“There will be another attack on Kiev in an hour. We need this data now,” Max Polyakov, international technology entrepreneur, head of EOS Data Analytics, told reporters on February 28, 2022. Ars Teknik. During a 20-minute phone call, Max stated that officials had presented his company to the Ukrainian Ministry of Defense to assist them in their strategy against Russian attacks, but that what he had was not enough for what he intended.

Polyakov asked commercial satellite operators flying over the area to share the information collected in real time for free instead of selling it: “We need this now. We are bombed every night and we are blinded at night. We need this data, please.” .

On the other side of the front, Russia began to face off against an Information Technology (IT) “army” summoned by Ukrainian Deputy Prime Minister Mykhailo Fedorov. nevertheless, according to Ars TeknikCyber ​​experts in favor of the occupied nation seized sites related to its ally Belarus, as well as several sites linked to the Kremlin, the presidential residence located in Moscow (the country’s largest and most important city ruled by Vladimir Putin). Banks, companies, and government portals did not escape the attack. “There will be tasks for everyone,” Fedorov said on his Twitter profile.

We are building an IT army. We need digital talent. All operational tasks will be assigned here: https://t.co/Ie4ESfxoSn. There will be tasks for everyone. We continue to fight on the cyber front. The first mission is in the channel for cyber experts.

— Mykhailo Fedorov (@FedorovMykhailo) February 26, 2022

“We are building an IT army. We need digital capabilities. All operational tasks will be assigned here: https://t.co/Ie4ESfxoSn. There are tasks for everyone. We will continue to fight on the cyber front. On the demand channel for the first Cyber ​​experts.” Mykhailo Fedorov (@FedorovMykhailo) February 26, 2022

Social networks also chose whom to support. As of March 10, 2022, Facebook and Instagram (both from Meta) posted hate speech and violence – supposedly banned in other cases – against Russia.

measure, according Reuterswas valid for residents of 11 countries. While the tech giant’s press office claims it won’t allow “real threats of violence against civilians” in an official statement, one of the messages it won’t block said “death to Russian invaders”.

In the 21st century, cybercrime does not trigger weapons in wars, it is also a source of defense and attack. Cyber ​​crime kills.

network of possibilities

In conflicts around the world, the exploitation of currently unprecedented resources continues: virtual attacks – an act that proves the devastating power within reach of those who use them, even in their early stages.

Stuart Madnick, a computer scientist and professor of Information Technology at North American institutions, said in a published article. Harvard Business Review“many weren’t as devastating as they could be”.

The expert adds: “This is likely due to a lack of knowledge of the potential damage scale of those who carry them out, but the attacks are also likely to go beyond virtual weapon tests”.

While such attacks are just tests, research by Madnick and colleagues revealed that energy systems are not immune to interference. As with nuclear power plants, remotely shutting them down or detonating or self-destructing causes damage that requires weeks or even months of repair, experts say. Steel companies and gas pipelines also faced similar situations.

In this scenario, civilian equipment or equipment not controlled by third parties becomes components of a war web, and its boundaries are fundamentally dependent on the capabilities of those responsible for its construction or hindering its progress.

Offensive (and defense)

Stuart explained that there are essentially two types of cyberattacks: direct and indirect. An indirect cyber attack does not target defined targets (military groups, etc.), such as those targeting energy supply, production chains, banking systems, communications, transportation and general supply; however, they jeopardize the functioning of a few activities. “How long can you last without electricity, food, water and money?” asked the scientist.

According to the professor, a direct cyberattack has a specific goal, such as stealing and destroying certain files. Still, according to Madnick, it triggers more personal consequences and, depending on who coordinates it, can even affect a specific population in a particular area.

Either way, you need to know how to defend yourself. Mobilizing collective action to improve the virtual security systems of vital infrastructure for the public and influencing both governments and the private sector is one way to contain the damage from indirect cyber attacks.

Stuart often thought that the level of vulnerability was discovered only when it was already too late to eliminate risks, so it was part of preparing for a digital world to monitor any event that could have a catastrophic succession and to close any gaps, no matter how small. war.

In this sense, for example, in early March 2022, the United States Senate passed a bill requiring companies to formally report attacks to authorities within 24 to 72 hours, depending on the situation. trap wire.

On the other hand, it’s simpler to block direct cyberattacks, according to Madnick. All you have to do is set secure passwords, keep software up-to-date and install antivirus and malware detectors, as well as back up data to safe places (you can find them easily in the app) to avoid losing files. Technology World).

after the destruction

Satellite images from the National Aeronautics and Space Administration (NASA) on March 7, 2022 showed how Ukraine was virtually without power after the Russian invasion. Washington postThe following Friday, the temperature reached -10 °C in Kiev.

Considering that both the above-mentioned heating systems and various other sources rely on electrical energy, their side effects on civilians are not unexpected. This account includes water treatment equipment; supply distribution structures; channels to warn of attacks or offer assistance; hospital equipment and devices aimed at the proper storage of vaccines and medicines; and more.

war

Finally, returning to the plans of Ukrainian Deputy Prime Minister Mykhailo Fedorov, his demands included cyberattacks on Russian electricity and transport networks. Local digital security expert Yegor Aushev stressed that the team will undermine any infrastructure that aids enemy troops and will “do everything in its power to stop the war” on those they see as invaders. Reuters.

So, in Russia, Ukraine or elsewhere on the planet, any citizen feels the effects of cyber attacks, even thousands of kilometers away, who do not know the geographical boundaries and do not “know” the people they will hit.


Source: Tec Mundo

Previous articleWindows 11 Now Forces Installation Even On Incompatible PCs
Next articleTom Holland will return as Spider-Man in 2023.
I am a passionate and hardworking journalist with an eye for detail. I specialize in the field of news reporting, and have been writing for Gadget Onus, a renowned online news site, since 2019. As the author of their Hot News section, I’m proud to be at the forefront of today’s headlines and current affairs.

LEAVE A REPLY

Please enter your comment!
Please enter your name here