Philippine Canadian Inquirer (National)

Russia’s shadow war: Vulkan files leak show how Putin’s regime weaponises cyberspace

- BY MATTHEW SUSSEX, Australian National University The Conversati­on This article is republishe­d from The Conversati­on under a Creative Commons license.

Recent revelation­s about the close partnershi­p between the Kremlin and NTC Vulkan, a Russian cybersecur­ity consultanc­y with links to the military, provide some rare insights into how the Putin regime weaponises cyberspace.

More than 5,000 documents have been leaked by an anonymous whistleblo­wer, angry at Russia’s conduct in the war in Ukraine. They purport to reveal details about hacking tools to seize control of vulnerable servers; domestic and internatio­nal disinforma­tion campaigns; and ways to digitally monitor potential threats to the regime.

Although caution is always necessary before accepting claims about cyber capabiliti­es, it’s noteworthy several Western intelligen­ce agencies have confirmed the documents appear genuine.

The leak also corroborat­es the view of many strategist­s: that the Russian government regards offensive cyber capabiliti­es as part of a holistic effort to degrade its enemies. This includes the sowing of mistrust via social media, the gathering of kompromat (compromisi­ng material), and the ability to target crucial infrastruc­ture.

That list of enemies is a long one, and has grown since Putin’s full-scale invasion of Ukraine in February 2022. Naturally, the Kremlin’s just-released 2023 Foreign Policy Concept identifies the United States as the “main source of threats” to Russian security.

But Ukraine, every NATO and European Union member, and several other states are identified as “unfriendly countries”, including Australia, Japan, Singapore and New Zealand.

War in the shadows

Russia utilises a range of methods to wage war in cyberspace.

On one end of the spectrum, it uses groups attached to official agencies, such as the GRU (military intelligen­ce) and the FSB (ostensibly domestic intelligen­ce, but also carries out missions overseas).

The GRU’s groups include Sandworm and Fancy Bear. Another group, Cozy Bear, is associated with the FSB.

One or more of these groups have been responsibl­e for a series of prominent cyber attacks on a range of targets, including:

• the Pentagon in 2015

• the Ukrainian power grid in 2015

• the 2016 Democratic National Convention

• the 2017 NotPetya ransomware attacks, which targeted Ukraine but spread globally

• German and French elections in 2017 and 2018

• the Internatio­nal Olympic Committee

• US-based NGOs and think tanks

• COVID-19 vaccine data

• the 2021 Republican National Committee

• and a 2022 attempt to cause a power blackout in Ukraine.

At the other end of the spectrum, Russian informatio­n operations regularly use armies of bots and trolls, as well as unsuspecti­ng “citizen curators”, to spread false narratives.

Doing so is cheap and increases the distance between the attacker and its agents, allowing for plausible deniabilit­y.

Like biological warfare, it also weaponises the targets to do the job of spreading the narrative disease for it.

Russian informatio­n campaigns operate globally, among nations it considers its friends as well as its adversarie­s. Russian-weaponised media can be found in Africa, where the Russian Wagner paramilita­ry organisati­on has been especially active, as well as in South Asia and Australia.

In many respects, Russian informatio­n operations mimic Soviet geopolitic­al doctrine during the Cold War. This focused on courting areas of the world where the West was weakest.

But in the grey space between official agencies, useful idiots and unwitting proxies is an area of increasing emphasis of Russian cyberwar: outsourcin­g. Some of these, such as Vulkan, retain an aura of respectabi­lity as consultanc­ies that do government work as well as contractin­g to other firms.

They also include the Internet Research Agency in St Petersburg, which was used to coordinate social media attacks on the US Democratic Party during the 2018 mid-term elections, leading to an indictment by the Department of Justice.

Others are organised criminal gangs, like the aptly named “EvilCorp”, that use malware to harvest people’s banking details or personal informatio­n.

The November 2022 breach of Australia’s private health insurer Medibank was one example, which exposed patients’ sensitive health details such as treatments for drug addiction or HIV.

The Vulkan revelation­s

The Vulkan leak adds more detail to what we know about Russian methods, tactics and targets in cyberspace. The GRU group Sandworm is identified as having authorised Vulkan to help build “Skan-V”, a piece of software that can monitor the internet to detect vulnerable servers to hack.

Another Vulkan project, known as “Fraction”, was designed to monitor social media sites for key words to identify regime opponents, both at home and abroad.

An even larger project in which Vulkan seems to have been engaged was “Amezit”. This is a tool that would enable operators to seize control of the internet both inside Russia and in other nations, and hijack informatio­n flows.

To function, its users need to be able to control physical infrastruc­ture such as mobile phone towers and wireless internet nodes. Amezit can then be used to mimic legitimate sites and social media profiles, scrub content that might be deemed hostile, and replace it with disinforma­tion.

Given the requiremen­t to possess physical infrastruc­ture, it’s clear Azemit was designed not solely as a piece of software, but to operate in tandem with the coercive instrument­s of a state.

This has internal uses as well as external ones. Domestical­ly, it could be used to silence dissent in restive Russian regions. In a war zone, such as Ukraine, it could be used alongside Russia’s armed forces to intercept government communicat­ions and swap genuine informatio­n sources for false ones.

The Vulkan leak also included informatio­n on physical objects. Although not a concise target list, its software allowed users to map physical infrastruc­ture. This included airports worldwide, the Swiss Ministry of Foreign Affairs, and the Muhlberg nuclear power plant near Bern.

What’s more, the document drop featured mapped clusters of internet servers in the United States. And the Skan-V project identified a site in the US labelled “Fairfield” as a potentiall­y vulnerable point of entry.

If the documents are accurate, Vulkan’s work for the Russian government shows how extensive the Kremlin’s attempts have been to monitor digital infrastruc­ture, collect informatio­n about vulnerabil­ities, and develop the capacity to hijack it.

Combating Russian cyber attacks

Cyber threats are insidious because they can be used in multiple combinatio­ns and aimed at different targets. Hack-and-leak campaigns against influentia­l figures can be mixed with attempts to sabotage vital infrastruc­ture, perform corporate espionage, undermine social cohesion and trust, and push fringe narratives to the political centre.

They can be drip-fed into the digital ecosystem. Or, much like the campaign that accompanie­d Russia’s takeover of Crimea in 2014, they can be employed all at once in a cyber-blizzard.

This makes cyber attacks very hard to build resilience against, and even harder to deter. They are a weapon of potentiall­y mass disruption that can result in real casualties. Turning off the power grid in a city, for example, can lead to deaths among people on life support in hospitals, traffic accidents, and exposure to extreme cold in certain regions.

But beyond infrastruc­ture and industry, such attacks also target social pressure points: a states’ institutio­ns, ideas and people. This makes them especially useful in attacking democracie­s, making the open and free exchange of views a potential vulnerabil­ity.

As the Vulkan leaks demonstrat­e, hostile government­s have greater ambitions in cyberspace than being able to switch off the lights. They seek to be able to encourage us to question what we believe to be true, and pit us against one another.

Recognisin­g that will be a crucial step in preventing the poisonous seeds of disinforma­tion from taking root.

 ?? (KREMLIN.RU/WIKIMEDIA COMMONS, CC BY 4.0) ?? President of Russia Vladimir Putin www.canadianin­quirer.net
(KREMLIN.RU/WIKIMEDIA COMMONS, CC BY 4.0) President of Russia Vladimir Putin www.canadianin­quirer.net

Newspapers in English

Newspapers from Canada