Register now to watch the on-demand web seminar featuring Microsoft Digital Defense Report 2024 insights.
The cyber and influence operations of the war in Ukraine’s digital battlefield
Prior to Russia’s full-scale invasion of Ukraine on February 24, 2022, many observers expected that a Russian-led hybrid war, like that observed when Russia invaded Donbas and illegally annexed Crimea in 2014, would involve: marrying cyber weapons, influence operations, and military force to swiftly overrun Ukrainian defenses.
- Marrying cyber weapon.
- Influence operations.
- Military force to swiftly overrun Ukrainian defenses.
Defending Ukraine: Early Lessons from the Cyber War
The latest findings in our ongoing threat intelligence efforts in the war between Russia and Ukraine, and a series of conclusions from its first four months reinforces the need for ongoing and new investments in technology, data, and partnerships to support governments, companies, NGOs, and universities.
Now, one year after its full-scale invasion, Russia’s military has indeed wrought physical devastation in Ukraine but has not achieved its objectives—in part because Moscow’s parallel cyber and influence operations have largely failed.
Related articles
Protect your organization from ransomware
Get a glimpse of the criminal players who operate within the underground ransomware economy. We’ll help you understand the motivations and mechanics of ransomware attacks and provide you with best practices for protection as well as backup and recovery.
Behind the scenes with cybercrime and counter ransomware expert Nick Carr
Nick Carr, Cybercrime Intelligence Team Lead at the Microsoft Threat Intelligence Center, discusses ransomware trends, explains what Microsoft is doing to protect customers from ransomware, and describes what organizations can do if they’ve been affected by it.
Propaganda in the digital age: How cyber influence operations erode trust
Survey the world of cyber influence operations, where nation states distribute propaganda designed to threaten the trustworthy information democracy requires to flourish.
Follow Microsoft Security