The Times Australia
The Times World News

.
The Times Real Estate

.

Vulkan files leak show how Putin's regime weaponises cyberspace

  • Written by Matthew Sussex, Fellow, Strategic and Defence Studies Centre, Australian National University

Recent revelations about the close partnership between the Kremlin and NTC Vulkan[1], a Russian cybersecurity consultancy with links to the military, provide some rare insights into how the Putin regime weaponises cyberspace.

More than 5,000 documents have been leaked by an anonymous whistleblower[2], angry at Russia’s conduct in the war in Ukraine. They purport to reveal details about hacking tools to seize control of vulnerable servers; domestic and international disinformation campaigns; and ways to digitally monitor potential threats to the regime.

Although caution is always necessary before accepting claims about cyber capabilities, it’s noteworthy several Western intelligence agencies have confirmed[3] the documents appear genuine.

The leak also corroborates the view of many strategists: that the Russian government regards offensive cyber capabilities as part of a holistic effort to degrade its enemies. This includes the sowing of mistrust via social media, the gathering of kompromat[4] (compromising material), and the ability to target crucial infrastructure.

That list of enemies is a long one, and has grown since Putin’s full-scale invasion of Ukraine in February 2022. Naturally, the Kremlin’s just-released 2023 Foreign Policy Concept[5] identifies the United States as the “main source of threats” to Russian security.

But Ukraine, every NATO and European Union member, and several other states are identified as “unfriendly countries[6]”, including Australia, Japan, Singapore and New Zealand.

War in the shadows

Russia utilises a range of methods to wage war in cyberspace.

On one end of the spectrum, it uses groups attached to official agencies, such as the GRU (military intelligence) and the FSB (ostensibly domestic intelligence, but also carries out missions overseas).

The GRU’s groups include Sandworm[7] and Fancy Bear[8]. Another group, Cozy Bear[9], is associated with the FSB.

One or more of these groups have been responsible for a series of prominent cyber attacks on a range of targets, including:

At the other end of the spectrum, Russian information operations regularly use armies of bots and trolls, as well as unsuspecting “citizen curators[10]”, to spread false narratives.

Doing so is cheap and increases the distance between the attacker and its agents, allowing for plausible deniability.

Like biological warfare, it also weaponises the targets to do the job of spreading the narrative disease for it.

Russian information campaigns operate globally, among nations it considers its friends as well as its adversaries. Russian-weaponised media can be found in Africa[11], where the Russian Wagner paramilitary organisation has been especially active, as well as in South Asia[12] and Australia[13].

Read more: Russian trolls targeted Australian voters on Twitter via #auspol and #MH17[14]

In many respects, Russian information operations mimic Soviet geopolitical doctrine during the Cold War. This focused on courting areas of the world where the West was weakest.

But in the grey space between official agencies, useful idiots and unwitting proxies is an area of increasing emphasis of Russian cyberwar: outsourcing. Some of these, such as Vulkan, retain an aura of respectability as consultancies that do government work as well as contracting to other firms.

They also include the Internet Research Agency in St Petersburg, which was used to coordinate social media attacks on the US Democratic Party during the 2018 mid-term elections, leading to an indictment[15] by the Department of Justice.

Others are [organised criminal gangs] like the aptly named “EvilCorp” (https://www.state.gov/transnational-organized-crime-rewards-program-2/maksim-viktorovich-yakubets/) that use malware to harvest people’s banking details or personal information.

The November 2022 breach of Australia’s private health insurer Medibank[16] was one example, which exposed patients’ sensitive health details such as treatments for drug addiction or HIV.

The Vulkan revelations

The Vulkan leak adds more detail to what we know about Russian methods, tactics and targets in cyberspace. The GRU group Sandworm is identified as having authorised Vulkan to help build “Skan-V[17]”, a piece of software that can monitor the internet to detect vulnerable servers to hack.

Another Vulkan project, known as “Fraction[18]”, was designed to monitor social media sites for key words to identify regime opponents, both at home and abroad.

An even larger project in which Vulkan seems to have been engaged was “Amezit[19]”. This is a tool that would enable operators to seize control of the internet both inside Russia and in other nations, and hijack information flows.

To function, its users need to be able to control physical infrastructure such as mobile phone towers and wireless internet nodes. Amezit can then be used to mimic legitimate sites and social media profiles, scrub content that might be deemed hostile, and replace it with disinformation.

Given the requirement to possess physical infrastructure, it’s clear Azemit was designed not solely as a piece of software, but to operate in tandem with the coercive instruments of a state.

This has internal uses as well as external ones. Domestically, it could be used to silence dissent in restive Russian regions. In a war zone, such as Ukraine, it could be used alongside Russia’s armed forces to intercept government communications and swap genuine information sources for false ones.

Read more: As Russia wages cyber war against Ukraine, here's how Australia (and the rest of the world) could suffer collateral damage[20]

The Vulkan leak also included information on physical objects. Although not a concise target list, its software allowed users to map physical infrastructure. This included airports worldwide, the Swiss Ministry of Foreign Affairs, and the Muhlberg nuclear power plant[21] near Bern.

What’s more, the document drop featured mapped clusters of internet servers[22] in the United States. And the Skan-V project identified a site in the US labelled “Fairfield[23]” as a potentially vulnerable point of entry.

If the documents are accurate, Vulkan’s work for the Russian government shows how extensive the Kremlin’s attempts have been to monitor digital infrastructure, collect information about vulnerabilities, and develop the capacity to hijack it.

Combating Russian cyber attacks

Cyber threats are insidious because they can be used in multiple combinations and aimed at different targets. Hack-and-leak campaigns against influential figures can be mixed with attempts to sabotage vital infrastructure, perform corporate espionage, undermine social cohesion and trust, and push fringe narratives to the political centre.

They can be drip-fed into the digital ecosystem. Or, much like the campaign that accompanied Russia’s takeover of Crimea in 2014, they can be employed all at once[24] in a cyber-blizzard.

This makes cyber attacks very hard to build resilience against, and even harder to deter. They are a weapon of potentially mass disruption that can result in real casualties. Turning off the power grid in a city, for example, can lead to deaths among people on life support in hospitals, traffic accidents, and exposure to extreme cold in certain regions.

Read more: A year on, Russia's war on Ukraine threatens to redraw the map of world politics – and 2023 will be crucial[25]

But beyond infrastructure and industry, such attacks also target social pressure points[26]: a states’ institutions, ideas and people. This makes them especially useful in attacking democracies, making the open and free exchange of views a potential vulnerability.

As the Vulkan leaks demonstrate, hostile governments have greater ambitions in cyberspace than being able to switch off the lights. They seek to be able to encourage us to question what we believe to be true, and pit us against one another.

Recognising that will be a crucial step in preventing the poisonous seeds of disinformation from taking root.

References

  1. ^ NTC Vulkan (www.theguardian.com)
  2. ^ whistleblower (www.techtimes.com)
  3. ^ confirmed (www.washingtonpost.com)
  4. ^ kompromat (www.washingtonpost.com)
  5. ^ Foreign Policy Concept (www.rbc.ru)
  6. ^ unfriendly countries (www.1news.co.nz)
  7. ^ Sandworm (www.wired.com)
  8. ^ Fancy Bear (www.crowdstrike.com)
  9. ^ Cozy Bear (www.crowdstrike.com)
  10. ^ citizen curators (academic.oup.com)
  11. ^ Africa (www.brookings.edu)
  12. ^ South Asia (www.nytimes.com)
  13. ^ Australia (theconversation.com)
  14. ^ Russian trolls targeted Australian voters on Twitter via #auspol and #MH17 (theconversation.com)
  15. ^ indictment (www.justice.gov)
  16. ^ Medibank (www.aljazeera.com)
  17. ^ Skan-V (www.lemonde.fr)
  18. ^ Fraction (www.theguardian.com)
  19. ^ Amezit (www.lemonde.fr)
  20. ^ As Russia wages cyber war against Ukraine, here's how Australia (and the rest of the world) could suffer collateral damage (theconversation.com)
  21. ^ nuclear power plant (www.spiegel.de)
  22. ^ internet servers (www.silicon.co.uk)
  23. ^ Fairfield (ctexaminer.com)
  24. ^ all at once (www.businessinsider.com)
  25. ^ A year on, Russia's war on Ukraine threatens to redraw the map of world politics – and 2023 will be crucial (theconversation.com)
  26. ^ social pressure points (www.tandfonline.com)

Read more https://theconversation.com/russias-shadow-war-vulkan-files-leak-show-how-putins-regime-weaponises-cyberspace-203146

The Times Features

Brisbane Water Bill Savings: Practical Tips to Reduce Costs

Brisbane residents have been feeling the pinch as water costs continue to climb. With increasing prices, it's no wonder many households are searching for ways to ease the burde...

Exploring Hybrid Heating Systems for Modern Homes

Consequently, energy efficiency as well as sustainability are two major considerations prevalent in the current market for homeowners and businesses alike. Hence, integrated heat...

Are Dental Implants Right for You? Here’s What to Think About

Dental implants are now among the top solutions for those seeking to replace and improve their teeth. But are dental implants suitable for you? Here you will find out more about ...

Sunglasses don’t just look good – they’re good for you too. Here’s how to choose the right pair

Australians are exposed to some of the highest levels[1] of solar ultraviolet (UV) radiation in the world. While we tend to focus on avoiding UV damage to our skin, it’s impor...

How to Style the Pantone Color of the Year 2025 - Mocha Mousse

The Pantone Color of the Year never fails to set the tone for the coming year's design, fashion, and lifestyle trends. For 2025, Pantone has unveiled “Mocha Mousse,” a rich a...

How the Aussie summer has a profound effect on 'Climate Cravings’

Weather whiplash describes the rollercoaster-like shifts in weather we’ve experienced this summer —a blazing hot day one moment, followed by an unexpectedly chilly or rainy tur...

Times Magazine

Designing for Accessibility: How Toilet Signs Can Promote Inclusivity

Toilet signs are a crucial aspect of any public facility or establishment. They play an important role in guiding individuals to the appropriate restroom while ensuring that everyone feels safe and comfortable while using the facilities. Toilet sig...

Explore the Hidden Treasures of the Disney100 Celebration Collection

Disney is a magical place that has captivated the hearts of millions for over a century. To commemorate this momentous milestone, Disney is presenting an unprecedented celebration of its 100th anniversary. As part of this celebration, Disney is unv...

Considerations When Deciding on JC Tuition

As a crucial aspect of the academic journey of many students in Singapore, JC tuition plays a vital role in helping them achieve their educational goals and fulfil their academic interests. Junior College education is a financial investment that pr...

How Long Do Refurbished iPhones Last?

When considering a refurbished iPhone, one common question arises: How long will it last? Refurbished phones offer a cost-effective way to own high-quality technology, but their longevity is a crucial factor in the decision-making process. Let’s ex...

Make Mom Smile on Her Special Day by Showing Your Love with Mother's Day Flowers

Mother's Day is the perfect time to show your mum just how much she means to you, and what better way to do that than with a beautiful bouquet! Whether you choose a stunning arrangement of roses, lilies, and sunflowers, or a cheerful mix of daisies...

Business email compromise attacks are on the rise

Expert shares 5 simple steps to combat email threats every business should consider following There’s an astounding 84% increase in business email compromise attacks, according to the latest Email Threat Report, which compares half-yearly statis...

LayBy Shopping