loader image

How Ukraine has defended itself against cyberattacks – lessons for the US

by | Apr 13, 2023 | Cybersecurity

How Ukraine has defended itself against cyberattacks – lessons for the US

by | Apr 13, 2023 | Cybersecurity

Ukrainian soldiers training with Leleka UAV. Mil.gov.ua, CC BY 4.0 [https://creativecommons.org/licenses/by/4.0], via Wikimedia Commons

How Ukraine has defended itself against cyberattacks – lessons for the US

by | Apr 13, 2023 | Cybersecurity

In 2014, as Russia launched a proxy war in Eastern Ukraine and annexed Crimea, and in the years that followed, Russian hackers hammered Ukraine. The cyberattacks went so far as to knock out the power grid in parts of the country in 2015. Russian hackers stepped up their efforts against Ukraine in the run-up to the 2022 invasion, but with notably different results. Those differences hold lessons for U.S. national cyber defense.

I’m a cybersecurity researcher with a background as a political officer in the U.S. Embassy in Kyiv and working as an analyst in countries of the former Soviet Union. Over the last year, I led a USAID-funded program in which Florida International University and Purdue University instructors trained more than 125 Ukrainian university cybersecurity faculty and more than 700 cybersecurity students. Many of the faculty are leading advisors to the government or consult with critical infrastructure organizations on cybersecurity. The program emphasized practical skills in using leading cybersecurity tools to defend simulated enterprise networks against real malware and other cybersecurity threats.

The invasion took place just weeks before the national cybersecurity competition was to be held for students from the program’s 14 participating universities. I believe that the training that the faculty and students received in protecting critical infrastructure helped reduce the impact of Russian cyberattacks. The most obvious sign of this resilience is the success Ukraine has had in keeping its internet on despite Russian bombs, sabotage and cyberattacks.


What this means for the U.S.

On March 21, 2022, U.S. President Joe Biden warned the American public that Russia’s capability to launch cyberattacks is “fairly consequential and it’s coming.” As Deputy National Security Adviser Anne Neuberger explained, Biden’s warning was a call to prepare U.S. cyber defenses.

The concern in the White House over cyberattacks is shared by cybersecurity practitioners. The Ukrainian experience with Russian cyberattacks provides lessons for how institutions ranging from electric power plants to public schools can contribute to strengthening a nation’s cyber defenses.

National cyber defense starts with governments and organizations evaluating risks and increasing their capacity to meet the latest cybersecurity threats. After President Biden’s warning, Neuberger recommended that organizations take five steps: adopt multifactor password authentication, keep software patches up-to-date, back up data, run drills and cooperate with government cybersecurity agencies.


Access control

Cyber defense begins with the entryways into a nation’s information networks. In Ukraine in recent years, hackers entered poorly protected networks by techniques as simple as guessing passwords or intercepting their use on unsecure computers.

More sophisticated cyberattacks in Ukraine used social engineering techniques, including phishing emails that tricked network users into revealing IDs and passwords. Clicking an unknown link can also open the door to tracking malware that can learn password information.

Neuberger’s recommendation for adopting multifactor password authentication recognizes that users will never be perfect. Even cybersecurity experts have made mistakes in their decisions to provide passwords or personal information on insecure or deceptive sites. The simple step of authenticating a login on an approved device limits the access a hacker can obtain from just gaining personal information.

Multifactor authentication provides a major boost in network security.


Software vulnerabilities

The programmers who develop apps and networks are rewarded by improving performance and functionality. The problem is that even the best developers often overlook vulnerabilities as they add new code. For this reason, users should permit software updates because these are how developers patch uncovered weaknesses once identified.

Prior to the invasion of Ukraine, Russian hackers identified a vulnerability in Microsoft’s leading data management software. This was similar to a weakness in network software that allowed Russian hackers to unleash the NotPetya malware on Ukrainian networks in 2017. The attack caused an estimated $10 billion in damage worldwide.

Just days before Russian tanks began crossing into Ukraine in February 2022, Russian hackers used a vulnerability in the market-leading data management software SQL to place on Ukrainian servers “wiper” malware that erases stored data. However, over the last five years Ukrainian institutions have significantly strengthened their cybersecurity. Most notably, Ukrainian organizations have shifted away from pirated enterprise software, and they integrated their information systems into the global cybersecurity community of technology firms and data protection agencies.

As a result, the Microsoft Threat Intelligence Center identified the new malware as it began appearing on Ukrainian networks. The early warning allowed Microsoft to distribute a patch around the world to prevent the servers from being erased by this malware.


Backing up data

Ransomware attacks already frequently target public and private organizations in the U.S. The hackers lock out users from an institution’s data networks and demand payment to return access to them.

Wiper malware used in the Russian cyberattacks on Ukraine operates in a similar manner to ransomware. However, pseudo ransomware attacks permanently destroy an institution’s access to its data.

Backing up critical data is an important step in reducing the impact of wiper or ransomware attacks. Some private organizations have even taken to storing data on two separate cloud-based systems. This reduces the chances that attacks could deprive an organization of the data it needs to continue operating.

Join to help continue our work

* indicates required

Drills and cooperation

The last set of Neuberger’s recommendations is to continually conduct cybersecurity drills while maintaining cooperative relationships with federal cyber defense agencies. In the months leading up to Russia’s invasion, Ukrainian organizations benefited from working closely with U.S. agencies to bolster the cybersecurity of critical infrastructure. The agencies helped scan Ukrainian networks for malware and supported penetration tests that use hacker tools to look for vulnerabilities that can give hackers access to their systems.

Small and large organizations in the U.S. concerned about cyberattacks should seek a strong relationship with a wide-range of federal agencies responsible for cybersecurity. Recent regulations require firms to disclose information on cyberattacks to their networks. But organizations should turn to cybersecurity authorities before experiencing a cyberrattack.

U.S. government agencies offer best practices for training staff, including the use of tabletop and simulated attack exercises. As Ukrainians have learned, tomorrow’s cyberattacks can only be countered by preparing today.


Republished from The Conversation under a Creative Commons license in order to point Indo-Pacific warfighters and national security professionals to reputable and relevant war studies literature. Read the original article.


Robert Peacock, Florida International University

Dr. Peacock’s research interests are broadly focused on enforcement agency policies and practices in relation to police misconduct and corruption. His studies primarily seek to evaluate the impact that an organization’s policies, notably personnel selection and training, have on agency integrity and legitimacy. Dr. Robert Peacock received an M.B.A. in Finance from Ohio University and a B.A. in Public Policy from the University of Michigan prior to completing his Ph.D. in Criminal Justice from Michigan State University.

While completing his doctoral degree, Dr. Peacock developed and led the implementation team for the US Department of Justice-funded patrol police department program that selected, trained, and mentored an entirely new patrol department of 18,000 officers in Ukraine. A radical departure from past law enforcement in the country, the new service-oriented patrol departments quadrupled the number of female officers and tripled indicators for trust in the 31 cities in which they operate. Prior to pursuing an academic career, Dr. Peacock served eleven years working in grey arms and UN sanctions enforcement in the US Department of State and as Program Manager in the former Soviet Union for the Department of Homeland Security. Dr. Peacock is fluent in Russian and has an intermediate level in the Ukrainian language.

Related Articles

Expert: TikTok could be a risk to national security

Expert: TikTok could be a risk to national security

More than 86 million Americans use the social media app TikTok to create, share, and view short videos, featuring everything from cute animals and influencer advice to comedy and dance performances.
Concerned experts point out that TikTok’s parent company, the Beijing-based ByteDance, has been accused of working with the Chinese government to censor content and could also collect sensitive data on users.

Pentagon leaks suggest China developing ways to attack satellites – here’s how they might work

Pentagon leaks suggest China developing ways to attack satellites – here’s how they might work

The recent leak of Pentagon documents included the suggestion that China is developing sophisticated cyber attacks for the purpose of disrupting military communication satellites. While this is unconfirmed, it is certainly possible, as many sovereign nations and private companies have considered how to protect from signal interference.

Ransomware Attack Hits Marinette Marine Shipyard, Results in Short-Term Delay of Frigate, Freedom LCS Construction

Ransomware Attack Hits Marinette Marine Shipyard, Results in Short-Term Delay of Frigate, Freedom LCS Construction

The Wisconsin shipyard that builds the U.S. Navy’s Freedom-class Littoral Combat Ship and the Constellation-class guided-missile frigate suffered a ransomware attack last week that delayed production across the shipyard, USNI News has learned.

Fincantieri Marinette Marine experienced the attack in the early morning hours of April 12, when large chunks of data on the shipyard’s network servers were rendered unusable by an unknown professional group, two sources familiar with a Navy summary of the attack told USNI News on Thursday.