Ukrainians gather in a train station in Kyiv in an effort to leave the city shortly after the Russian invasion began. Photo / Lynsey Addario, The New York Times
After years of talks about the need for public-private partnerships to combat cyberattacks, the war in Ukraine is stress-testing the system.
Last Wednesday, a few hours before Russian tanks began rolling into Ukraine, alarms went off inside Microsoft's Threat Intelligence Center, warning of a never-before-seen piece of "wiper" malware thatappeared aimed at the country's government ministries and financial institutions.
Within three hours, Microsoft threw itself into the middle of a ground war in Europe — from 8,850km away. The threat centre, north of Seattle, had been on high alert, and it quickly picked apart the malware, named it "FoxBlade" and notified Ukraine's top cyberdefence authority. Within three hours, Microsoft's virus detection systems had been updated to block the code, which erases — "wipes" — data on computers in a network.
Then Tom Burt, the senior Microsoft executive who oversees the company's effort to counter major cyberattacks, contacted Anne Neuberger, the White House's deputy national security adviser for cyber- and emerging technologies. Neuberger asked if Microsoft would consider sharing details of the code with the Baltics, Poland and other European nations, out of fear that the malware would spread beyond Ukraine's borders, crippling the military alliance or hitting West European banks.
Before midnight in Washington, Neuberger had made introductions — and Microsoft had begun playing the role that Ford Motor Co. did in World War II, when the company converted automobile production lines to make Sherman tanks.
After years of discussions in Washington and in tech circles about the need for public-private partnerships to combat destructive cyberattacks, the war in Ukraine is stress-testing the system. The White House, armed with intelligence from the National Security Agency and United States Cyber Command, is overseeing classified briefings on Russia's cyberoffensive plans. Even if US intelligence agencies picked up on the kind of crippling cyberattacks that someone — presumably Russian intelligence agencies or hackers — threw at Ukraine's government, they do not have the infrastructure to move that fast to block them.
"We are a company and not a government or a country,'' Brad Smith, Microsoft's president, noted in a blog post issued by the company Monday, describing the threats it was seeing. But the role it is playing, he made clear, is not a neutral one. He wrote about "constant and close coordination" with the Ukrainian government, as well as federal officials, the North Atlantic Treaty Organization and the European Union.
"I've never seen it work quite this way, or nearly this fast,'' Burt said. "We are doing in hours now what, even a few years ago, would have taken weeks or months."
Company executives, some newly armed with security clearances, are joining secure calls to hear an array of briefings organised by the National Security Agency and . Cyber USCommand, along with British authorities, among others. But much of the actionable intelligence is being found by companies like Microsoft and Google, which can see what is flowing across their vast networks.
President Joe Biden's aides often note that it was a private firm — Mandiant — that found the "SolarWinds" attack 15 months ago, in which one of Russia's most cybersavvy intelligence agencies, the SVR, infiltrated network management software used by thousands of US government agencies and private businesses. That gave the Russian government unfettered access.
Such attacks have given Russia a reputation as one of the most aggressive, and skilled, cyberpowers. But the surprise of recent days is that Russia's activity in that realm has been more muted than expected, researchers said.
Most early tabletop exercises about a Russian invasion started with overwhelming cyberattacks, taking out the internet in Ukraine and perhaps the power grid. So far, that hasn't happened.
"Many people are quite surprised that there isn't significant integration of cyberattacks into the overall campaign that Russia is undertaking in Ukraine," said Shane Huntley, director of Google's threat analysis group. "This is mostly business as normal as to the levels of Russian targeting."
Huntley said Google regularly observes some Russian attempts to hack accounts of people in Ukraine. "The normal level is actually never zero," he said. But those attempts have not markedly increased in the past several days, as Russia has invaded Ukraine.
"We have seen some Russian activity targeting Ukraine; it just hasn't been the big sets," said Ben Read, a director at the security firm Mandiant.
It is not clear to US or European officials why Russia held off.
It could be that they tried but defences were stronger than they anticipated, or that the Russians wanted to reduce the risk of attacking civilian infrastructure, so that a puppet government they installed would not struggle to rule the country.
But US officials said a massive cyberattack by Russia on Ukraine — or beyond, in retaliation for the economic and technology sanctions imposed by the United States and Europe — is hardly off the table. Some speculate that just as Moscow steps up its indiscriminate bombing, it will seek to cause as much economic disruption as it can muster.
The longer and more effectively the Ukrainian resistance holds out against Russia's army, the more Moscow could be tempted to begin using "the armada of Russian cyberforces," Sen. Mark Warner, D-Va., who leads the Senate Intelligence Committee, said last week.
Meta, the parent company of Facebook, disclosed Sunday that it had discovered hackers taking over accounts belonging to Ukrainian military officials and public figures. The hackers tried to use their access to these accounts to spread disinformation, posting videos that purported to show the Ukrainian military surrendering. Meta responded by locking down the accounts and alerting the users who had been targeted.
Twitter said it had found signs that hackers attempted to compromise accounts on its platform, and YouTube said it had removed five channels that posted videos used in the disinformation campaign.
Meta executives said the Facebook hackers were affiliated with a group known as Ghostwriter, which security researchers believe to be associated with Belarus.
Ghostwriter is known for its strategy of hacking public figures' email accounts, then using that access to compromise their social media accounts as well. The group has been "heavily active" in Ukraine during the past two months, said Read, who researches the group.
While US officials do not assess any direct threat to the United States from stepped-up Russian cyberoperations, that calculation could change.
US and European sanctions are biting harder than expected. Warner said that Russia could respond "with either direct cyberattacks against NATO countries or, more likely, in effect unleashing all of the Russian cybercriminals on ransomware attacks at a massive level that still allows them some deniability of responsibility."
Russian ransomware criminal groups conducted a devastating series of attacks in the US last year against hospitals, a meat-processing company and most notably, the company that operates gasoline pipelines along the East Coast. While Russia has taken steps to rein in those groups in recent months — after months of meetings between Neuberger and her Russian counterpart, Moscow conducted some high-profile arrests in January — it could easily reverse its crackdown efforts.
But Biden has stepped up his warnings to Russia against any sort of cyberattack on the United States.
"If Russia pursues cyberattacks against our companies, our critical infrastructure, we are prepared to respond," Biden said Thursday.
It was the third time Biden had issued such a warning since winning the election. While any Russian attack on the US seems like it would be a reckless escalation, Representative Adam B. Schiff, D-Calif., who leads the House Intelligence Committee, noted that Putin's decision-making so far has proved poor.
"There's a risk that whatever cybertools Russia uses in Ukraine don't stay in Ukraine," he said last week. "We've seen this before, where malware directed to a certain target gets released in the wild and then takes on a life of its own. So we could be the victim of Russian malware that has gone beyond its intended target."