Ukraine Update: Cyber Attacks in Ukraine

Morning News Roundup:

Evacuation of Russians in Ukraine

https://www.boisestatepublicradio.org/2022-10-14/russia-to-evacuate-civilians-from-kherson-as-ukraine-advances

Russian Military

https://www.msn.com/en-gb/news/world/russia-ukraine-war-live-endemic-corruption-and-poor-logistics-harming-russian-progress-says-uk/ar-AA12Z0bs

Key Events in the War

https://www.aljazeera.com/news/2022/10/15/russia-ukraine-war-list-of-key-events-day-234

Putin’s Speech

https://www.aljazeera.com/news/2022/10/14/actions-are-correct-and-timely-putin-comments-on-mobilisation

Map of Ukraine

https://www.worldatlas.com/maps/ukraine

Russian Soldiers Pay for Body Armour

https://www.msn.com/en-gb/news/world/ukraine-russia-war-latest-moscow-forces-conscripts-to-pay-570-for-body-armour-says-mod/ar-AA12Z24s

Podcasts About Ukraine

Doomsday Watch

https://podcasts.apple.com/us/podcast/doomsday-watch-with-arthur-snell/id1593634121

Ukraine: The Latest

https://podcasts.apple.com/gb/podcast/ukraine-the-latest/id1612424182

Notes from “The Red Line” Podcast, The Cyber War in Ukraine, September 4, 2022

  • The biggest miscalculation about the war was about cyber. 
  • (Note: Sir)
  • A Test Run for Terror
  • Ukraine is much more prepared.  They tried to attack, but the results were not very successful. 
  • There were attacks against the Ukraine infrastructure.  Even attacks that were successful, were mitigated quickly.
  • The media is not really reporting the failed attempts. 
  • As we saw with the military, corruption is rife in hacker world.  This means that all of the money was not invested in cyber attacks, but siphoned off into corruption.
  • Russia is using proxy groups to try to keep the activities from being tied directly to Russia.
  • Some of the attacks coincide with on the ground military activity.
  • Pegasus has been told to Saudi, India, Kazakhstan.
  • Pegasus is software, Israeli, installed without the users permission.  Politicians found out that they had Pegasus surveillance. 
  • Pegasus was not particularly useful in Ukraine.  There were lots of alternatives.  You have to send to particular phone number and the person needs to click on it to install Pegasus.
  • On the front line, the internet connection is not that good anyway.  It’s easier to use the cell towers to intercept calls.
  • The Ukrainians have captured conversations between Russian soldiers and their relatives.
  • China buried monitoring in Weiger keyboards that the Weigers needed to communicate.
  • You can identify where someone is by triangulating between cell towers.  If there are a lot of users in a particular area, you know something is going on.
  • We are eight years into the war.
  • The Russians also did not expect this war to take very long and therefore may not have planned for any extended cyber warfare.
  • It is likely that the Russians will try to affect the heating infrastructure to make the winter more difficult.
  • Modems and Machine Guns.
  • The cyber attacks started before the invasion.  The goal was to make the population panic and disrupt their trust in the state.
  • The cyber attacks before the war were largely unsuccessful.
  • When they go into a territory they first try to destroy any access to mobile service.
  • 2014, 2015 the Russians launched a very successful cyber attack.  Ukraine was not prepared for this cyber warfare.  The power grids were out.  The same virus was used in 2022.  This was not as successful. 
  • There has been a large cyber hacking effort privately in response to the invasion.
, ,

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

%d bloggers like this: