Ukrainian hackers call for volunteers before cyberwar heats up

Russia has a long history of damaging Ukraine’s internet infrastructure through malware. But Ukrainians are assembling volunteer hackers worldwide to launch counterattacks on their Russian foe. 

Jon Elswick/AP
A report from the Cybersecurity & Infrastructure Security Agency about destructive malware that is targeting organizations in Ukraine is photographed, Feb. 28, 2022. Ukraine has marshaled volunteer hackers through online forums to help in the fight against Russia.

Russia has some of the best hackers in the world, but in the early days of the war in Ukraine, its ability to create mayhem through malware hasn’t had much of a noticeable impact.

Instead, it’s Ukraine that’s marshalled sympathetic volunteer hackers in an unprecedented collective global effort to make the Kremlin pay for making war on its neighbor. It’s a kind of cyber free-for-all that experts say risks escalating a moment already fraught with extraordinary danger after Russian President Vladimir Putin put his nuclear forces on alert.

So far, Ukraine’s internet mostly works, its president still able to rally global support via a smartphone, and its power plants and other critical infrastructure still able to function. The kind of devastating cyberattacks thought likely to accompany a large-scale Russian military invasion haven’t happened.

“It has not played as large a component as some people thought it might and it definitely has not been seen outside of Ukraine to the extent that people feared,” said Michael Daniel, a former White House cybersecurity coordinator. “Of course, that could still change.”

It’s not clear why Russia hasn’t landed a more powerful cyber punch. Russia might have determined that the impact wouldn’t be serious enough – Ukraine’s industrial base is far less digitized than in Western nations, for one. Or Russia might have determined that it couldn’t do serious harm to Ukraine without risking collateral impact outside its borders.

Many cybersecurity experts believe the Kremlin, at least for now, prefers to keep Ukraine’s communications open for the intelligence value.

Whatever the reasons, the conflict’s early days have been marked by lower-level cyberattacks that appear to be done both by freelancers and state actors.

Prior to the invasion, hackers knocked offline or defaced Ukrainian government websites and wiped some servers with destructive malware. Now, an ad hoc army of hackers – some marshaled online by Ukraine’s SBU security service – are claiming credit for takedowns and defacements of Russian government and media sites.

A volunteer group calling itself the IT Army of Ukraine has more than 230,000 followers on a Telegram channel and is constantly listing targets for hackers to hit, like Russian banks and cryptocurrency exchanges.

On Monday, Ukraine’s SBU made its recruitment of allied volunteer hackers official.

“CYBER FRONT IS NOW OPEN! Help Ukrainian cyber experts hack occupant’s platforms!” it said on its Telegram channel, asking for tips on vulnerabilities in Russian cyber defenses, including software bugs and login credentials.

“It is the first time that states have openly called for citizens and volunteers to cyberattack another state,” said Gabriella Coleman, a Harvard anthropology professor who has charted the rise of hacktivism.

The move mirrors Ukraine’s reliance on its citizens for other areas of defense.

“It shouldn’t be surprising that Ukraine is dipping into all possible resources to fight off the Russians, a much stronger foe. Just like civilians are coming out to fight in the street, it doesn’t surprise me that they are trying to call forward civilians to support this through the digital space,” said Gary Corn, a retired Army colonel who served as general counsel to United States Cyber Command.

One hacker group that first appeared last year, the Belarus Cyber Partisans, claimed Monday to have disrupted some rail service in Belarus, the northern neighbor of Ukraine from which several prongs of Russia’s military attacked. The group has been trying to frustrate Russian troop and hardware movements through Belarus.

Sergey Voitekhovich, a former Belarusian railway worker who runs a rail-related Telegram group, told The Associated Press that the Cyber Partisans’ digital sabotage Sunday paralyzed train traffic in Belarus for 90 minutes. Mr. Voitekhovich said electronic ticket sales were still not functioning as of Monday evening.

The Cyber Partisans hack was intended to disrupt Russian troop movements in Belarus and was the second such action in a little over a month. Mr. Voitekhovich said the current attack delayed two Russian military trains bound for Belarus from the Russian city of Smolensk. His story could not be independently verified. Mr. Voitekhovich chatted with the AP from Poland. He said police pressure had forced him to leave Belarus.

Pro-Russian ransomware criminals from the Conti gang recently pledged on the group’s dark website to “use all our possible resources to strike back at the critical infrastructures of an enemy” if Russia was attacked. Shortly afterward, sensitive chat logs that appear to belong to the gang were leaked online.

As partisans on both sides vow more serious cyberattacks, experts say there are real risks of the situation spiraling out of control.

“De-escalation and peace will be hard enough on their own without outsourced hacking to worry about,” said Jay Healey, a cyberconflict expert at Columbia University who has long been opposed to letting the private sector “hack back” against Russian or other state-backed cyber aggression.

Making things more complicated: potential “false flag” operations in which hackers pretend to be someone else when launching an attack, a specialty in cyber conflicts. Attribution in cyberattacks is almost always difficult and could be even more so in the fog of war.

There’s already been some spillover in some cyberattacks. Several hours before Russia’s invasion, destructive cyberattacks hit Ukraine’s digital infrastructure, damaging hundreds of computers with “wiper” malware – including a financial institution and organizations with offices in neighboring Latvia and Lithuania, cybersecurity researchers said.

Microsoft President Brad Smith said in a statement Monday that such attacks on civilian targets “raise serious concerns under the Geneva Convention.”

Mr. Smith noted that the cyberattacks – like a series of similar attacks in mid-January – “have been precisely targeted, and we have not seen the use of the indiscriminate malware technology that spread across Ukraine’s economy and beyond its borders in the 2017 NotPetya attack,” referring to a “wiper” that caused more than $10 billion of damage globally by infecting companies that do business in Ukraine with malware seeded through a tax preparation software update.

The West blames Russia’s GRU military intelligence agency for that attack and for some of the other most damaging cyberattacks on record, including a pair in 2015 and 2016 that briefly knocked out parts of Ukraine’s power grid.

So far, there’s not been anything like that in this conflict. But officials say it could be coming.

“I’ve been pleasantly surprised so far ... that Russia has not launched more major cyberattacks against Ukraine,” Senate Intelligence Committee Chairman Mark Warner said at an event Monday. “Do I expect Russia to up its game on cyber? Absolutely.”

This story was reported by The Associated Press. Frank Bajak reported from Boston. Associated Press writer Ben Fox contributed from Washington.

Editor’s note: Check out the Monitor’s comprehensive Ukraine coverage from correspondents in Ukraine, Europe, the United States, and beyond on our Ukraine page.

You've read  of  free articles. Subscribe to continue.
Real news can be honest, hopeful, credible, constructive.
What is the Monitor difference? Tackling the tough headlines – with humanity. Listening to sources – with respect. Seeing the story that others are missing by reporting what so often gets overlooked: the values that connect us. That’s Monitor reporting – news that changes how you see the world.

Dear Reader,

About a year ago, I happened upon this statement about the Monitor in the Harvard Business Review – under the charming heading of “do things that don’t interest you”:

“Many things that end up” being meaningful, writes social scientist Joseph Grenny, “have come from conference workshops, articles, or online videos that began as a chore and ended with an insight. My work in Kenya, for example, was heavily influenced by a Christian Science Monitor article I had forced myself to read 10 years earlier. Sometimes, we call things ‘boring’ simply because they lie outside the box we are currently in.”

If you were to come up with a punchline to a joke about the Monitor, that would probably be it. We’re seen as being global, fair, insightful, and perhaps a bit too earnest. We’re the bran muffin of journalism.

But you know what? We change lives. And I’m going to argue that we change lives precisely because we force open that too-small box that most human beings think they live in.

The Monitor is a peculiar little publication that’s hard for the world to figure out. We’re run by a church, but we’re not only for church members and we’re not about converting people. We’re known as being fair even as the world becomes as polarized as at any time since the newspaper’s founding in 1908.

We have a mission beyond circulation, we want to bridge divides. We’re about kicking down the door of thought everywhere and saying, “You are bigger and more capable than you realize. And we can prove it.”

If you’re looking for bran muffin journalism, you can subscribe to the Monitor for $15. You’ll get the Monitor Weekly magazine, the Monitor Daily email, and unlimited access to

QR Code to Ukrainian hackers call for volunteers before cyberwar heats up
Read this article in
QR Code to Subscription page
Start your subscription today