Behind the veil: Information warfare in Ukraine paves a shadowy path to war

by Olivia Savage & Anika Torruella

Ukraine experiences major information warfare campaign in February. (MoD Crown Copyright 2015)

Tensions have been rising in eastern Europe since late 2021 when Russia started amassing troops on the border of Ukraine, a former member of the Soviet Union. Michael Carpenter, the US ambassador to the Organization for Security Co-operation in Europe, detailed on 18 February that 169,000–190,000 Russian personnel had moved to the border, up from previous estimates of 150,000 Russian personnel.

On 21 February Russian President Vladimir Putin recognised the so-called Donetsk and Luhansk People's Republics in the Donbas region as independent states and directed the Russian defence ministry to deploy troops in the regions to carry out supposed “peacekeeping” functions. Putin announced a military invasion of Ukraine on 24 February, although the first explosions were heard outside the capital, Kyiv, early 23 February.

In the days leading up to the invasion, Ukraine has experienced a series of critical cyber attacks on its national infrastructure and has been the target of a disinformation campaign. Such tactics are commonly described as ‘hybrid warfare' – where non-traditional force multipliers such as cyber and social media intelligence attacks are employed – and use network infiltration, denial of information, denial of internet services, and other advanced persistent threats (APTs) to achieve strategic political and military effects.

Warfare in the cyber domain

According to the State Service of Special Communications and Information Protection of Ukraine (SSSCIP), cyber aggression in the form of distributed-denial-of-service (DDoS) attacks have been ongoing since 15 February, but intensified on 23 February.

Cyber attacks on Ukraine's infrastructure have been prevalent recently, so much so that on 14 February, NATO Secretary General Jens Stoltenberg stated that the alliance would sign an agreement with Ukraine to help improve cyber co-operation between the two entities, and allow the country to access NATO's malware information sharing platform.

On 15 February Ukraine experienced the largest DDoS attack in its history, where multiple devices attempted to overload and disrupt its systems. The attacks targeted government websites including the Ministry of Defence, armed forces, and the financial sector, rendering them temporarily inoperable.

A joint briefing of leading Ukrainian ministers and representatives commented on the attacks. The country's First Vice Prime Minister and Minister of Digital Transformation, Mykhailo Fedorov, said that the attacks would have cost millions of dollars and was intended to sow panic among Ukrainians. Natalia Tkachuk, head of the Information Security and Cyber Security Service of the National Security and Defence Council of Ukraine, stressed at the joint briefing that there was a significant change in the purpose and mechanisms of the most recent cyber attacks since there was a clear pivot away from obtaining intelligence information and personal data, to attempting to destabilise, discredit, and manipulate the country.

Tkachuk attributed the attacks to the so-called ‘aggressor country', noting that the cyber attacks had become a tool of the special information operations country. In conjunction with this, Head of the Cybersecurity Department of the Security Service (SBU) of Ukraine, Ilya Vityuk, added at the briefing that they were investigating suspects, and had detected traces of foreign intelligence services activity. They have determined, based on this and current realities, that Russia is the likely culprit. The UK's National Cyber Security Centre (NCSC) similarly determined, based on technical information from the DDoS attacks on 15 and 16 February, that the Russian Main Intelligence Directorate (GRU) was behind the attacks on the financial sector.

Victor Zhora, deputy head of the State Service for Special Communication and Information Protection (SSSCIP) of Ukraine, explained that the extent of the disruption was limited, as they were able to reduce the level of malicious traffic on its servers by restricting access control lists and configuring policies to combat DDoS-type attacks. Ukraine was able to avoid serious damage, with little losses and interruption, Deputy Secretary of the National Security and Defense Council of Ukraine, Serhiy Demedyuk, added.

The Computer Emergency Response Team of Ukraine (CERT-UA) – a team that handles cyber attacks in Ukraine – issued a warning on 21 February about possible attacks on more web browsers. This was followed by an announcement on 23 February by the SSSCIP that the country was experiencing another wave of DDoS attacks, targeting the websites of the Cabinet of Ministers of Ukraine, the Verkhovna Rada, the Ministry of Foreign Affairs, the Security Service of Ukraine, and other authorities. At the same time, the SSSCIP stated that “phishing attacks on public authorities and critical infrastructure, the spread of malicious software, as well as attempts to penetrate private and public sector networks and further destructive actions have intensified”.

Slovak Republic-based ESET and California-based Broadcom's Symantec cyber-security companies noted a new type of malware that wipes data, was used against Ukraine in the 23 February attacks. The malware was novel because it attacks the master boot record (MBR) of computers. Additionally, the malware may also have been active in Latvia and Lithuania, which could indicate intentional or unintentional regional spread. Pierluigi Paganini, a cyber-security expert, researcher, and instructor with the Infosec Institute, noted that the executable compilation timestamp of one of the samples was “2021-12-28”, “suggesting that the cyber attack might have been in preparation for almost two months”. ESET also stated that “temporal evidence points to potentially related malicious activity beginning as early as November 2021”. According to ESET, it was tracking the disk-wiping malware (Trojan.Killdisk) as ‘HermeticaWiper' in its analysis and noted it was targeted against “financial, defence, aviation, and IT services sectors”. HermeticaWiper appears as an executable file, which is signed by a certificate issued to Hermetica Digital Ltd. “The wiper abuses legitimate drivers from the EaseUS Partition Master software for corrupt data,” ESET stated on its blog.

The Ukrainian SSSCIP attributed the 23 February attacks to the Russian Secret Service, based on the use of specific bot networks. Critically, the DDoS attacks on 23 February occurred some 12 hours before Putin ordered a full-scale invasion of Ukraine. This evokes similarities with Russia's incursion of South Ossetia in Georgia, which US Army Colonel Bob Killebrew (retd) noted in his report ‘Russia-Georgia: Early Take' in Small Wars Journal , that Russian cyber attacks were used prior to and in sync with conventional attacks on the country. Similarly, while Russia commenced its invasion of Crimea in 2014, a major cyber offensive targeting Ukrainian officials and news agencies occurred. Given the timing of these attacks, it is likely that the attacks were co-ordinated by the GRU.

Social engineering, propaganda, and disinformation

Unconfirmed sources on Twitter have revealed specific propaganda and social engineering attacks, sent via SMS messages, to the personal devices of Ukrainian troops. These encourage abandoning posts, putting down arms, and other – more grisly – threats. Basically, using mobile platforms as the digital age equivalent to dropping propaganda leaflets.

Before it's invasion of Crimea in 2014, Russia employed cyber-warfare activities, including, but not limited to, intelligence collection, increasing message visibility, psychological warfare, distributing misinformation, and identifying scattered mobile targets. A noticeable difference is that Ukrainian media sites do not seem to be affected to the extent of similar websites and services in Crimea – perhaps because part of Moscow's strategy is to have a live, broadly distributed account of the invasion.

Ukraine has also repeatedly stated that it has been a victim of disinformation, with misleading or false narratives being spread about its forces and actions in the Donbas region. NATO's Digital Forensic Research Lab (DFRLab) has discovered 10 false and misleading accounts from Kremlin-controlled and pro-Kremlin media outlets in Russia regarding Ukrainian aggression over the past few months. This method of warfare has intensified since the beginning of February. DFRLab highlighted notable accounts of alleged disinformation, including the so-called Donetsk Peoples Republic's (DNR) defence ministry reporting that security services had managed to prevent a bombing of the Donetsk administrative building on 1 February by the Ukrainian special forces. However, the separatists did not provide any evidence that a bomb had been found or that Ukraine had been behind it.

Additionally, DFRLab documented that the Russian Defence Minister, Sergei Shoigu, claimed that US private military firms were preparing biochemical components to provoke fighting in eastern Ukraine, while the leader of the DNR, Denis Pushilin, added that Donetsk's water supply was planned to be poisoned. In direct response to this, Pentagon Press Secretary, John F Kirby, denied the allegations made against Ukraine. Similarly, the Ukrainian Ministry of Foreign Affairs spokesperson, Oleg Nikolenko, refuted the accusations stating that the messages were part of a Russian disinformation campaign.

The Commander-in-Chief of the Ukrainian Armed Forces, Lieutenant General Valery Zaluzhny, claimed on 21 February, that Moscow was continuing to spread disinformation about Ukraine forces. Lt Gen Zaluzhny alleged that Russia falsely claimed that Ukraine had started shelling areas in the Rostov region of Russia. According to Lt Gen Zaluzhny, these attacks were a deliberate attempt at provocation and were entirely false, especially considering that Ukraine's artillery units were 21 km away from the line of contact, exceeding the maximum firing range of Ukrainian rocket launchers.

Since the invasion, the Ukrainian Adviser to the Head of the President's Office, Mykhailo Podoliak, said on 24 February that its media and citizens had to be wary of any information, as disinformation was currently one of the greatest threats.

The use of information warfare – through information, disinformation, propaganda, and psychological warfare techniques, as well as the degradation of an enemy's information networks and output – is a common technique used by certain states. The intention is often to sow chaos, destabilise, discredit, and stoke fear and anxiety in a country. NATO Strategic Communications Centre of Excellence stated that “both states and non-state actors use hybrid approaches to pursue their political and military aims ... combining military operations with cyber attacks, diplomatic and/or economic pressure, and information (propaganda) campaigns”.

It should be noted that a report published by the Chief of the General Staff of the Russian Federation Armed Forces, Valery Gerasimov – as far back as 2013 – detailed that the very rules of war have changed, the role of adopting non-military means of achieving political and strategic goals have grown, and future warfare takes place not just in physical dimension but also in the information space.

UK explores new radar and IR tech to enhance SDA

by Olivia Savage

UK company Spaceflux has been contracted to develop and operate a ground-based SDA sensor as part of Project Nyx Alpha to monitor objects in GEO for UK Space Command. (Spaceflux)

The UK's Defence Science and Technology Laboratory (Dstl) is conducting three technology demonstrator programmes to explore the utility of novel space domain awareness (SDA) technologies.

The first programme is exploring the development of a Deep Space Radar (DSR) designed to monitor and protect geostationary orbit (GEO) assets such as the Skynet satellite communications system, William Feline, senior principal advisor for SDA at the UK Ministry of Defence (MoD), said at the Military Space Situational Awareness Conference 2024, held in London from 22 to 24 April.

The purpose of the programme is also to assess whether the UK needs its own DSR capability or whether it can rely on or complement the Deep Space Advanced Radar Capability (DARC) currently being developed alongside Australia and the US, Emma Kerr, senior principal engineer for SDA at Dstl told Janes .

A monostatic or biostatic system is being considered as well as whether a new or existing system is required, Feline said.


Get the full article by
Already a Janes subscriber? Keep reading


MDA, Lockheed Martin seek ‘final transition' of LRDR

by Carlo Munoz

An artist's concept of how Lockheed Martin's LRDR would detect ballistic missile launches from Asia. The radar completed preliminary design review in March and will go through critical design review in September 2027. (Lockheed Martin)

The Pentagon's Missile Defense Agency (MDA) and its industry counterparts at Lockheed Martin are preparing for the ‘final transition' of the long-awaited Long Range Discrimination Radar (LRDR) to the US armed forces in the Indo-Pacific region.

LRDR programme officials officially transitioned control of the S-band missile defence radar to the MDA on 23 April, according to a company statement. The handover of the system, currently stationed at Clear Space Force Station in Alaska, will allow agency officials to finalise the Operational Capability Baseline (OCB) milestone, which is the final stage before the LRDR is handed over to US Space Force (USSF) units. “Prior to this transition, the system has started space domain awareness data collects” for USSF units, the 23 April statement said.


Get the full article by
Already a Janes subscriber? Keep reading


Rafale enters Croatian service

by Gareth Jennings

One of the first six Rafales to be delivered to Croatia. Deliveries of all 12 aircraft will be complete by mid-2025. (Dassault)

Croatia has inducted into service the Dassault Rafale combat aircraft it recently received from France.

The manufacturer announced the milestone on 25 April, saying the first six of 12 Rafales had been formally received into service by the Croatian Air Force (Hrvatsko ratno zrakoplovstvo i protuzračna obrana: HRZ i PZO).

Having been handed over to the Croatian Ministry of Defence (MoD) at the French Air and Space Force (Armée de l'Air et de l'Espace: AAE) base at Mont-de-Marsan in France in 2023, these initial aircraft were received into the 91 operational base near Zagreb in a ceremony that was attended by Croation Prime Minister Andrej Plenković and Minister of Defence Ivan Anušić.

With the Rafale to be operated by 191 Squadron, the first of the follow-on batch of six aircraft will arrive in Croatia by the end of 2024 to complete the unit by mid-2025.

For more information on the Croatian Air Force, please seeCroatia – Air Force .


Get the full article by
Already a Janes subscriber? Keep reading


https://www.janes.com/defence-news/defence/latest/behind-the-veil-information-warfare-in-ukraine-paves-a-shadowy-path-to-war

Tensions have been rising in eastern Europe since late 2021 when Russia started amassing troops on t...

Latest Podcasts

Iran Israel analysis

In this podcast Janes analysts discuss the Iranian attacks on Israel on the 14 April. They highlight the military systems used by Iran and the performance and impact of these on Israel. They also discuss the implications of this attack goi...

Listen now

A focus on Libya

China Taiwan relations

AI applications for OSINT in defence

Tracking the situation in Israel-Gaza using OSINT

Janes Case Studies

Using Janes Intara to build a common intelligence picture: Russian build up on the Ukrainian border

View Case Study

Assessing threats in the South China Sea 

A competitive assessment of the military aircraft market

Identifying an unknown aircraft

Case study: Using Interconnected Intelligence to Monitor Russian Troop Movement

News Categories

Request Consultation

Request a free consultation to discover how Janes can provide you with assured, interconnected open-source intelligence.

Defence Details