ABSTRACT

Cyberattacks are nothing particularly new to the world and Ukraine had suffered many such attacks by Russia over recent years. Russia had knowingly been exploiting Ukraine’s digital vulnerabilities as a proving ground for nearly a decade. Malware such as Sandworm and BlackEnergy had caused untold damage to the Ukrainian population and government previously, which allowed Russia to perfect cyberattacks for further, more global events. Russia had been planting cyber sleeper digital cells for years, especially in the US and the UK.

Then, coincidently, the week after the Chinese Winter Olympic games had finished, Russia launched an all-out cyber offensive against 70 Ukrainian government websites. Owing to these being poorly—and insecurely—maintained, they toppled one by one, causing havoc and disruption to the Ukrainian government and to Ukraine’s critical infrastructure. As Q said in James Bond: ‘I can do more damage by breakfast sipping my Earl Grey tea with my keyboard than you ever can in the field.’ Sadly, Q was right, as we witness daily. The keyboard and mouse have indeed become mightier than the sword.

The barrage of cyberattacks against Ukraine constitutes the first cyberwar by one nation against another. This attack crossed a very thin red line. That line had the hallmarks of a nation state, but had until now been confined to cyber criminal activities, immaterial of whom the perpetrators were. This, however, was now war. The cyberwar was simply a precursor, the softening of a country that would precede a kinetic war in which tens of thousands of people would lose their lives. This war was the first war for nearly 80 years that rang out deathly klaxons across Europe and the world.

Digital Blood on Their Hands addresses the issues that the digital world has created, covering the culpability, causal links and even liabilities that go towards these war crime atrocities, often too frightening to believe and also too compelling to dismiss. It tells a side to the world’s first ever cyberwar that you would never otherwise see or possibly hear about.

part I|18 pages

History

chapter 21|6 pages

The History of War and Cyber Warfare

chapter 2|10 pages

The History of Cybersecurity

part II|42 pages

Technology

chapter 203|8 pages

Domain Name System (DNS) Attacks

chapter 4|6 pages

Content Delivery Networks (CDNs)

chapter 5|10 pages

Cloud Computing

A Gamble?

chapter 6|8 pages

OSINT

Open-Source Intelligence

chapter 7|8 pages

Digital Perimeter Defences

part III|38 pages

Examples of Previous Attacks and Insecurities

chapter 628|10 pages

US Government Security Failings

chapter 9|8 pages

UK Government Security Failings

chapter 10|6 pages

Okta Cyberattack

More Basic Security Failures

chapter 11|6 pages

Stuxnet

chapter 12|6 pages

Lloyds

Shortfall of Knowledge

part IV|80 pages

The Ukraine Cyberwar

chapter 10013|8 pages

Why Has Russia Invaded Ukraine?

chapter 15|8 pages

Eight Years of Cyberattacks on Ukraine

chapter 16|6 pages

Russian Allies and Enemies

chapter 17|6 pages

Digital Defences Down

chapter 18|8 pages

Ukraine Report

Ukraine Cyberwar Using Insecure Websites to Take Over Control

chapter 19|10 pages

Microsoft

There Is Something Rotten in Redmond

chapter 20|2 pages

Perimeter Defence Theory in Context

Ukraine

chapter 21|6 pages

Cyberattacks against Russia

chapter 22|8 pages

Global Security Errors

chapter |4 pages

Conclusion

chapter |6 pages

Afterword

Rogers