Skip to content

In 2024, Russian cyber attacks experienced a significant decrease by nearly half during the second part of the year.

Cyber activities conducted by Russia saw a 48% surge in the latter half of 2024, as compared to the initial six months.

In 2024, Russian cyber attacks experienced a significant decrease by nearly half during the second part of the year.

In the back half of 2024, the frequency of Russian cyber attacks significantly surged, skyrocketing by a staggering 48% compared to the first half of the year. According to the experts at CERT-UA, these digital onslaughts have become increasingly sophisticated and targeted.

The new phase of Russian cyber operations is characterized by automated attacks, supply chain compromises, and a blend of espionage and sabotage tactics. The primary objective of these attacks has been to gain access to frontline intelligence systems, defense enterprises, and even energy infrastructure, potentially impacting the operational situation on the front.

Analyzing this trend, it's clear that Russian hackers are adopting a more coordinated, complex, and destructive approach, targeting critical infrastructure with a high threat level. Despite these aggressive tactics, Ukraine's improved cyber hygiene, early threat detection, and international cooperation have helped thwart a significant portion of these attacks.

For instance, back in April, the State Special Communications Service issued a warning about targeted cyber activity aimed at spying on Ukrainian institutions involved in the development of innovative military technologies.

In detail, the second half of 2024 saw a massive 48% increase in incidents, totaling 2,576 logs by CERT-UA. These attacks have become more complex, with threat actors leveraging automation and supply chain compromises to infiltrate through software suppliers. The focus of these attacks has shifted to frontline intelligence systems, defense contractors, and energy infrastructure, often preceding kinetic strikes.

Moreover, there's been a 112% rise in malware campaigns that use cloud services like Google Drive and GitHub for distribution, making them harder to detect. New military-linked groups have emerged, demonstrating higher aggression and scalability compared to traditional FSB-affiliated units.

These cyberattacks have become an integral part of Russia's hybrid warfare strategy, often synchronized with military actions. For example, energy grid compromises have occurred before missile strikes. Long-term operations (lasting 6-8 months) reuse compromised OT infrastructure, exploiting vendors with weaker security.

The impact of these cyberattacks has been profound, especially on the energy sector. Attacks aimed at disabling power systems and disrupting civilian morale have become common, with malware used to prolong recovery efforts. The defense industry has also been under heavy fire, with a focus on situational awareness systems and specialized manufacturers to degrade Ukraine’s military response.

Despite the increased number of phishing attempts (over 750), improved cyber hygiene has reduced confirmed infections by an impressive 90%. Early detection has prevented 77% of high-severity incidents from escalating. International collaboration has also helped improve threat intelligence sharing and rapid response protocols. CERT-UA prioritizes AI-driven analysis to counter automated attacks and supply chain risks.

In summary, Russia's digitally augmented hybrid warfare strategy has become increasingly dangerous, blending cyber sabotage with physical destruction to destabilize Ukraine's critical systems. However, proactive measures such as enhanced monitoring, improved cyber hygiene, international cooperation, and adaptive defense strategies have helped mitigate these threats, offering a glimmer of hope in this digital battleground.

  1. Ukrainian authorities have identified a rise in Russian hackers using complex and targeted tactics, with a significant increase of 48% in cyber attacks during the second half of 2024.
  2. The new phase of Russian cyber operations includes automated attacks, supply chain compromises, and a combination of espionage and sabotage, aimed at frontline intelligence systems, defense enterprises, and energy infrastructure.
  3. Malware campaigns have increased by 112%, using cloud services like Google Drive and GitHub for distribution, making them harder to detect, while new military-linked groups have demonstrated higher aggression and scalability.
  4. Cyberattacks have become an integral part of Russia's hybrid warfare strategy, often synchronizing with military actions, with energy grid compromises occurring before missile strikes.
  5. Despite the increased number of cyber threats, improved cyber hygiene, early detection, and international cooperation have helped thwart a significant portion of these attacks, reducing confirmed infections by 90% and preventing 77% of high-severity incidents from escalating.
Cyber attacks by Russia escalated significantly in the latter half of 2024, showing a dramatic 48% surge compared to the preceding six months.

Read also:

    Latest