Two weeks ago, the world watched in horror as Russia launched an unprovoked attack on Ukraine, a democratically elected, sovereign nation. We continue to watch with admiration as a nation’s civilian population have taken up arms to fight for their homeland. Both domestically and internationally, the response has been galvanizing. Governments have both condemned Russia’s actions and placed sanctions meant to pressure Russia into ending their assault. Businesses have severed ties with Russia in an effort to pressure the people of Russia to take a stand against Putin and his violent forces.
Proactively bracing for retaliation, the cyber security industry and various government security agencies such as the FBI, have issued directives and warnings to both private and corporate businesses. Those directives detailed the very likely scenario of cyber-attacks against the US and rest-of-world (ROW) as the Russian government begins to broaden its scope beyond Ukraine. The U.S. Department of Homeland Security issued a warning to U.S. businesses urging them to be prepared for Russian cyber-attacks, reiterating that the threat is “ongoing.” While this guidance is all relevant, timely, and critical, it nonetheless begs an obvious question,
“So what’s changed? Hasn’t Russia been actively engaged in cyber-attacks all along?”
Unfortunately, the answer isn’t black and white. While the prevailing assumption is that Russian threat actors are “State Sponsored,” there has never been enough evidence to directly accuse the Russian government of the cyber-attacks launched from inside their country. Case in point, just a short time ago, Russian hackers took down the Colonial Pipeline, the largest fuel pipeline in the U.S., with a ransomware attack. While the Russian government was never named in the attack, it was strongly suggested that the attackers were state sponsored. In response, Russia announced the arrest of numerous members of the REvil hacking group in a highly publicized “event” and at the request of the US Government. Prior to the invasion, and shortly after the REvil attack, Ukraine’s government experienced a massive cyberattack. Again, while not “attributed to Russia,” the mode of attack was strikingly similar to attacks carried out in advance of conflict with Georgia in 2008 and Crimea in 2014. Therefore, it is no stretch of the imagination to conclude that Russia is, indeed, still our enemy.
We know that once sanctions against Russia begin to take economic affect and they start to broaden their focus beyond Ukraine, cyber-attacks against the US, NATO and our allies will begin… and be brutal in their onslaught. So, what can you do to protect from the very real Russian threat of cyber-attacks?
The answer is by no means sexy or exciting. It is, however, achievable. Let’s start with application security and then look at ways to protect the organization as a whole. There are short-term and long-term best practices that can protect you from not only this enhanced threat level, but also ensuring the security of your applications in production:
By adopting a layered approach to application security throughout your SDLC and implementing strong security hygiene throughout your network, your organization can protect from attacks from wherever they originate, whether by threat actors operating within Russia, by state sponsored attacks from Russia, or by threat actors attacking from across the globe.