Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity NewswireSecurity Leadership and ManagementLogical SecurityCybersecurity NewsGovernment: Federal, State and Local

What the Russian invasion of Ukraine means for cybersecurity

By Jon Steinbach
ukraine protest
March 17, 2022

The recent invasion of Ukraine by Russian forces has brought to light a subject that’s been discussed ad nauseum over the years in the cybersecurity industry: what role would cyber have in a conventional ground war?

While the cybersecurity field initially witnessed the use of data wipers and ransomware targeting Ukrainian organizations during the initial days of the invasion, the feared worst-case scenarios have yet to materialize and the actual deployment of cyber as a “fifth domain” by the belligerents in this conflict has been minimal. In fact, General Paul Nakasone, Commander of U.S. Cyber Command recently said, “It has not been what we anticipate when we went into this several weeks ago,” regarding the muted use of cyberattacks during the invasion.

What’s more interesting, however, is the knock-on effects that involve cybersecurity information sharing, regulation and legislation and the pressuring of information technology (IT) providers to drop services in Russia.

Cybersecurity response to the Russia-Ukraine conflict

Early on, the cybersecurity community began sharing samples, analysis, Indicators of Compromise (IoCs) and detection techniques to curtail the effects of a data wiper (dubbed HermeticWiper) that was masked by a ransomware campaign. This allowed defenders at every organization to quickly update and upgrade their defense capabilities and, in general, served as a notice that the entire billion-dollar-a-year industry was ready to jump in and leverage its collective brainpower to protect against new (allegedly) Russian malware and ransomware attacks.

Sharing information and resources

Security professionals have seen widespread alerting and unified messaging from the Cybersecurity and Infrastructure Security Agency (CISA) and Department of Homeland Security (DHS) warning U.S. organizations about a rise in attacks, and they’ve built a resource center to help organizations understand and improve their security posture. The more collaboration between federal entities, U.S. businesses and the cybersecurity industry, the better. This type of collaborative effort has been inherently difficult over the years, but, with a common focus on an unjust situation, tends to bring down walls and minimize hurdles to bring together a unified front against malicious actors.

As sanctions continue, the pressure has been put on many global IT suppliers to pull out of Russia, which not only will impact normal business operations but in turn impacts some of the infrastructure upon which criminal ransomware groups have relied.

Bolstering Ukraine's cybersecurity posture

Cybersecurity leaders know that nation-state level adversaries have countless groups and abilities to infiltrate computer systems, exfiltrate information, destroy data and run influence operations, but the lack of widespread use of these techniques in Ukraine gives pause. Without impacting the telecommunications networks, Ukraine’s administration has been able to effectively wage an effective campaign of personality, building international support for a resistance campaign against the invasion.

If Russia had been able to wage a full scale cyberattack across a broad spectrum of communications targets, not only might this have blunted Ukraine President Zelenskyy’s ability counter disinformation that he had left the country as well as organize and mobilize the fighting force, but it also could have blocked viral videos and images from the front lines that have decimated the perception of Russia’s military capabilities. Videos of farmers occupying Russian tanks going viral is not beneficial to Putin.

Passing cyber defense legislation

Lastly, the invasion has most likely influenced passage of the Strengthening American Cybersecurity Act of 2022 in the Senate, which covers updated guidance on vulnerability and breach disclosures, threat hunting programs, zero trust architecture, developing quantitative cybersecurity metrics and, as typical of all bills, much more. While there was some initial pushback from CISA and the DOJ, it appears to have support of the White House. Clearly this bill was developed before the current situation in Ukraine, but undoubtedly the threats posed to American organizations by nation-state cyberwar will have had an effect on its passing.

While the initial impressions are that the use of cyber against Ukraine was not as expected, only time will tell if more advanced and covert attacks will be deployed. In the end though, the cybersecurity community appears to have rallied behind Ukraine and has offered solutions, technology and resources to help shore up defenses. This type of cooperation by thousands of individuals and hundreds of organizations is exactly what’s needed to ensure that the infrastructure everyone relies on is protected against all cyber threats.

KEYWORDS: cyber attack response cyber security legislation disinformation information sharing nation-state attack Russian hacking Ukraine cybersecurity

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Img 3527 (1)

Jon Steinbach is President, Federal Solutions, for anti-ransomware maker Halcyon.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Global Security

    Russia’s invasion of Ukraine reveals the future of cyberattacks

    See More
  • Conference room

    The Future of Cybersecurity Training and What It Means for Employers

    See More
  • data-center

    What the Zerologon vulnerability means for the state of enterprise security

    See More

Related Products

See More Products
  • Physical Security and Safety: A Field Guide for the Practitioner

  • 150 things.jpg

    The Handbook for School Safety and Security

  • The Database Hacker's Handboo

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing