Categories
Security Technology Cyber CSS Blog

“Sincere about Ulterior Motives”: The Invasion of Ukraine and Russia’s Shapeshifting Relationship with Ransomware Groups

 

A day after Russia’s President Putin ordered the full-scale invasion of Ukraine, Conti, a hacker group suspected to be largely based in Russia and known for financially extorting Western companies, published a message in support of Moscow. The hackers threatened to use “all possible resources to strike back at the critical infrastructures” in retaliation for any “cyberattack or any war activities against Russia”. Soon after, the group sought to dial back this message, claiming not to side with any government.

Categories
Technology Defense Cyber CSS Blog

Initiators and Defenders in Major Cyber Theft Incidents, 2000 – 2018

This week’s featured graphic maps the nations in which major cyber theft incidents were initiated and countries affected by these attacks between 2000 and 2018. To find out what this highlights about the eclipse of Western military-technological superiority, read Michael Hass’ chapter for Strategic Trends 2019 here.

Categories
Technology Defense Cyber Coronavirus CSS Blog

Initiators and Defenders in Major Cyber Theft Incidents (2000-2018)

This graphic provides an overview of the nations in which major cyber theft incidents were initiated, as well as the countries affected by these attacks between 2000 and 2018. To find out what this highlights about the eclipse of Western military-technological superiority, read Michael Haas’ chapter for Strategic Trends 2019 here. Strategic Trends 2020 is out on 30 April.

Categories
Cyber CSS Blog

Contested Public Attributions of Cyber Incidents and the Role of Academia

Image courtesy of Saksham Gangwar/Unsplash

In a recent article in Contemporary Security Policy, Florian J. Egloff reflects on the contested nature of public attributions of cyber incidents and what role academia could take up.

In the last five years, public attribution of cyber incidents has gone from an incredibly rare event to a regular occurrence. Just in October 2018, the UK’s National Cyber Security Centre publicized its assessment of cyber activities conducted by the Russian military intelligence service (also known by its old acronym, the GRU). Clearly, publicizing activities that other political actors like to keep secret is a political act – but what kind of political act is it and what happens when a government publicly attributes?

Categories
Technology Defense CSS Blog

Initiators and Defenders in Major Cyber Theft Incidents, 2000 – 2018

EmailFacebookTwitter

This graphic provides an overview of the nations in which major cyber theft incidents were initiated as well as the countries affected by these attacks between 2000 and 2018. To find out what this highlights about the eclipse of Western military-technological superiority, read Michael Hass’ chapter for Strategic Trends 2019 here.