsGovernment: Federal, State and Local

What the Russian invasion of Ukraine means for cybersecurity

By Jon Steinbach
ukraine protest
March 17, 2022

The recent invasion of Ukraine by Russian forces has brought to light a subject that’s been discussed ad nauseum over the years in the cybersecurity industry: what role would cyber have in a conventional ground war?

While the cybersecurity field initially witnessed the use of data wipers and ransomware targeting Ukrainian organizations during the initial days of the invasion, the feared worst-case scenarios have yet to materialize and the actual deployment of cyber as a “fifth domain” by the belligerents in this conflict has been minimal. In fact, General Paul Nakasone, Commander of U.S. Cyber Command recently said, “It has not been what we anticipate when we went into this several weeks ago,” regarding the muted use of cyberattacks during the invasion.

What’s more interesting, however, is the knock-on effects that involve cybersecurity information sharing, regulation and legislation and the pressuring of information technology (IT) providers to drop services in Russia.

Cybersecurity response to the Russia-Ukraine conflict

Early on, the cybersecurity community began sharing samples, analysis, Indicators of Compromise (IoCs) and detection techniques to curtail the effects of a data wiper (dubbed HermeticWiper) that was masked by a ransomware campaign. This allowed defenders at every organization to quickly update and upgrade their defense capabilities and, in general, served as a notice that the entire billion-dollar-a-year industry was ready to jump in and leverage its collective brainpower to protect against new (allegedly) Russian malware and ransomware attacks.

Sharing information and resources

Security professionals have seen widespread alerting and unified messaging from the Cybersecurity and Infrastructure Security Agency (CISA) and Department of Homeland Security (DHS) warning U.S. organizations about a rise in attacks, and they’ve built a resource center to help organizations understand and improve their security posture. The more collaboration between federal entities, U.S. businesses and the cybersecurity industry, the better. This type of collaborative effort has been inherently difficult over the years, but, with a common focus on an unjust situation, tends to bring down walls and minimize hurdles to bring together a unified front against malicious actors.

As sanctions continue, the pressure has been put on many global IT suppliers to pull out of Russia, which not only will impact normal business operations but in turn impacts some of the infrastructure upon which criminal ransomware groups have relied.

Bolstering Ukraine's cybersecurity posture

Cybersecurity leaders know that nation-state level adversaries have countless groups and abilities to infiltrate computer systems, exfiltrate information, destroy data and run influence operations, but the lack of widespread use of these techniques in Ukraine gives pause. Without impacting the telecommunications networks, Ukraine’s administration has been able to effectively wage an effective campaign of personality, building international support for a resistance campaign against the invasion.

If Russia had been able to wage a full scale cyberattack across a broad spectrum of communications targets, not only might this have blunted Ukraine President Zelenskyy’s ability counter disinformation that he had left the country as well as organize and mobilize the fighting force, but it also could have blocked viral videos and images from the front lines that have decimated the perception of Russia’s military capabilities. Videos of farmers occupying Russian tanks going viral is not beneficial to Putin.

Passing cyber defense legislation

Lastly, the invasion has most likely influenced passage of the Strengthening American Cybersecurity Act of 2022 in the Senate, which covers updated guidance on vulnerability and breach disclosures, threat hunting programs, zero trust architecture, developing quantitative cybersecurity metrics and, as typical of all bills, much more. While there was some initial pushback from CISA and the DOJ, it appears to have support of the White House. Clearly this bill was developed before the current situation in Ukraine, but undoubtedly the threats posed to American organizations by nation-state cyberwar will have had an effect on its passing.

While the initial impressions are that the use of cyber against Ukraine was not as expected, only time will tell if more advanced and covert attacks will be deployed. In the end though, the cybersecurity community appears to have rallied behind Ukraine and has offered solutions, technology and resources to help shore up defenses. This type of cooperation by thousands of individuals and hundreds of organizations is exactly what’s needed to ensure that the infrastructure everyone relies on is protected against all cyber threats.

KEYWORDS: cyber attack response cyber security legislation disinformation information sharing nation-state attack Russian hacking Ukraine cybersecurity

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Img 3527 (1)

Jon Steinbach is President, Federal Solutions, for anti-ransomware maker Halcyon.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Cybersecurity
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Logical Security
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    New Security Technology
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

Popular Stories

Rendered computer with keyboard

16B Login Credentials Exposed in World’s Largest Data Breach

Verizon on phone screen

61M Records Listed for Sale Online, Allegedly Belong to Verizon

Security’s 2025 Women in Security

Security’s 2025 Women in Security

Red spiderweb

From Retail to Insurance, Scattered Spider Changes Targets

blurry multicolored text on black screen

PowerSchool Education Technology Company Announces Data Breach

2025 Security Benchmark banner

Events

July 17, 2025

Tech in the Jungle: Leveraging Surveillance, Access Control, and Technology in Unique Environments

What do zebras, school groups and high-tech surveillance have in common? They're all part of a day’s work for the security team at the Toledo Zoo.

August 7, 2025

Threats to the Energy Sector: Implications for Corporate and National Security

The energy sector has found itself in the crosshairs of virtually every bad actor on the global stage.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Global Security

    Russia’s invasion of Ukraine reveals the future of cyberattacks

    See More
  • data-center

    What the Zerologon vulnerability means for the state of enterprise security

    See More
  • ransomware and the DOJ involvement

    What the DOJ's involvement in cyberattacks means for the future of ransomware

    See More

Related Products

See More Products
  • 150 things.jpg

    The Handbook for School Safety and Security

  • Physical-Security-and-Safet.gif

    Physical Security and Safety: A Field Guide for the Practitioner

  • databasehacker

    The Database Hacker's Handboo

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing