Have a personal or library account? Click to login
Cyber Warfare in the Russo-Ukrainian War Cover
Open Access
|Feb 2025

References

  1. A10, 2022. Cyber Warfare: Nation State Sponsored Cyber Attacks. <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="https://www.a10networks.com/blog/cyber-warfare-nation-state-sponsored-cyber-attacks/">https://www.a10networks.com/blog/cyber-warfare-nation-state-sponsored-cyber-attacks/</ext-link>, 10. december 2024.
  2. AI Team, 2024. Rogue AI is the Future of Cyber Threats. TrendMicro. <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="https://www.trendmicro.com/en_fi/research/24/h/rogue-ai-part-1.html">https://www.trendmicro.com/en_fi/research/24/h/rogue-ai-part-1.html</ext-link>, 10. december 2024.
  3. Bartles, C. K., 2016. The Gerasimov Doctrine and Russian Non-Linear War. Military Review, 96(1), str. 30–37.
  4. Bateman, J., 2022. Russia’s Wartime Cyber Operations in Ukraine: Military Impacts, Influences, and Implications. Carnegie Endowment for International Peace, str. 31–49. <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="https://carnegieendowment.org/2022/12/16/russia-s-wartime-cyber-operations-in-ukraine--military-impacts-influences-and-implications-pub-88657">https://carnegieendowment.org/2022/12/16/russia-s-wartime-cyber-operations-in-ukraine--military-impacts-influences-and-implications-pub-88657</ext-link>, 13. december 2024.
  5. Clarke, R. A., 2010. Cyber War, HarperCollins.
  6. Connel, M., in Vogler, S., 2017. Russia’s Approach to Cyber Warfare. CNA Analysis and Solutions. <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="https://www.cna.org/archive/CNA_Files/pdf/dop-2016-u-014231-1rev.pdf">https://www.cna.org/archive/CNA_Files/pdf/dop-2016-u-014231-1rev.pdf</ext-link>, 12. december 2024.
  7. Corera, G., 2023. Ukraine war: Cyber-teams fight a high-tech war on front lines. BBC. <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="https://www.bbc.com/news/world-europe-66686584">https://www.bbc.com/news/world-europe-66686584</ext-link>, 17. december 2024.
  8. CrowdStrike, 2022. Technical Analysis of the WhisperGate Malicious Bootloader. <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="https://www.crowdstrike.com/blog/technical-analysis-of-whispergate-malware/">https://www.crowdstrike.com/blog/technical-analysis-of-whispergate-malware/</ext-link>, 22. november 2024.
  9. Cyber Peace Institute, 2022. Case Study: Viasat. <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="https://cyberconflicts.cyberpeaceinstitute.org/law-and-policy/cases/viasat">https://cyberconflicts.cyberpeaceinstitute.org/law-and-policy/cases/viasat</ext-link>, 17. december 2024.
  10. Duguin, S., Pavlova, P., 2023. The role of cyber in the Russian war against Ukraine: Its impact and the consequences for the future of armed conflict. European Parliment. <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="https://www.europarl.europa.eu/RegData/etudes/BRIE/2023/702594/EXPO_BRI(2023)702594_EN.pdf">https://www.europarl.europa.eu/RegData/etudes/BRIE/2023/702594/EXPO_BRI(2023)702594_EN.pdf</ext-link>, 10. december 2024.
  11. ESET, 2022. Industroyer2: Industroyer reloaded. <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="https://www.welivesecurity.com/2022/04/12/industroyer2-industroyer-reloaded/">https://www.welivesecurity.com/2022/04/12/industroyer2-industroyer-reloaded/</ext-link>, 1. december 2024.
  12. HeadMind Partners, 2022. Industroyer 2 : the Russian Cyberattack on Ukraine Infrastructure. <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="https://www.headmind.com/industroyer-2/">https://www.headmind.com/industroyer-2/</ext-link>, 3. november 2024.
  13. Lyons, J., 2022. Data-wiper malware strains surge as Ukraine battles ongoing invasion. The Register. <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="https://www.theregister.com/2022/04/29/wiper_attacks_jump_500_percent/">https://www.theregister.com/2022/04/29/wiper_attacks_jump_500_percent/</ext-link>, 22. november 2024.
  14. Microsoft, 2022. Destructive malware targeting Ukrainian organizations. <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="https://www.microsoft.com/en-us/security/blog/2022/01/15/destructive-malware-targeting-ukrainian--organizations/">https://www.microsoft.com/en-us/security/blog/2022/01/15/destructive-malware-targeting-ukrainian--organizations/</ext-link>, 10. december 2024.
  15. NATO 2030, 2020. United for the new Era. Analysis and Recommendations of the Reflection Group Appointed by the NATO Secretary General. <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="https://www.nato.int/nato_static_fl2014/assets/pdf/2020/12/pdf/201201-Reflection-Group-Final-Report-Uni.pdf">https://www.nato.int/nato_static_fl2014/assets/pdf/2020/12/pdf/201201-Reflection-Group-Final-Report-Uni.pdf</ext-link>, 24. november 2024.
  16. Page, C., 2022. US, UK and EU blame Russia for »unacceptable« Viasat cyberattack. Techcrunch. <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="https://techcrunch.com/2022/05/10/russia=-viasat-cyberattack/?guccounter-1&amp;guce_referrer=aHR0cHM6Ly93d3cucXdhbnQuY29tLw&amp;guce_referrer_sig=AQAAAA5wODCUfzch8gg0n1XY6wQXOUYLUpxz8TEv1nO6nDGv_Je-w-NNTGwxP3zqrN9JlT-FNDzMPit2knLXpwyIqzPyJuZ1a7jw75_hTnoW8wSJaJ4mSb5ieFGIZEyMkppcX37D5jOCcWoLuJnf80VSdOc-W1nj21wW8LOChfkQ1UFQ">https://techcrunch.com/2022/05/10/russia=-viasat-cyberattack/?guccounter-1&amp;guce_referrer=aHR0cHM6Ly93d3cucXdhbnQuY29tLw&amp;guce_referrer_sig=AQAAAA5wODCUfzch8gg0n1XY6wQXOUYLUpxz8TEv1nO6nDGv_Je-w-NNTGwxP3zqrN9JlT-FNDzMPit2knLXpwyIqzPyJuZ1a7jw75_hTnoW8wSJaJ4mSb5ieFGIZEyMkppcX37D5jOCcWoLuJnf80VSdOc-W1nj21wW8LOChfkQ1UFQ</ext-link>, 10. november 2024.
  17. Pratt, M. K., posodobljeno 2022. Cyber attack. TechTarget. <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="https://www.techtarget.com/searchsecurity/definition/cyber-attack">https://www.techtarget.com/searchsecurity/definition/cyber-attack</ext-link>, 10. december 2024.
  18. Rid, T., 2020. Active Measures: The Secret History of Disinformation and Political Warfare. Farrar, Straus and Giroux.
  19. Sanger, D. E., in Barnes, J. E., 2022. The Russian cyberwar campaign in Ukraine is unfolding slowly, cautiously. The New York Times. <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="https://www.nytimes.com/2022/02/27/us/politics/russia-cyberattacks-ukraine.html">https://www.nytimes.com/2022/02/27/us/politics/russia-cyberattacks-ukraine.html</ext-link>, 10. december 2024.
  20. Singer, P. W., in Friedman, A., 2014. Cybersecurity and cyberwar : what everyone needs to know. Oxford University Press. <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="https://www.worldcat.org/title/802324804">https://www.worldcat.org/title/802324804</ext-link>, 15. december 2024.
  21. Spînu, N., 2020. Ukraine Cybersecurity Governance Assessment. Geneva Centre for Securtiy Sector Governance. <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="https://www.dcaf.ch/sites/default/files/publications/documents/UkraineCybersecurityGovernanceAssessment.pdf">https://www.dcaf.ch/sites/default/files/publications/documents/UkraineCybersecurityGovernanceAssessment.pdf</ext-link>, 10. december 2024.
  22. The BlackBerry Research and Intelligence Team, 2022. Threat Thursday: Malware Rebooted - How Industroyer2 Takes Aim at Ukraine Infrastructure. BlackBerry. <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="https://blogs.blackberry.com/en/2022/05/threat-thursday-malware-rebooted-how-industroyer2-takes-aim-at-ukraine-infrastructure">https://blogs.blackberry.com/en/2022/05/threat-thursday-malware-rebooted-how-industroyer2-takes-aim-at-ukraine-infrastructure</ext-link>, 4. december 2024.
  23. Vasquez, C., in Groll, E., 2023. Satellite hack on eve of Ukraine war was a coordinated, multi-pronged assault. Cyberscoop. <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="https://cyberscoop.com/viasat-ka-sat-hack-black-hat/">https://cyberscoop.com/viasat-ka-sat-hack-black-hat/</ext-link>, 5. december 2024.
  24. Viasat, 2022. KA-SAT Network cyber attack overview. <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="https://news.viasat.com/blog/corporate/ka-sat-network-cyber-attack-overview">https://news.viasat.com/blog/corporate/ka-sat-network-cyber-attack-overview</ext-link>, 7. november 2024.
  25. Wilde, G., 2022. Cyber Operations in Ukraine: Russia’s Unmet Expectations. Carnegie Endowment for International Peace <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="https://carnegieendowment.org/files/202212-Wilde_RussiaHypotheses-v2.pdf">https://carnegieendowment.org/files/202212-Wilde_RussiaHypotheses-v2.pdf</ext-link>, 10. december 2024.
  26. Willett, M., 2022. The Cyber Dimension of the Russia–Ukraine War. Survival. <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="https://www.researchgate.net/publication/364176417_The_Cyber_Dimension_of_the_Russia--Ukraine_War">https://www.researchgate.net/publication/364176417_The_Cyber_Dimension_of_the_Russia--Ukraine_War</ext-link>, 8. december 2024.
DOI: https://doi.org/10.2478/cmc-2024-0030 | Journal eISSN: 2463-9575 | Journal ISSN: 2232-2825
Language: English, Slovenian
Page range: 149 - 164
Published on: Feb 5, 2025
Published by: General Staff of the Slovenian Armed Forces
In partnership with: Paradigm Publishing Services
Publication frequency: 4 times per year

© 2025 Vladimir Prebilič, Patrik Rebrica, published by General Staff of the Slovenian Armed Forces
This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License.