Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3589334.3645401acmconferencesArticle/Chapter ViewAbstractPublication PagesthewebconfConference Proceedingsconference-collections
research-article
Open access

Getting Bored of Cyberwar: Exploring the Role of Low-level Cybercrime Actors in the Russia-Ukraine Conflict

Published: 13 May 2024 Publication History

Abstract

There has been substantial commentary on the role of cyberattacks carried out by low-level cybercrime actors in the Russia-Ukraine conflict. We analyse 358k website defacement attacks, 1.7M UDP amplification DDoS attacks, 1764 posts made by 372 users on Hack Forums mentioning the two countries, and 441 Telegram announcements (with 58k replies) of a volunteer hacking group for two months before and four months after the invasion. We find the conflict briefly but notably caught the attention of low-level cybercrime actors, with significant increases in online discussion and both types of attacks targeting Russia and Ukraine. However, there was little evidence of high-profile actions; the role of these players in the ongoing hybrid warfare is minor, and they should be separated from persistent and motivated 'hacktivists' in state-sponsored operations. Their involvement in the conflict appears to have been short-lived and fleeting, with a clear loss of interest in discussing the situation and carrying out both website defacement and DDoS attacks against either Russia or Ukraine after just a few weeks.

Supplemental Material

MP4 File
Presentation video
MP4 File
Supplemental video

References

[1]
netscout. 2022a. hrefhttps://netscout.com/blog/asert/ddos-threat-landscape-russiaDDoS Threat Landscape -- Russia.
[2]
netscout. 2022b. hrefhttps://netscout.com/blog/asert/ddos-threat-landscape-ukraineDDoS Threat Landscape -- Ukraine.
[3]
Ross Anderson, Richard Clayton, Rainer Böhme, and Ben Collier. 2021. hrefhttps://weis2018.econinfosec.org/wp-content/uploads/sites/10/2021/06/weis21-anderson.pdfSilicon Den: Cybercrime Is Entrepreneurship. In Proceedings of the Workshop on the Economics of Information Security (WEIS). Springer, New York, NY, USA, bibinfonumpages28 pages.
[4]
Jason Andress and Steve Winterfeld. 2011. hrefhttps://www.sciencedirect.com/book/9781597496377/cyber-warfareCyber Warfare: Techniques, Tactics and Tools for Security Practitioners. Elsevier, Amsterdam, The Netherlands.
[5]
John Arquilla and David Ronfeldt. 1993. hrefhttps://www.tandfonline.com/doi/abs/10.1080/01495939308402915Cyberwar Is Coming! Comparative Strategy, Vol. 12 (1993), 141--165.
[6]
Atlantic Council. 2022. hrefhttps://www.atlanticcouncil.org/blogs/ukrainealert/vladimir-putins-ukraine-invasion-is-the-worlds-first-full-scale-cyberwarVladimir Putin's Ukraine Invasion Is the World's First Full-Scale Cyberwar.
[7]
Sudipta Banerjee, Thomas Swearingen, Ruth Shillair, Johannes M. Bauer, Thomas Holt, and Arun Ross. 2022. hrefhttps://journals.sagepub.com/doi/abs/10.1177/0894439321994234Using Machine Learning to Examine Cyberattack Motivations on Web Defacement Data. Social Science Computer Review, Vol. 40 (2022), 914--932.
[8]
BBC. 2022. hrefhttps://bbc.co.uk/news/technology-60697261Ukraine: Spam Website Set Up to Reach Millions of Russians.
[9]
Bleeping Computer. 2022. hrefhttps://bleepingcomputer.com/news/security/new-data-wiping-malware-used-in-destructive-attacks-on-ukraine/New Data-Wiping Malware Used in Destructive Attacks on Ukraine.
[10]
British Society of Criminology. 2015. hrefhttp://britsoccrim.org/ethics/Statement of Ethics.
[11]
Ben Collier, Richard Clayton, Alice Hutchings, and Daniel Thomas. 2021. hrefhttps://academic.oup.com/bjc/article/61/5/1407/6226588Cybercrime Is (Often) Boring: Infrastructure and Alienation in a Deviant Subculture. The British Journal of Criminology, Vol. 61 (2021), 1407--1423.
[12]
Miguel Cozar, David Rodriguez, Jose M. Del Alamo, and Danny Guaman. 2022. hrefhttps://ieeexplore.ieee.org/document/9799336Reliability of IP Geolocation Services for Assessing the Compliance of International Data Transfers. In Proceedings of the IEEE European Symposium on Security and Privacy Workshops (EuroS&PW). IEEE, New York, NY, USA, 181--185.
[13]
Cybernews. 2022a. hrefhttps://cybernews.com/cyber-war/ukraines-cyber-army-hits-russian-cinemas/Ukraine's Cyber Army Hits Russian Cinemas.
[14]
Cybernews. 2022b. hrefhttps://cybernews.com/news/anonymous-leaks-database-of-the-russian-ministry-of-defence/Anonymous Leaks Database of the Russian Ministry of Defence.
[15]
Daily Mail. 2022. hrefhttps://dailymail.co.uk/news/article-10585403/Anonymous-claims-hacked-Russian-state-TV-broadcasts-war-footage-Ukraine.htmlAnonymous Claims It Has Hacked Russian State TV Broadcasts to Show War Footage From Ukraine.
[16]
Dorothy E. Denning. 2011. hrefhttps://www.igi-global.com/chapter/corporate-hacking-technology-driven-crime/46425Cyber Conflict as an Emergent Social Phenomenon. In Corporate Hacking and Technology-Driven Crime: Social Dynamics and Implications. IGI Global, Hershey, PA, USA, 170--186.
[17]
Periwinkle Doerfler, Andrea Forte, Emiliano De Cristofaro, Gianluca Stringhini, Jeremy Blackburn, and Damon McCoy. 2021. hrefhttps://dl.acm.org/doi/abs/10.1145/3476082“I'm a Professor, Which isn't Usually a Dangerous Job”: Internet-facilitated Harassment and Its Impact on Researchers. Proceedings of the ACM on Human-Computer Interaction (HCI), Vol. 5, CSCW2 (2021), 1--32.
[18]
Bernard Everett. 2013. hrefhttps://www.sciencedirect.com/science/article/abs/pii/S1361372313700939Optically Transparent: The Rise of Industrial Espionage and State-Sponsored Hacking. Computer Fraud & Security, Vol. 2013 (2013), 13--16.
[19]
Financial Times. 2022. hrefhttps://ft.com/content/d5657df5-a962--4acf-b0bd-b892c6b15361Prospect of Russian Cyber War May Have Been 'Overhyped', Says UK Spy Chief.
[20]
Forbes. 2022a. hrefhttps://forbes.com/sites/thomasbrewster/2022/02/28/moscow-exchange-and-sberbank-websites-knocked-offline-was-ukraines-cyber-army-responsible/Moscow Exchange, Sberbank Websites Knocked Offline-Was Ukraine's Cyber Army Responsible?
[21]
Forbes. 2022b. hrefhttps://forbes.com/sites/thomasbrewster/2022/03/28/huge-cyberattack-on-ukrtelecom-biggest-since-russian-invasion-crashes-ukraine-telecom/`Most Severe' Cyberattack Since Russian Invasion Crashes Ukraine Internet Provider.
[22]
Foreign Policy. 2022. hrefhttps://foreignpolicy.com/2022/04/11/russia-cyberwarfare-us-ukraine-volunteer-hackers-it-army/Don't Underestimate Ukraine's Volunteer Hackers.
[23]
Forkast News. 2022. hrefhttps://forkast.news/headlines/ukraine-seizes-crypto-wallet-funding-russian-forces/Ukraine Seizes Funds From Crypto Wallet Funding Russian Forces.
[24]
Austen D. Givens, Max Gorbachevsky, and Anita C. Biernat. 2023. hrefhttps://digitalcommons.usf.edu/jss/vol16/iss2/7/How Putin's Cyberwar Failed in Ukraine. Journal of Strategic Security, Vol. 16 (2023), 96--121.
[25]
Oana Goga, Howard Lei, Sree Hari Krishnan Parthasarathi, Gerald Friedland, Robin Sommer, and Renata Teixeira. 2013. hrefhttps://dl.acm.org/doi/abs/10.1145/2488388.2488428Exploiting Innocuous Activity for Correlating Users Across Sites. In Proceedings of the ACM World Wide Web Conference (WWW). ACM, New York, NY, USA, 447--458.
[26]
Google. 2023. hrefhttps://blog.google/threat-analysis-group/fog-of-war-how-the-ukraine-conflict-transformed-the-cyber-threat-landscape/Fog of War: How the Ukraine Conflict Transformed the Cyber Threat Landscape.
[27]
Matthieu Gouel, Kevin Vermeulen, Olivier Fourmaux, Timur Friedman, and Robert Beverly. 2021. hrefhttps://hal.science/hal-03419874/IP Geolocation Database Stability and Implications for Network Research. In Proceedings of the Network Traffic Measurement and Analysis Conference (TMA). International Federation for Information Processing (IFIP), Laxenburg, Austria, bibinfonumpages10 pages.
[28]
Hackmageddon. 2015. hrefhttps://hackmageddon.com/2014/09/08/august-2014-cyber-attacks-statistics/Cyber Attacks Statistics, August 2014.
[29]
HeadMind. 2022. hrefhttps://headmind.com/fr/industroyer-2/Industroyer2: The Russian Cyberattack on Ukraine Infrastructure.
[30]
Frank G. Hoffman. 2007. hrefhttps://www.potomacinstitute.org/images/stories/publications/potomac_hybridwar_0108.pdfConflict in the 21st Century: The Rise of Hybrid Wars. Potomac Institute for Policy Studies, Arlington, VA, USA.
[31]
Thomas J. Holt, Noah D. Turner, Joshua D. Freilich, and Steven M. Chermak. 2022. hrefhttps://journals.sagepub.com/doi/10.1177/08944393211023324Examining the Characteristics That Differentiate Jihadi-Associated Cyberattacks Using Routine Activities Theory. Social Science Computer Review, Vol. 40 (2022), 1614--1630.
[32]
Martin Husák, Martin Lavs tovivc ka, and Tomávs Plesn'ik. 2022. hrefhttps://dl.acm.org/doi/full/10.1145/3534566Handling Internet Activism During the Russian Invasion of Ukraine: A Campus Network Perspective. Digital Threats: Research and Practice (DTRAP), Vol. 3 (2022), 1--5.
[33]
Intricately Market Analysts. 2020. hrefhttps://blog.intricately.com/cdn-industry-trends-market-share-customer-sizeCDN Industry: Trends, Size, and Market Share.
[34]
Akshath Jain, Deepayan Patra, Peijing Xu, Justine Sherry, and Phillipa Gill. 2022. hrefhttps://dl.acm.org/doi/abs/10.1145/3517745.3561449The Ukrainian Internet Under Attack: An NDT Perspective. In Proceedings of the ACM Internet Measurement Conference (IMC). ACM, New York, NY, USA, 166--178.
[35]
Mattijs Jonker, Gautam Akiwate, Antonia Affinito, kc Claffy, Alessio Botta, Geoffrey M. Voelker, Roland van Rijswijk-Deij, and Stefan Savage. 2022. hrefhttps://dl.acm.org/doi/abs/10.1145/3517745.3561423Where. Ru? Assessing the Impact of Conflict on Russian Domain Infrastructure. In Proceedings of the ACM Internet Measurement Conference (IMC). ACM, New York, NY, USA, 159--165.
[36]
Mohammad Karami and Damon McCoy. 2013. hrefhttps://www.usenix.org/publications/login/december-2013-volume-38-number-6/rent-pwn-analyzing-commodity-booter-ddosRent to Pwn: Analyzing Commodity Booter DDoS Services. USENIX Login, Vol. 38 (2013), 20--23.
[37]
Nadiya Kostyuk and Erik Gartzke. 2022. hrefhttps://tnsr.org/2022/06/why-cyber-dogs-have-yet-to-bark-loudly-in-russias-invasion-of-ukraine/Why Cyber Dogs Have Yet to Bark Loudly in Russia's Invasion of Ukraine. Texas National Security Review, Vol. 5 (2022), 113--126.
[38]
Lukas Kr"amer, Johannes Krupp, Daisuke Makita, Tomomi Nishizoe, Takashi Koide, Katsunari Yoshioka, and Christian Rossow. 2015. hrefhttps://link.springer.com/chapter/10.1007/978--3--319--26362--5_28AmpPot: Monitoring and Defending Against Amplification DDoS Attacks. In Proceedings of the International Symposium on Research in Attacks, Intrusions, and Defenses (RAID). Springer, New York, NY, USA, 615--636.
[39]
Johannes Krupp, Mohammad Karami, Christian Rossow, Damon McCoy, and Michael Backes. 2017. hrefhttps://link.springer.com/chapter/10.1007/978--3--319--66332--6_19Linking Amplification DDoS Attacks to Booter Services. In Proceedings of the International Symposium on Research in Attacks, Intrusions, and Defenses (RAID). Springer, New York, NY, USA, 427--449.
[40]
Michael Kurzmeier. 2020. hrefhttps://mural.maynoothuniversity.ie/13352/Towards a Concept for Archiving Hacked Websites. NPPSH Reflections, Vol. 3 (2020), 35--58.
[41]
Chiara Libiseller. 2023. hrefhttps://www.tandfonline.com/doi/full/10.1080/01402390.2023.2177987'Hybrid Warfare' as an Academic Fashion. Journal of Strategic Studies, Vol. 46 (2023), 858--880.
[42]
Jing Liu, Fan Zhang, Xinying Song, Young-In Song, Chin-Yew Lin, and Hsiao-Wuen Hon. 2013. hrefhttps://dl.acm.org/doi/10.1145/2433396.2433457What's in a Name?: An Unsupervised Approach to Link Users Across Communities. In Proceedings of the ACM International Conference on Web Search and Data Mining (WSDM). ACM, New York, NY, USA, 495--504.
[43]
Jonathan Lusthaus, Miranda Bruce, and Nigel Phair. 2020. hrefhttps://ieeexplore.ieee.org/document/9229673Mapping the Geography of Cybercrime: A Review of Indices of Digital Offending by Country. In Proceedings of the IEEE European Symposium on Security and Privacy Workshops (EuroS&PW). IEEE, New York, NY, USA, 448--453.
[44]
Federico Maggi, Marco Balduzzi, Ryan Flores, Lion Gu, and Vincenzo Ciancaglini. 2018. hrefhttps://dl.acm.org/doi/abs/10.1145/3196494.3196542Investigating Web Defacement Campaigns at Large. In Proceedings of the Asia Conference on Computer and Communications Security (ASIACCS). ACM, New York, NY, USA, 443--456.
[45]
Margarita Jaitner. 2015. hrefhttps://ccdcoe.org/uploads/2018/10/Ch10_CyberWarinPerspective_Jaitner.pdfRussian Information Warfare: Lessons From Ukraine. In Cyber War in Perspective: Russian Aggression against Ukraine. NATO Cooperative Cyber Defence Centre of Excellence (CCDCOE), Tallinn, Estonia, 87--94.
[46]
Lennart Maschmeyer and Myriam Dunn Cavelty. 2022. hrefhttps://css.ethz.ch/content/dam/ethz/special-interest/gess/cis/center-for-securities-studies/pdfs/PP10--3_2022-EN.pdfGoodbye Cyberwar: Ukraine as Reality Check. Technical Report. Center for Security Studies (CSS), ETH Zürich.
[47]
Metro News. 2022. hrefhttps://metro.co.uk/2022/03/02/anonymous-servers-down-as-russian-killnet-hackers-strike-back-16202354/Anonymous Servers Down as Russian Killnet Hackers Strike Back.
[48]
Microsoft. 2022. hrefhttps://blogs.microsoft.com/on-the-issues/2022/06/22/defending-ukraine-early-lessons-from-the-cyber-war/Defending Ukraine: Early Lessons From the Cyber War.
[49]
Microsoft Threat Intelligence. 2023. hrefhttps://www.microsoft.com/security/security-insider/microsoft-digital-defense-report-2023Microsoft Digital Defense Report: Building and Improving Cyber Resilience.
[50]
Jeremy Miles and Mark Shevlin. 2000. hrefhttps://uk.sagepub.com/en-gb/eur/applying-regression-and-correlation/book209139Applying Regression and Correlation: A Guide for Students and Researchers. Sage, London, UK.
[51]
José Miguel Moreno, Sergio Pastrana, Jens Helge Reelfs, Pelayo Vallina, Andriy Panchenko, Georgios Smaragdakis, Oliver Hohlfeld, Narseo Vallina-Rodriguez, and Juan Tapiador. 2023. hrefhttps://arxiv.org/pdf/2302.00598.pdfReviewing War: Unconventional User Reviews as a Side Channel to Circumvent Information Controls. (2023). arxiv: 2302.00598
[52]
Mykhailo Fedorov. 2022. hrefhttps://twitter.com/FedorovMykhailo/status/1497642156076511233We Are Creating an IT Army.
[53]
Nature News Explainer. 2022. hrefhttps://www.nature.com/articles/d41586-022-00753--9Where Is Russia's Cyberwar? Analysts Decipher Its Strategy.
[54]
Marcin Nawrocki, John Kristoff, Raphael Hiesgen, Chris Kanich, Thomas C. Schmidt, and Matthias W"ahlisch. 2023. hrefhttps://www.computer.org/csdl/proceedings-article/eurosp/2023/651200a576/1OFthBMDVdeSoK: A Data-Driven View on Methods to Detect Reflective Amplification DDoS Attacks Using Honeypots. In Proceedings of the IEEE European Symposium on Security and Privacy (EuroS&P). IEEE, New York, NY, USA, 576--591.
[55]
New York Times. 2022. hrefhttps://nytimes.com/2022/04/27/us/politics/russia-cyberattacks-ukraine.htmlRussia Uses Cyberattacks in Ukraine to Support Military Strikes, Report Finds.
[56]
Sergio Pastrana, Alice Hutchings, Andrew Caines, and Paula Buttery. 2018a. hrefhttps://link.springer.com/chapter/10.1007/978--3-030-00470--5_10Characterizing Eve: Analysing Cybercrime Actors in a Large Underground Forum. In Proceedings of the International Symposium on Research in Attacks, Intrusions, and Defenses (RAID). Springer, New York, NY, USA, 207--227.
[57]
Sergio Pastrana, Daniel R. Thomas, Alice Hutchings, and Richard Clayton. 2018b. hrefhttps://dl.acm.org/doi/10.1145/3178876.3186178CrimeBB: Enabling Cybercrime Research on Underground Forums at Scale. In Proceedings of the ACM World Wide Web Conference (WWW). ACM, New York, NY, USA, 1845--1854.
[58]
Robert C. Perkins, Marie Ouellet, Christian J. Howell, and David Maimon. 2022. hrefhttps://journals.sagepub.com/doi/abs/10.1177/08944393221097881The Illicit Ecosystem of Hacking: A Longitudinal Network Analysis of Website Defacement Groups. Social Science Computer Review, Vol. 0 (2022), 390--409.
[59]
Byron Price. 1942. hrefhttps://www.jstor.org/stable/1949286Governmental Censorship in War-Time. American Political Science Review, Vol. 36 (1942), 837--849.
[60]
Reethika Ramesh, Ram Sundara Raman, Apurva Virkud, Alexandra Dirksen, Armin Huremagic, Dirk Rodenburg, David Fifield, Rod Hynes, Doug Madory, and Roya Ensafi. 2023. hrefhttps://www.usenix.org/conference/usenixsecurity23/presentation/ramesh-network-responsesNetwork Responses to Russia's Invasion of Ukraine in 2022: A Cautionary Tale for Internet Freedom. In Proceedings of the USENIX Security Symposium (USENIX Security). USENIX Association, California, CA, USA, 2581--2598.
[61]
Reuters. 2022. hrefhttps://reuters.com/world/europe/russia-behind-cyberattack-against-satellite-internet-modems-ukraine-eu-2022-05--10/Russia Downed Satellite Internet in Ukraine - Western Officials.
[62]
Thomas Rid. 2012. hrefhttps://www.tandfonline.com/doi/abs/10.1080/01402390.2011.608939Cyber War Will Not Take Place. Journal of Strategic Studies, Vol. 35 (2012), 5--32.
[63]
Marco Romagna and Niek Jan van den Hout. 2017. hrefhttps://www.virusbulletin.com/conference/vb2017/abstracts/hacktivism-and-website-defacement-motivations-capabilities-and-potential-threatsHacktivism and Website Defacement: Motivations, Capabilities and Potential Threats. In Virus Bulletin International Conference. Virus Bulletin, Abingdon, Oxfordshire, UK, 1--10.
[64]
Dimitrios Serpanos and Theodoros Komninos. 2022. hrefhttps://ieeexplore.ieee.org/document/9810126The Cyberwarfare in Ukraine. Computer, Vol. 55 (2022), 88--91.
[65]
Stefan Soesanto. 2022. hrefhttps://css.ethz.ch/en/center/CSS-news/2022/06/the-it-army-of-ukraine.htmlThe IT Army of Ukraine: Structure, Tasking, and Eco-System. Technical Report. Center for Security Studies (CSS), ETH Zürich.
[66]
State Sites of Ukraine. 2022. hrefhttps://cip.gov.ua/en/news/vid-15-lyutogo-ukrayina-zaznala-ponad-3-000-ddos-atakUkraine Has Suffered Over 3000 DDoS Attacks.
[67]
Statista. 2022a. hrefhttps://statista.com/statistics/1135050/russia-websites-by-domain-name/Number of Websites in Russia as of May 2022, by Domain Name.
[68]
Statista. 2022b. hrefhttps://statista.com/statistics/1305280/denylist-website-russia-invasion-ukraine-by-category/Number of Web Domains Blocked in Russia Since the Start of the Ukraine Invasion on February 24, 2022 as of April 25, 2022, by Category.
[69]
TASS Russian News Agency. 2022. hrefhttps://tass.com/economy/1458361Number of DDoS Attacks on Russia in 2022 Will Grow 30-Fold.
[70]
TechCrunch. 2022. hrefhttps://cacm.acm.org/news/260233-web-scraping-is-legal-us-appeals-court-reaffirms/fulltext/Web Scraping Is Legal, U.S. Appeals Court Reaffirms.
[71]
The Economist. 2022. hrefhttps://economist.com/by-invitation/2022/08/18/the-head-of-gchq-says-vladimir-putin-is-losing-the-information-war-in-ukraineThe Head of GCHQ Says Vladimir Putin Is Losing the Information War in Ukraine.
[72]
The Guardian. 2022a. hrefhttps://theguardian.com/world/2022/feb/27/anonymous-the-hacker-collective-that-has-declared-cyberwar-on-russia/Anonymous: The Hacker Collective That Has Declared Cyberwar on Russia.
[73]
The Guardian. 2022b. hrefhttps://theguardian.com/world/2022/mar/01/ukraine-russia-civilians-missiles-kyiv-tv-towerUkraine Says Russia Targeting Civilians as Missiles Hit Kyiv TV Tower.
[74]
The Guardian. 2022c. hrefhttps://theguardian.com/world/2022/mar/15/volunteer-hackers-fight-russia?It's the Right Thing to Do': The 300,000 Volunteer Hackers Coming Together to Fight Russia.
[75]
The Hacker News. 2022. hrefhttps://thehackernews.com/2022/03/google-russian-hackers-target.htmlGoogle: Russian Hackers Target Ukrainians, European Allies via Phishing Attacks.
[76]
Daniel R. Thomas, Richard Clayton, and Alastair R. Beresford. 2017. hrefhttps://ieeexplore.ieee.org/document/79450571000 Days of UDP Amplification DDoS Attacks. In Proceedings of the APWG Symposium on Electronic Crime Research (eCrime). IEEE, New York, NY, USA, 79--84.
[77]
Steve G.A. van de Weijer, Thomas J. Holt, and E. Rutger Leukfeldt. 2021. hrefhttps://www.sciencedirect.com/science/article/pii/S2451958821000610Heterogeneity in Trajectories of Cybercriminals: A Longitudinal Analyses of Web Defacements. Computers in Human Behavior Reports, Vol. 4 (2021), 100113.
[78]
David Wall. 2007. hrefhttps://papers.ssrn.com/sol3/papers.cfm?abstract_id=1066922Cybercrime: The Transformation of Crime in the Information Age. Wiley, Hoboken, NJ, USA.
[79]
Noel Warford, Tara Matthews, Kaitlyn Yang, Omer Akgul, Sunny Consolvo, Patrick Gage Kelley, Nathan Malkin, Michelle L. Mazurek, Manya Sleeper, and Kurt Thomas. 2022. hrefhttps://ieeexplore.ieee.org/abstract/document/9833643SoK: A Framework for Unifying at-Risk User Research. In Proceedings of the IEEE Symposium on Security and Privacy (S&P). IEEE, New York, NY, USA, 2344--2360.
[80]
Zachary Weinberg, Shinyoung Cho, Nicolas Christin, Vyas Sekar, and Phillipa Gill. 2018. hrefhttps://dl.acm.org/doi/10.1145/3278532.3278551How to Catch When Proxies Lie: Verifying the Physical Locations of Network Proxies With Active Geolocation. In Proceedings of the ACM Internet Measurement Conference (IMC). ACM, New York, NY, USA, 203--217.
[81]
Marcus Willett. 2022. hrefhttps://www.tandfonline.com/doi/full/10.1080/00396338.2022.2126193The Cyber Dimension of the Russia--Ukraine War. Survival, Vol. 64 (2022), 7--26.
[82]
Wired. 2022. hrefhttps://wired.co.uk/article/ukraine-it-army-russia-war-cyberattacks-ddosUkraine's Volunteer ?IT Army' Is Hacking in Uncharted Territory.
[83]
Wired. 2023. hrefhttps://wired.com/story/ukraine-russia-wiper-malware/Ukraine Suffered More Data-Wiping Malware Last Year Than Anywhere, Ever.
[84]
Hyung-jin Woo, Yeora Kim, and Joseph Dominick. 2004. hrefhttps://www.tandfonline.com/doi/abs/10.1207/s1532785xmep0601_3Hackers: Militants or Merry Pranksters? A Content Analysis of Defaced Web Pages. Media Psychology, Vol. 6 (2004), 63--82.
[85]
Wordfence. 2022. hrefhttps://wordfence.com/blog/2022/03/ukraine-universities-hacked-by-brazilian-via-finland-as-russian-invasion-started/Ukraine Universities Hacked as Russian Invasion Started.
[86]
ZDNET. 2022. hrefhttps://zdnet.com/article/caddywiper-more-destructive-wiper-malware-strikes-ukrainian-targets/CaddyWiper: More Destructive Wiper Malware Strikes Ukraine. io

Cited By

View all
  • (2024)Exploring Internet-Scale Data-Driven Intelligence: Empirical Analysis of the Russo-Ukrainian Conflict2024 IEEE International Conference on Communications Workshops (ICC Workshops)10.1109/ICCWorkshops59551.2024.10615332(896-901)Online publication date: 9-Jun-2024

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
WWW '24: Proceedings of the ACM Web Conference 2024
May 2024
4826 pages
ISBN:9798400701719
DOI:10.1145/3589334
This work is licensed under a Creative Commons Attribution International 4.0 License.

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 13 May 2024

Check for updates

Author Tags

  1. cybercrime
  2. cyberwar
  3. ddos attacks
  4. it army of ukraine
  5. russia-ukraine conflict
  6. volunteer hacktivists
  7. website defacement attacks

Qualifiers

  • Research-article

Funding Sources

  • European Research Council (ERC)

Conference

WWW '24
Sponsor:
WWW '24: The ACM Web Conference 2024
May 13 - 17, 2024
Singapore, Singapore

Acceptance Rates

Overall Acceptance Rate 1,899 of 8,196 submissions, 23%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)242
  • Downloads (Last 6 weeks)95
Reflects downloads up to 16 Oct 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Exploring Internet-Scale Data-Driven Intelligence: Empirical Analysis of the Russo-Ukrainian Conflict2024 IEEE International Conference on Communications Workshops (ICC Workshops)10.1109/ICCWorkshops59551.2024.10615332(896-901)Online publication date: 9-Jun-2024

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Get Access

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media