Thursday, June 5, 2025
Advertise with us
Support us
Write for us
No Result
View All Result
claws
  • Home
  • About Us
    • Director General
    • Additional Director General
    • Jottings by Director General Emiritus
    • CLAWS Membership
    • Faculty
  • Publication
    • Web Articles
    • Issue Briefs
    • Manekshaw Papers
    • Newsletter
    • CLAWS Journal
    • Scholar Warrior
    • Books
    • Essay
    • Intern Articles
    • External Publications
  • Research Areas
    • Global & Regional Security
      • China
      • Pakistan
      • Afghanistan
      • South Asia
      • Indo Pacific
      • US, EU & Russia
      • MENA
      • CAR
    • National Security
      • National Security Strategy
      • Nuclear Deterrence
      • Non Traditional Threats
      • Intelligence
      • Terrorism & Internal Security
      • Grey Z & IW
      • Security Laws
    • Military Studies
      • Military Doctrine
      • Military Strategy
      • Peace Keeping Ops
      • Military History
      • Military Logistics
      • Out of Area Contingency Ops
      • Leadership
    • Military Technology & Defence Acquisition
      • Military Technology
      • Defence Acqn
      • Budgets & Finance
      • Defence Infrastructure
      • Human Resources
    • Multi Domain Studies
      • Jointmanship & Integration
      • Space
      • Cyber
      • Spl Operations
      • Energy & Environment
      • Defence Eco System
      • Defence Diplomacy
      • HADR
  • Web Archive
  • Events
    • Seminars
    • Webinars/RTD
  • PROMEX
  • University Cell
    • About The Initiative
    • Admission: Eligibility and Procedure
    • Important Information
    • Administration
    • Guides | Supervisors
  • Careers
  • Contact
  • Home
  • About Us
    • Director General
    • Additional Director General
    • Jottings by Director General Emiritus
    • CLAWS Membership
    • Faculty
  • Publication
    • Web Articles
    • Issue Briefs
    • Manekshaw Papers
    • Newsletter
    • CLAWS Journal
    • Scholar Warrior
    • Books
    • Essay
    • Intern Articles
    • External Publications
  • Research Areas
    • Global & Regional Security
      • China
      • Pakistan
      • Afghanistan
      • South Asia
      • Indo Pacific
      • US, EU & Russia
      • MENA
      • CAR
    • National Security
      • National Security Strategy
      • Nuclear Deterrence
      • Non Traditional Threats
      • Intelligence
      • Terrorism & Internal Security
      • Grey Z & IW
      • Security Laws
    • Military Studies
      • Military Doctrine
      • Military Strategy
      • Peace Keeping Ops
      • Military History
      • Military Logistics
      • Out of Area Contingency Ops
      • Leadership
    • Military Technology & Defence Acquisition
      • Military Technology
      • Defence Acqn
      • Budgets & Finance
      • Defence Infrastructure
      • Human Resources
    • Multi Domain Studies
      • Jointmanship & Integration
      • Space
      • Cyber
      • Spl Operations
      • Energy & Environment
      • Defence Eco System
      • Defence Diplomacy
      • HADR
  • Web Archive
  • Events
    • Seminars
    • Webinars/RTD
  • PROMEX
  • University Cell
    • About The Initiative
    • Admission: Eligibility and Procedure
    • Important Information
    • Administration
    • Guides | Supervisors
  • Careers
  • Contact
No Result
View All Result
CLAWS
No Result
View All Result
Home Articles

Analysis of Cyberattacks and Hacking Strategies in Information manipulation during Russia-Ukraine war

Anjali ManhasbyAnjali Manhas
August 27, 2024
in Articles
A A
0
Post Views: 49

The rise of cyber-attacks as an effective means of statecraft has introduced a new dimension to modern warfare. As governments increasingly rely on interconnected digital networks the risks and implications of cyber warfare demand meticulous examination. The cyber front in Russia-Ukraine conflict has witnessed a fierce context where cyber-attacks  have taken the center stage in manipulating information and influencing public perception. This reflects the intertwining nature of cyber warfare and traditional military operations. This article focuses on how these cyber-attacks generate propaganda and shape public opinion, by discussing their impact on information flow, within and outside the conflict zone. 

Introduction

Cyber activities are of a dual nature and can be regarded as both non-kinetic and kinetic. Typically, Kinetic cyber-attacks involve compromising critical infrastructure facilities through the hijacking of cyber-physical systems (CPS). On February 24, 2022, Russian troops launched a devastating cyber-attack on Viasat’s KA-SAT network, and also used malware such as X-agent and industroyer2 to disclose the geolocation of artillery positions to enemy forces. In this regard, non-kinetic operations include narrative construction by both sides in order to influence the public’s perception of the conflict. These include setting up fake bot networks and creating media outlets to attack each other. Thus, it can be said that Cyber-attacks are more than just technical disruption; they are capable of inducing uncertainty or manipulating public opinion which is significant military objective during modern conflicts. Both Russia in Ukraine have resorted to various forms of cyber strategies and propaganda campaigns aimed at influencing public opinion while spreading disinformation about each other’s intentions in this context.

In contemporary conflicts, cyber domain has significantly amplified the speed, reach and impact of disinformation campaigns, which have long been used as tools for waging war. In this conflict, the goal appears to be two folded: restricting the public’s access to credible information and undermining their trust in what they read online. 

During the conflict, Russia used Distributed Denial of Service (DDoS) attacks that overwhelmed sites with more requests of information than they could handle, causing chaos and mayhem. Wiper malware like Hermetic wiper malware was also used to delete files from targeted systems, together with phishing techniques to mislead users into giving away private data or unauthorised access.

In contrast, Ukraine has conducted cyber-attacks to protect critical infrastructure and governmental institutions from similar attempts. In an attempt to broadcast information about the conflict to susceptible audiences and demoralize the Russian soldiers, Ukraine applied psychological warfare techniques. By releasing misleading reports on airstrikes that were not taking place, this operation was meant to instil fear in Russians’ minds. From a moral standpoint, both sides have employed comparable strategies questioning the ethicality of deception in war as it muddles between genuine combat and propaganda.

Impact of Cyberattacks on information flow

Several popular Ukrainian credible media outlets were disrupted to maximize impact during a period when news consumption might be high. For example, hackers conducted many attacks on sites like Ukrainska Pravda and Liga.net; the information spread disinformation about the events. The nature of the attack was to spread disinformation rather than destruction. In fact, the hackers posted the fake news that aimed at exaggerating the military success of Russians and potentially demoralizing Ukrainians to the effect of the taking over of the town of Avdiivka by the Russian troops. These attacks were noted by the Ukraine media as part of a greater plan of information war that is being pursued against the country by Russia.

Russia’s hybrid warfare strategy—integrating cyber with physical attacks—enabled Russia to spread vast amounts of chaos, undermine public confidence in the ability of a government to protect its citizenry, and hinder Ukraine’s efforts to mount an effective response to the invasion. It has targeted communication infrastructure, disrupting Ukrainian telecommunications such as naval communications, mobile networks, internet, damaging fiber-optic cables, and seizing telecom offices. Website defacement, hacking, and control of the narrative coming from all types of media have created an information vacuum at the expense of Ukraine for Russia. This makes it hard to coordinate responses or counter Russian narratives.

Russian hackers infiltrated the communication network of a nuclear power company, alongside physically occupying Zaporizhzhya nuclear power station, showing their ability to control critical infrastructure from different angles. Russia’s transition from being primarily a cyber-aggressor to also being a target also remarks that the balance of power can alter quickly in the domain of cyber warfare. Multiple Russian military units leveraged cyber-attacks as a force multiplier—i.e., one that increases the outcomes of conventional military operations. Their strategies aim to sow the chaos on command and control networks. For instance, one notable example of information manipulation, involved covering of high profile email accounts to gain access to their social media; another one is the sabotage of Ukrainian radio channels in which false information was broadcasted about the health of the Ukrainian President. This shows how information is seen as a key strategic armament in modern conflicts.

In the light of the Russian invasion, Ukraine’s cybersecurity strategy has evidently changed from a defensive posture to an offensive one. Many hacktivist groups in Ukraine have been cooperating with government agencies in the exploitation of such valuable targets, which includes the financial data of Russian military personnel through not only banks but also through cartographic and geographic systems that might provide a strategic understanding of Russian military planning and operations. This focus on psychological warfare by the Ukraine military underlines the importance of information control in modern conflicts. Ukraine forces have successfully sabotaged Russian morale by hacking Russian television and radio broadcasting, replacing content with information about Russian casualties and Russian failure in war, thereby informing the Russian public of what is hidden from them.

Social media platforms in Information manipulation

Indeed, both Russia and Ukraine strategy used social media platforms to try and spread their propaganda and disinformation. Russia had utilized a network of accounts and bots for the coordination in amplifying the pro-Russian message to mislead narratives about the conflict, seeking to sow doubt and confusion about events on the ground in domestic and international audiences. On the other side, Ukraine’s social media strategy was just a little defensive in nature. It reflected an effort to clarify facts and debunk a lot of false narratives, trying to sustain credibility while defending the nation’s stance in the face of disinformation campaigns. AI-enhanced cyberattack weaponry has also been used in creating and circulating false videos and audio recordings by governments of both Russia and Ukraine in trying to sway the general public’s perception of the war. Deep fake videos of President Zelenskyy, fake Zoom call featuring an AI-generated version of former President Poroshenko—all designed to fabricate statements by political leaders, to create false footage of military operations, and to spread misinformation about the outcomes of battles in an effort to undermine trust in legit news sources.

Analysis

The conflict explains how cyber domains blur the lines between traditional military operations and digital conflicts; making information manipulation a strategic tool in current conflicts. Moreover, this situation epitomizes that smaller nations can leverage digital capabilities to level up the playing field against larger adversaries. Ukraine’s strategic use of digital platforms has been an important factor in garnering international support throughout the conflict. The control of narratives and public perception is as important in modern conflicts as controlling of physical territory.

The conflict, if anything, has been emblematic of the fact that modern conflicts are as much a battle of narratives as they are military. Social media, as explored above, serves as the primary conduit through which manipulated content is distributed to countries around the world. Already, advanced AI tools are making it possible for innumerable actors to engage in sophisticated disinformation campaigns.

Ukraine has skilfully positioned itself to its favour, by portraying itself as a sovereign state struggling for its right, to which western audiences and governments are greatly attracted. At the same time, Russia’s actions are projected as an explicit violation of international laws, therefore the overall narrative comes out heavily tilted in favor of Ukraine. Aggressor Russia and righteous defender Ukraine—these are the basic roles, according to which Western media have been casting these countries, with such notions being mirrored in broader alignments of interests and one-sided narratives. This example underlines how powerful information manipulation functions in modern conflicts.

This makes the need for revised laws and norms of cyberspace, efficient cybersecurity measures not only for military but also for civilian infrastructure, and more effective coordination between cyber and traditional operations to develop a better cyber resiliency through proactive defense, international cooperation, and agile response capabilities in a military context. The lessons learnt from the analysis indicate that although Russia was much prepared on its cyber operations front, these operations may not serve the purpose and desired objectives of the military because of redundancies and fall-back options, even when successful. The strategy of cyber defense in Ukraine has been proactive and agile defence has helped them to neutralize some threats that could be dangerous.

Lessons for India from this Conflict

The major question is how prepared is the Indian Military to neutralize Cyberattacks form adversaries? While maintaining a defensive posture, India should equally develop offensive cyber capabilities as a deterrent. Initially, in the Russia- Ukraine conflict, Ukraine faced cyberattacks on its power grid and government websites. Therefore, India needs to develop and deploy AI-powered threat detection systems to identify and neutralize cyber threats in real time. Strengthening critical infrastructure like power grids, transportation systems, and communication networks is crucial for India to avoid potential threats. India should also focus on developing home-grown social media platforms and communications tools to reduce dependency on foreign technologies.

Tags: Cyber
Previous Post

Dynamics of Russia and China in Central Asia

Next Post

Kursk Offensive: Is It an Operational Master Stroke or A Strategic Gamble?

Anjali Manhas

Anjali Manhas

Anjali Manhas is a Research Assistant at the Centre for Land Warfare Studies. She holds a Master’s in Defence and Strategic Studies from Rashtriya Raksha University. Her research area focuses on Bangladesh’s security dynamics and regional strategy, contributing to policy insights for regional stability. You can reach out to her at - [email protected]

Next Post

Kursk Offensive: Is It an Operational Master Stroke or A Strategic Gamble?

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Support Us Donate Now

Web Updates

List of Shortlisted Officers / Candidates: PhD Batch – 7

Field Marshal Manekshaw Essay Competiton 2025

Guidelines to Publish with CLAWS

Summer Internship Capsule 2025

Application Form – Study Mtrl for DSSC 2025

[NEW] Application Form for membership for PROMEX (PART B or D)

  • Trending
  • Comments
  • Latest

Summer Internship Capsule 2025

April 8, 2025
Pahalgam Response: Why India Must Fight Smart?

Pahalgam Response: Why India Must Fight Smart?

May 2, 2025
Results | Field Marshal Manekshaw Essay Competition – 2024

Results | Field Marshal Manekshaw Essay Competition – 2024

April 2, 2025
Op Sindoor 2.0: Why & How India Must Prepare for the Next Round?

Op Sindoor 2.0: Why & How India Must Prepare for the Next Round?

May 21, 2025

Front Organisations: The Valley’s Homegrown ‘Resistance’ or Pakistan’s Evolving Terrorism Tactics?

2
RISING TENSIONS IN KATHUA

RISING TENSIONS IN KATHUA

1
The Art of Negotitations Three Day Capsule Course | 07th – 09th May

The Art of Negotitations Three Day Capsule Course | 07th – 09th May

1
Condolences, Condemnations and Silence: India’s neighborhood reacts to Pahalgam (South East Asia)

Condolences, Condemnations and Silence: India’s neighborhood reacts to Pahalgam (South East Asia)

1
Pakistan-Occupied Kashmir: The Strategic Centre of Gravity in South Asia

Pakistan-Occupied Kashmir: The Strategic Centre of Gravity in South Asia

June 4, 2025
Russia-Ukraine War: Lessons from an Electronic Warfare (EW) Perspective

Russia-Ukraine War: Lessons from an Electronic Warfare (EW) Perspective

May 31, 2025
Military Diplomacy or Strategic Coercion? China’s Defence Engagement with Pakistan: Consequences for India

Military Diplomacy or Strategic Coercion? China’s Defence Engagement with Pakistan: Consequences for India

May 31, 2025

List of Shortlisted Officers / Candidates: PhD Batch – 7

May 30, 2025

Popular Stories

  • Summer Internship Capsule 2025

    0 shares
    Share 0 Tweet 0
  • Pahalgam Response: Why India Must Fight Smart?

    0 shares
    Share 0 Tweet 0
  • Results | Field Marshal Manekshaw Essay Competition – 2024

    0 shares
    Share 0 Tweet 0
  • Op Sindoor 2.0: Why & How India Must Prepare for the Next Round?

    0 shares
    Share 0 Tweet 0
  • Field Marshal Manekshaw Essay Competiton 2025

    0 shares
    Share 0 Tweet 0

About us

CLAWS

The Centre for Land Warfare Studies (CLAWS), New Delhi, India is an independent think tank on strategic studies and land warfare. The mandate of CLAWS covers national security issues, conventional military operations and sub-conventional warfare.

Follow Us

Browse by Category

  • Articles
  • Autumn 2019
  • Autumn 2020
  • Books
  • CLAWS Focus
  • CLAWS Journal
  • Essay
  • Events
  • External Publications
  • FMMEC
  • Intern Articles
  • Issue Briefs
  • Jottings by Director General Emiritus
  • Manekshaw Papers
  • Newsletter
  • Round Tables
  • Scholar Warrior
  • Seminars
  • Uncategorized
  • Web Updates
  • Winter 2019
  • YouTube Podcast

Recent News

Pakistan-Occupied Kashmir: The Strategic Centre of Gravity in South Asia

Pakistan-Occupied Kashmir: The Strategic Centre of Gravity in South Asia

June 4, 2025
Russia-Ukraine War: Lessons from an Electronic Warfare (EW) Perspective

Russia-Ukraine War: Lessons from an Electronic Warfare (EW) Perspective

May 31, 2025
  • Site Map
  • Tenders
  • Advertise With Us
  • Terms of use
  • Privacy Policy
  • Other Think Tanks

© 2008-2024 Centre for Land Warfare Studies (CLAWS).

No Result
View All Result
  • Home
  • About Us
    • Director General
    • Additional Director General
    • Jottings by Director General Emiritus
    • CLAWS Membership
    • Faculty
  • Publication
    • Web Articles
    • Issue Briefs
    • Manekshaw Papers
    • Newsletter
    • CLAWS Journal
    • Scholar Warrior
    • Books
    • Essay
    • Intern Articles
    • External Publications
  • Research Areas
    • Global & Regional Security
      • China
      • Pakistan
      • Afghanistan
      • South Asia
      • Indo Pacific
      • US, EU & Russia
      • MENA
      • CAR
    • National Security
      • National Security Strategy
      • Nuclear Deterrence
      • Non Traditional Threats
      • Intelligence
      • Terrorism & Internal Security
      • Grey Z & IW
      • Security Laws
    • Military Studies
      • Military Doctrine
      • Military Strategy
      • Peace Keeping Ops
      • Military History
      • Military Logistics
      • Out of Area Contingency Ops
      • Leadership
    • Military Technology & Defence Acquisition
      • Military Technology
      • Defence Acqn
      • Budgets & Finance
      • Defence Infrastructure
      • Human Resources
    • Multi Domain Studies
      • Jointmanship & Integration
      • Space
      • Cyber
      • Spl Operations
      • Energy & Environment
      • Defence Eco System
      • Defence Diplomacy
      • HADR
  • Web Archive
  • Events
    • Seminars
    • Webinars/RTD
  • PROMEX
  • University Cell
    • About The Initiative
    • Admission: Eligibility and Procedure
    • Important Information
    • Administration
    • Guides | Supervisors
  • Careers
  • Contact

© 2008-2024 Centre for Land Warfare Studies (CLAWS).