The cyberattacks we’ve seen as part of the current Russia-Ukraine war are more destructive than generic viruses and ransomware. Since mid-January 2022, various Ukrainian companies have been attacked with deadly malware that leaves assets compromised and inoperable.2 Some attacks have resulted in machines being erased entirely, with no possibility for ransom payment or recovery options.
Hackers have gained full control of cyberwarfare, and attacks can come in various forms. Even people who aren’t intended targets can experience the fallout. As Stuart Madnick of the Harvard Business Review points out, attacks can be both direct and indirect.3
- Direct Attacks: When people think of cyberwarfare, they often picture direct attacks that specifically target one entity. For example, a virus infiltrating all your organization’s devices is a direct attack. These can also include phishing scams and stolen data.
- Indirect Attacks: Indirect attacks happen on a grander scale because there is no individual target. Instead, the target could be a power grid, supply chains, banking systems, water treatment, communications, or transportation. These attacks often create more widespread damage due to the number of people they impact.
Cyberattacks in any form must be avoided—which means organizations need to have safeguards in place to protect from both direct and indirect consequences. As malware and hacking techniques evolve, bad actors will cause more devastation worldwide.
As we enter the era of cyberwarfare, the U.S. CISA, CERTs, and other governmental agencies in various countries have advised firms to shield up and prepare for more cyberattacks. Executives who want to see their corporations succeed must recognize the value of cyber threat intelligence, proactive risk management, tabletop exercises, and self-audits to consistently assess their ability to detect and close cybersecurity gaps. Cyberwarfare in a Borderless World: 11 Tips for Ensuring Security 2
Hackers will target anyone who is vulnerable—and anyone could be the next victim. Your organization’s best way forward is to develop an end-to-end cybersecurity approach where technology and security hygiene are maintained.