Shared from www.cnn.com
If the recent past is any indication, there are a number of ways Russian hackers could disrupt US businesses and the general public.
Some of the biggest cyberattacks against US infrastructure in the past two years have been linked to suspected Russian hackers. The list includes the SolarWinds hack that infiltrated several government agencies in 2020, the ransomware attack that forced a shutdown of one of America’s largest fuel pipelines for several days last year and another attack on one of the world’s largest meat producers, JBS.
While many online attacks can’t directly be linked to the Russian state, there’s a widespread belief that hackers operate with Russia’s blessing, according to Herb Lin, a senior research scholar for cyber policy and security at Stanford University’s Center for International Security and Cooperation.
“They don’t operate directly for the Russian government, but they operate under a set of rules that says: ‘you guys do what you want… don’t target Russian stuff and we won’t bother you,'” Lin told CNN Business.
Spillover from Ukraine
Ukraine has already faced multiple cyberattacks since the conflict with Russia started, including one on Wednesday that targeted the website of the country’s parliament as well as several banks and government agencies.
Analysts say even targeted cyberattacks against Ukraine could potentially have implications beyond the country’s borders (both physical and virtual). In a report Tuesday, analysts at S&P Global Ratings flagged “a heightened risk of cyberattacks on Ukraine… which could create knock-on effects for corporations, governments, and other parties in the region and beyond.”
Companies worldwide that work with organizations in Ukraine need to be particularly careful, the analysts added, “since connections to Ukrainian systems might be used as a pivot point to other targets.”
Military targets
Even if Russian hackers don’t directly set their sights on US entities, Ukraine’s dependence on foreign technology can pose big problems for the United States, according to Lin.
“For example, Ukraine doesn’t have its own spy satellites, so where does it get its spy imagery? It gets it from commercial satellites,” Lin said, with some of the companies behind those commercial satellites potentially located in the United States. “That’s an obvious place you would expect Russian cyberattacks to be targeted. And that’s just one example of what could be possible.”
Should the conflict in Ukraine escalate further, Lin added, “all the stuff in the United States that directly helps the Ukrainian military machine… becomes fair game for the Russians to target.”
Domestic targets
As past precedent has shown, Russian cyberattackers increasingly seem to target large-scale US infrastructure — and there’s only so much consumers can do about it despite the resulting disruption to their own lives.
The burden is arguably on the public and private sector to prepare. Lin notes that the US banking system may be particularly vulnerable to attacks, with Biden’s sanctions aimed at crippling the Russian financial system making American banks a ripe target for retaliation — particularly if the US moves to further cut off Russia from global financial networks.
The Biden administration has focused on shoring up US cyber defenses in recent months to protect against overseas attacks, including government entities and major businesses. But vulnerabilities always exist, and all it takes is one breach.
“Will they [cyberattackers] have more difficulty being successful? Yes, but the problem is that we don’t see those,” Lin said. “Let’s say they’re successful one in ten times instead of one in five times. It’s still one in ten, nobody notices the others that have failed.”
— CNN’s Sean Lyngaas and Julia Horowitz contributed to this report
Images and Article from www.cnn.com