10 December 2024

Ukraine’s cyber defenders turn years of conflict into useful lessons for all

David Hollingworth

TRYZUB is a new training platform based on real-world, frontline cyberwarfare experiences – here’s how it works, and why it could matter for Australia.

As the saying goes, “When life gives you lemons, make lemonade.” In this instance, however, it’s more a case of “when life gives you harsh lessons in cyberwarfare, you should turn them into real-world training exercises”.

That’s pretty much the backstory of a new training service recently announced by cyber security firm Cyber Ranges, which is based on the lived experience of Ukraine’s Computer Emergency Response Team, CERT-UA.

Russia’s build-up and execution of its so-called Special Military Operation – largely ‘special’ these days for being the most costly and destructive conflict on European soil since the Second World War – saw a wave of cyber-attacks unleashed across NATO countries and allies, but no nation has borne the brunt of those attacks like Ukraine has.

Just months after the Russian invasion, Ukraine was already facing unprecedented malicious cyber activity both in terms of its scope and sophistication, and it had already been engaged in defensive cyber operations since as early as 2013. This ongoing activity has the goal of degrading and disrupting both domestic and military targets, while also discrediting the Ukrainian government.

Even as early as June 2022, there were at least eight families of malware being used against Ukrainian networks, deployed via a range of methods, and often conducted in tandem with traditional military operations.

As well as state-backed actors, often with close links to Russia’s Federal Security Service and other agencies, it’s also been the target of various pro-Russian hacktivist groups with varying degrees of sophistication in their operations.

Basically, long story short, Ukraine’s network defenders are probably some of the most experienced cyber security specialists on the planet right now, particularly when it comes to cyber warfare at scale.

No comments: