Skip to content

With a little help from my friends? Cyber assistance and Ukraine’s successful cyber defence

As we reach one year into military hostilities in Ukraine, the utility of sharing intelligence and the limited impact of cyber actions for the success of conventional military operations has become somewhat apparent. Examples are plenty: In the early phases of the war, CERT-UA was able to mitigate the impact of the “Caddy Wiper/Industroyer2” malware and others through cooperation with the intelligence services of other states (e.g. UK, US and Poland) and cybersecurity companies such as ESET and Microsoft. More recently, reports of “offensive cyber operations” by US authorities have appeared publicly, though details (time, location, and means) of these are not available yet.

Providing (cyber) assistance to Ukraine has raised immediate concerns in many countries
about supporting governments becoming direct parties to hostilities (DPH), e.g., in Germany. While sharing some of these concerns about escalatory dynamics of cyber assistance to Ukraine, we beg to differ about the escalatory effects of cyber assistance. Politically, cyber operations tend to manipulate the access to or content of information, with very few operations involving kinetic effects. As such, cyber assistance may even constitute an “off-ramp” before, during, or towards the end of hostilities.

Sebastian Harnisch and Martin Müller argue that Russia’s attack on Ukraine is an unlawful use of force, an armed attack in direct and clear contravention of the UN Charter, which The attack, in our view, allows for two lawful responses in cyberspace: first, the party attacked, Ukraine, may defend itself individually or collectively under Article 51 of the UN Charter; second, for third parties, the (unprovoked) armed attack gives rise to either a status of non-belligerency, in which third parties may support the right to individual self-defence under Art. 51 (2) of the UN Charter or a status of co-belligerency, in which a third party directly participates in hostilities.

Other EuRepoC Articles

  • Research and Analysis
Internationale Cyberkonflikte: Der Blick auf Deutschland und die Welt

23 June 2022
In their situation reports on cyber security in Germany, the Federal Ministry of the Interior (BMI 2021: 12) and the Federal Office for Information Security (BSI 2021) paint a dynamic picture of the situation: The enlargement of the German attack vector, which is growing due to the steady digitalization of further areas of life and the economy and, most recently, the home office regulations of many companies; the increase in ransomware attacks with increasingly sophisticated malware; and the impact of special effects such as the Corona pandemic, which made the healthcare sector in particular the focus of cybercriminal activities (BMI 2021; BSI 2021).

Welcome to our Cyber Incident Dashboard!

For best results, please view on a desktop device.