Submit your essay to the AI-Cybersecurity Essay Prize Competition by January 2, 2025.
The AI-Cybersecurity Essay Prize Competition

Russia ushers in a new era of cyber-physical attack

Moscow used a new type of cyberattack to destabilise Ukraine’s electricity grid
Main Top Image
This image was created with the assistance of Midjourney

Last winter, Russia opened a new chapter in its war in Ukraine. With its battlefield progress stalled and the illegally annexed territories in eastern and southern Ukraine under pressure from Kyiv’s counteroffensive, Moscow set its sights on Ukraine’s energy grid. Hoping to exploit the long winter months and dampen Ukrainian morale, Russia’s military unleashed a carefully planned campaign of attacks intended to systematically degrade the country’s energy infrastructure.

This effort was methodical. Aimed at power distribution components, such as the substations that link Ukraine’s grid together, the attacks were designed to sever critical connections used to stabilise the country’s energy system. The campaign was carefully designed to inflict as much damage as possible.

Ultimately, Russia would fail in its bid to collapse the grid. Ukraine prevailed and its resolve hardened. Yet concealed behind the waves of drone and missile strikes, Russian military hackers known commonly as Sandworm worked in parallel to tilt Ukraine’s energy infrastructure into cascading failure.

Physical effects without malware

As part of its overall support effort, the notorious sabotage unit employed a new class of cyber-physical attack against Ukraine’s energy grid. The attackers honed in on MicroSCADA, a common software used in critical infrastructure systems, and the one used to monitor and control Ukraine’s grid. Sandworm stealthily manipulated controls for multiple substations and disrupted power.

Evidence from a joint investigation by Mandiant and Ukraine’s cyber authorities indicates that Sandworm readied the attack in as little as two months after gaining unauthorised access to the network. Instead of using tailored malware, malicious commands were injected directly into legitimate MicroSCADA software controlling the grid’s operations. Sandworm then covered its tracks, masking the specific commands executed to trip the breakers and cause an unscheduled power outage.

While preparing this operation, the group was also laying the groundwork for a series of other attacks against energy, water, and transportation critical infrastructure. This body of evidence demonstrates that disruptive cyberattacks – even those targeting industrial control systems – can be prepared and deployed in the constrained time horizons of an armed conflict. These observations make Ukraine’s defensive performance all the more impressive.

Innovation and improvement

Sandworm has a long history of sabotaging Ukraine’s energy grid through cyber-physical attacks. In December 2015, the group used a series of cyber tools, including modular malware known as “BlackEnergy 2”, to gain access to operators’ workstations and interactively take substations offline. A year later, in December 2016, they struck again. Demonstrating significant advancements in its capabilities, Sandworm used a new modular malware known as “Industroyer”, a first-of-its-kind tool built specifically to interact with and disrupt the physical control systems operating Ukraine’s grid.

These winter attacks were the first known cases of malware-driven power outages. To this date, they remain key data points in an extremely limited historical record of cyber-physical attacks. Many analysts still point to the technical specifics of the two attacks as evidence of the difficulty of conducting cyber-physical operations in a crisis or conflict. The incidents have fuelled fundamental assumptions about cyber operations in wartime: that they are excessively time intensive to develop, difficult to coordinate with conventional forces, and too slow and unreliable.

These formative events occurred over half a decade ago in an earlier, malware-centric era of cyber operations. In the years since, a radically different operational norm has emerged. Today, government-backed threat actors have moved away from complex, modular malware like Industroyer. Instead, they prioritise operations that forego malware wherever possible to blend in with existing legitimate digital infrastructure.

In this operational paradigm, known as “living off the land”, state cyber programmes are more reserved about using their heavyweight, purpose-built malware frameworks. Instead, they rely on the abuse of built-in tools and protocols already present in the target environment. When malware is required, lightweight open-source components and dual-use defensive tools are favoured over custom modular frameworks, which are more prone to detection and technical countermeasures. This approach provides an arsenal of capabilities that require significantly less lead time to prepare and fly under the radar of security systems. When paired with the surge of vulnerabilities observed in the 2020s so far, the potential for rapid access to sensitive networks is far-reaching.

The incorporation of living-off-the-land tactics through the full spectrum of cyber espionage, influence, and attack operations represents a fundamental shift in cyber competition and conflict. From the perspective of our adversaries, it is a conscious adaptation to overcome the constraints of the malware-centric era of cyber operations. In other words, these new operations provide a way to achieve speed, scale, and stealth simultaneously across campaigns of linked cyber operations that span months if not years.

As research from Gabby Roncone and I showcased, this flexible approach to cyber operations has been central to the Russian military’s ability to keep pace with the demands of its war in Ukraine. Other states are following suit. US cyber authorities and Microsoft warned in May 2023 that suspected Chinese military operators known as Volt Typhoon are using the same tactics to target sensitive critical infrastructure, possibly in preparation for a future conflict. Wider surveys of the threat landscape continue to reveal widespread adoption of these cheaper, faster, and hard-to-detect methods by government-backed hackers seeking political and military advantage.

An unwelcome paradigm shift

Sandworm’s latest grid attack is a watershed moment. It has bucked expectations of a future defined by increasingly tailored malware and has shown that quicker, stealthier, and more generic living-off-the-land methods are better suited for a wartime environment. Most concerningly, the attack method used is flexible and could affect critical infrastructure globally, such as seaports, railways, airports, hospitals, and other power grids that use the same MicroSCADA software. Efforts to build detections and harden systems against this class of attack are of paramount importance.

Stepping back, this attack defies assumptions about cyber conflict. Prevailing theories have overstated the resource and time constraints for readying cyberattacks and have failed to wrestle with the implications of the changed operating environment. Russia and others are rapidly innovating and will almost certainly continue refining their existing cyber-physical attack programmes to capitalise on this generic, fast-paced concept of operations that can be relied upon on short notice.

Russia’s latest attack is a crucial warning to recalibrate our thinking about the character and role of cyber operations in future crises or conflicts. Existing theories must come to terms with the significant changes that have occurred over the past half-decade, culminating in Sandworm’s latest combination of living-off-the-land techniques with physical effects on critical infrastructure. Otherwise, policymakers and military planners risk being unprepared for the cyberattacks most likely to occur today.

Terms and Conditions for the AI-Cybersecurity Essay Prize Competition

Introduction

The AI-Cybersecurity Essay Prize Competition (the “Competition”) is organized by the European Cyber Conflict Research Incubator (“ECCRI CIC”) in partnership with the Munich Security Conference (“MSC”). It is sponsored by Google (the “Sponsor”). By entering the Competition, participants agree to these Terms and Conditions (T&Cs).

Eligibility

The Competition is open to individuals worldwide who are experts in the fields of cybersecurity and artificial intelligence (“AI”). Participants must ensure that their participation complies with local laws and regulations.

Submission Guidelines

Essays must address the question: “How will Artificial Intelligence change cybersecurity, and what are the implications for Europe? Discuss potential strategies that policymakers can adopt to navigate these changes.”

Submissions must be original, unpublished works between 800-1200 words, excluding footnotes but including hyperlinks for references.

Essays must be submitted by 2 January 2025, 00:00 am CET., through the official submission portal provided by ECCRI CIC.

Only single-authored essays are accepted. Co-authored submissions will not be considered.

Participants are responsible for ensuring their submissions do not infringe upon the intellectual property rights of third parties.

Judging and Awards

Essays will be judged based on insightfulness, relevance, originality, clarity, and evidence by a review board comprising distinguished figures from academia, industry, and government.

The decision of the review board is final and binding in all matters related to the Competition.

Prizes are as follows: 1st Place: €10,000; Runner-Up: €5,000; 3rd Place: €2,500; 4th-5th Places: €1,000 each. The winner will also be invited to attend The Munich Security Conference

Intellectual Property Rights

The author retains ownership of the submitted essay.

By submitting the essay, the author grants ECCRI CIC exclusive, royalty-free rights to use, reproduce, publish, distribute, and display the essay for purposes related to the Competition, including but not limited to educational, promotional, and research-related activities.

The author represents, warrants, and agrees that no essay submitted as part of the essay prize competition violates or infringes upon the rights of any third party, including copyright, trademark, privacy, publicity, or other personal or proprietary rights, breaches, or conflicts with any obligation, such as a confidentiality obligation, or contains libellous, defamatory, or otherwise unlawful material.

The author agrees that the organizers can use your name (or your pseudonym) and an image of you in association with your essay for purposes of publicity, promotion and any other activity related to the exercise of its rights under these Terms.

The organizers may remove any essay-related content from its platforms at any time and without explanation.

The organizers may block contributions from particular email or IP addresses without notice or explanation.

The organizers may enable advertising on its platforms and associated social media accounts, including in connection with the display of your essay. The organizers may also use your Material to promote its products and services.

The organizers may, at its sole discretion, categorise Material, whether by means of ranking according to popularity or by any other criteria.

Data Protection

Personal information collected in connection with the Competition will be processed in accordance with Virtual Routes’ Privacy Policy. Participants agree to the collection, processing, and storage of their personal data for the purposes of the Competition.

Liability and Indemnity

ECCRI CIC, MSC, and the Sponsor will not be liable for any damages arising from participation in the Competition, except where prohibited by law.

Participants agree to indemnify ECCRI CIC, MSC, and the Sponsor against any claims, damages, or losses resulting from a breach of these T&Cs.

General Conditions

ECCRI CIC reserves the right to cancel, suspend, or modify the Competition or these T&Cs if fraud, technical failures, or any other factor beyond ECCRI CIC’s reasonable control impairs the integrity or proper functioning of the Competition, as determined by ECCRI CIC in its sole discretion.

Any attempt by any person to deliberately undermine the legitimate operation of the Competition may be a violation of criminal and civil law, and, should such an attempt be made, ECCRI CIC reserves the right to seek damages from any such person to the fullest extent permitted by law.

Governing Law

These Terms and Conditions are governed by the laws of the United Kingdom, without regard to its conflict of law principles. Any dispute arising out of or in connection with these Terms and Conditions, including any question regarding its existence, validity, or termination, shall be referred to and finally resolved by the courts of the United Kingdom. The participants agree to submit to the exclusive jurisdiction of the courts located in the United Kingdom for the resolution of all disputes arising from or related to these Terms and Conditions or the Competition.