The Times Australia
The Times World News

.
The Times Real Estate

.

Vulkan files leak show how Putin's regime weaponises cyberspace

  • Written by Matthew Sussex, Fellow, Strategic and Defence Studies Centre, Australian National University

Recent revelations about the close partnership between the Kremlin and NTC Vulkan[1], a Russian cybersecurity consultancy with links to the military, provide some rare insights into how the Putin regime weaponises cyberspace.

More than 5,000 documents have been leaked by an anonymous whistleblower[2], angry at Russia’s conduct in the war in Ukraine. They purport to reveal details about hacking tools to seize control of vulnerable servers; domestic and international disinformation campaigns; and ways to digitally monitor potential threats to the regime.

Although caution is always necessary before accepting claims about cyber capabilities, it’s noteworthy several Western intelligence agencies have confirmed[3] the documents appear genuine.

The leak also corroborates the view of many strategists: that the Russian government regards offensive cyber capabilities as part of a holistic effort to degrade its enemies. This includes the sowing of mistrust via social media, the gathering of kompromat[4] (compromising material), and the ability to target crucial infrastructure.

That list of enemies is a long one, and has grown since Putin’s full-scale invasion of Ukraine in February 2022. Naturally, the Kremlin’s just-released 2023 Foreign Policy Concept[5] identifies the United States as the “main source of threats” to Russian security.

But Ukraine, every NATO and European Union member, and several other states are identified as “unfriendly countries[6]”, including Australia, Japan, Singapore and New Zealand.

War in the shadows

Russia utilises a range of methods to wage war in cyberspace.

On one end of the spectrum, it uses groups attached to official agencies, such as the GRU (military intelligence) and the FSB (ostensibly domestic intelligence, but also carries out missions overseas).

The GRU’s groups include Sandworm[7] and Fancy Bear[8]. Another group, Cozy Bear[9], is associated with the FSB.

One or more of these groups have been responsible for a series of prominent cyber attacks on a range of targets, including:

At the other end of the spectrum, Russian information operations regularly use armies of bots and trolls, as well as unsuspecting “citizen curators[10]”, to spread false narratives.

Doing so is cheap and increases the distance between the attacker and its agents, allowing for plausible deniability.

Like biological warfare, it also weaponises the targets to do the job of spreading the narrative disease for it.

Russian information campaigns operate globally, among nations it considers its friends as well as its adversaries. Russian-weaponised media can be found in Africa[11], where the Russian Wagner paramilitary organisation has been especially active, as well as in South Asia[12] and Australia[13].

Read more: Russian trolls targeted Australian voters on Twitter via #auspol and #MH17[14]

In many respects, Russian information operations mimic Soviet geopolitical doctrine during the Cold War. This focused on courting areas of the world where the West was weakest.

But in the grey space between official agencies, useful idiots and unwitting proxies is an area of increasing emphasis of Russian cyberwar: outsourcing. Some of these, such as Vulkan, retain an aura of respectability as consultancies that do government work as well as contracting to other firms.

They also include the Internet Research Agency in St Petersburg, which was used to coordinate social media attacks on the US Democratic Party during the 2018 mid-term elections, leading to an indictment[15] by the Department of Justice.

Others are [organised criminal gangs] like the aptly named “EvilCorp” (https://www.state.gov/transnational-organized-crime-rewards-program-2/maksim-viktorovich-yakubets/) that use malware to harvest people’s banking details or personal information.

The November 2022 breach of Australia’s private health insurer Medibank[16] was one example, which exposed patients’ sensitive health details such as treatments for drug addiction or HIV.

The Vulkan revelations

The Vulkan leak adds more detail to what we know about Russian methods, tactics and targets in cyberspace. The GRU group Sandworm is identified as having authorised Vulkan to help build “Skan-V[17]”, a piece of software that can monitor the internet to detect vulnerable servers to hack.

Another Vulkan project, known as “Fraction[18]”, was designed to monitor social media sites for key words to identify regime opponents, both at home and abroad.

An even larger project in which Vulkan seems to have been engaged was “Amezit[19]”. This is a tool that would enable operators to seize control of the internet both inside Russia and in other nations, and hijack information flows.

To function, its users need to be able to control physical infrastructure such as mobile phone towers and wireless internet nodes. Amezit can then be used to mimic legitimate sites and social media profiles, scrub content that might be deemed hostile, and replace it with disinformation.

Given the requirement to possess physical infrastructure, it’s clear Azemit was designed not solely as a piece of software, but to operate in tandem with the coercive instruments of a state.

This has internal uses as well as external ones. Domestically, it could be used to silence dissent in restive Russian regions. In a war zone, such as Ukraine, it could be used alongside Russia’s armed forces to intercept government communications and swap genuine information sources for false ones.

Read more: As Russia wages cyber war against Ukraine, here's how Australia (and the rest of the world) could suffer collateral damage[20]

The Vulkan leak also included information on physical objects. Although not a concise target list, its software allowed users to map physical infrastructure. This included airports worldwide, the Swiss Ministry of Foreign Affairs, and the Muhlberg nuclear power plant[21] near Bern.

What’s more, the document drop featured mapped clusters of internet servers[22] in the United States. And the Skan-V project identified a site in the US labelled “Fairfield[23]” as a potentially vulnerable point of entry.

If the documents are accurate, Vulkan’s work for the Russian government shows how extensive the Kremlin’s attempts have been to monitor digital infrastructure, collect information about vulnerabilities, and develop the capacity to hijack it.

Combating Russian cyber attacks

Cyber threats are insidious because they can be used in multiple combinations and aimed at different targets. Hack-and-leak campaigns against influential figures can be mixed with attempts to sabotage vital infrastructure, perform corporate espionage, undermine social cohesion and trust, and push fringe narratives to the political centre.

They can be drip-fed into the digital ecosystem. Or, much like the campaign that accompanied Russia’s takeover of Crimea in 2014, they can be employed all at once[24] in a cyber-blizzard.

This makes cyber attacks very hard to build resilience against, and even harder to deter. They are a weapon of potentially mass disruption that can result in real casualties. Turning off the power grid in a city, for example, can lead to deaths among people on life support in hospitals, traffic accidents, and exposure to extreme cold in certain regions.

Read more: A year on, Russia's war on Ukraine threatens to redraw the map of world politics – and 2023 will be crucial[25]

But beyond infrastructure and industry, such attacks also target social pressure points[26]: a states’ institutions, ideas and people. This makes them especially useful in attacking democracies, making the open and free exchange of views a potential vulnerability.

As the Vulkan leaks demonstrate, hostile governments have greater ambitions in cyberspace than being able to switch off the lights. They seek to be able to encourage us to question what we believe to be true, and pit us against one another.

Recognising that will be a crucial step in preventing the poisonous seeds of disinformation from taking root.

References

  1. ^ NTC Vulkan (www.theguardian.com)
  2. ^ whistleblower (www.techtimes.com)
  3. ^ confirmed (www.washingtonpost.com)
  4. ^ kompromat (www.washingtonpost.com)
  5. ^ Foreign Policy Concept (www.rbc.ru)
  6. ^ unfriendly countries (www.1news.co.nz)
  7. ^ Sandworm (www.wired.com)
  8. ^ Fancy Bear (www.crowdstrike.com)
  9. ^ Cozy Bear (www.crowdstrike.com)
  10. ^ citizen curators (academic.oup.com)
  11. ^ Africa (www.brookings.edu)
  12. ^ South Asia (www.nytimes.com)
  13. ^ Australia (theconversation.com)
  14. ^ Russian trolls targeted Australian voters on Twitter via #auspol and #MH17 (theconversation.com)
  15. ^ indictment (www.justice.gov)
  16. ^ Medibank (www.aljazeera.com)
  17. ^ Skan-V (www.lemonde.fr)
  18. ^ Fraction (www.theguardian.com)
  19. ^ Amezit (www.lemonde.fr)
  20. ^ As Russia wages cyber war against Ukraine, here's how Australia (and the rest of the world) could suffer collateral damage (theconversation.com)
  21. ^ nuclear power plant (www.spiegel.de)
  22. ^ internet servers (www.silicon.co.uk)
  23. ^ Fairfield (ctexaminer.com)
  24. ^ all at once (www.businessinsider.com)
  25. ^ A year on, Russia's war on Ukraine threatens to redraw the map of world politics – and 2023 will be crucial (theconversation.com)
  26. ^ social pressure points (www.tandfonline.com)

Read more https://theconversation.com/russias-shadow-war-vulkan-files-leak-show-how-putins-regime-weaponises-cyberspace-203146

The Times Features

How weight stigma in maternity care harms larger-bodied women and their babies

According to a study from the United States[1], women experience weight stigma in maternity care at almost every visit. We expect this experience to be similar in Australia, ...

10 Ways to Make Money Online and Provide Financial Stability

The possibility of earning money online has reached unprecedented heights. The proper strategy enables anyone to begin earning money. You don't need fancy degrees or special skil...

The Power of Exterior Design: How Facades Influence Property Value

First impressions count when it comes to real estate, and nothing quite sets the tone for a property like its exterior design. A building's facade is more than just an aesthetic ...

The Best Adjustable Bed and Mattress Packages for Comfort

The appropriate bed and mattress are essential for establishing the perfect sleep environment. If you seek a way to upgrade your sleep experience, adjustable bed and mattress pac...

Designing a Modern Home: Features That Will Make Your Dream House Stand Out

Designing your dream home is an exciting journey, and for many, it’s an opportunity to create a space that reflects their personal style, functionality needs, and modern trends. ...

Client Dinners Done Right: Tips for Meaningful Engagement

Client dinners offer more than just a meal—they’re an opportunity to build lasting business relationships in a more personal and relaxed setting. Done well, these dinners can str...

Times Magazine

Top Benefits of Hiring Commercial Electricians for Your Business

When it comes to business success, there are no two ways about it: qualified professionals are critical. While many specialists are needed, commercial electricians are among the most important to have on hand. They are directly involved in upholdin...

The Essential Guide to Transforming Office Spaces for Maximum Efficiency

Why Office Fitouts MatterA well-designed office can make all the difference in productivity, employee satisfaction, and client impressions. Businesses of all sizes are investing in updated office spaces to create environments that foster collaborat...

The A/B Testing Revolution: How AI Optimized Landing Pages Without Human Input

A/B testing was always integral to the web-based marketing world. Was there a button that converted better? Marketing could pit one against the other and see which option worked better. This was always through human observation, and over time, as d...

Using Countdown Timers in Email: Do They Really Increase Conversions?

In a world that's always on, where marketers are attempting to entice a subscriber and get them to convert on the same screen with one email, the power of urgency is sometimes the essential element needed. One of the most popular ways to create urg...

Types of Software Consultants

In today's technology-driven world, businesses often seek the expertise of software consultants to navigate complex software needs. There are several types of software consultants, including solution architects, project managers, and user experienc...

CWU Assistive Tech Hub is Changing Lives: Win a Free Rollator Walker This Easter!

🌟 Mobility. Independence. Community. All in One. This Easter, the CWU Assistive Tech Hub is pleased to support the Banyule community by giving away a rollator walker. The giveaway will take place during the Macleod Village Easter Egg Hunt & Ma...

LayBy Shopping