{"id":47939,"date":"2022-08-11T21:30:10","date_gmt":"2022-08-11T21:30:10","guid":{"rendered":"https:\/\/www.threatshub.org\/blog\/russian-invasion-has-dangerously-destabilized-cyber-security-norms\/"},"modified":"2022-08-11T21:30:10","modified_gmt":"2022-08-11T21:30:10","slug":"russian-invasion-has-dangerously-destabilized-cyber-security-norms","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/russian-invasion-has-dangerously-destabilized-cyber-security-norms\/","title":{"rendered":"Russian invasion has dangerously destabilized cyber security norms"},"content":{"rendered":"<p><span class=\"label\">Black Hat<\/span> The hacktivist attacks that have occurred during the ongoing war in Ukraine are setting a dangerous precedent for cyber norms \u2014 and infrastructure security, according to journalist and author Kim Zetter.<\/p>\n<p>&#8220;Of course, the situation in Ukraine is unprecedented,&#8221; said Zetter, speaking during the Black Hat keynote on Thursday. &#8220;And this isn&#8217;t meant to criticize the country for doing what it thinks is necessary to defend itself. But the security community and governments have to be aware of the potential path that this is leading us to.&#8221;<\/p>\n<div class=\"CaptionedImage Border width_85\" readability=\"7\"><a href=\"https:\/\/regmedia.co.uk\/2022\/08\/11\/kim_zetter_black_hat_keynote.jpg\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/regmedia.co.uk\/2022\/08\/11\/kim_zetter_black_hat_keynote.jpg?x=442&amp;y=223&amp;infer_y=1\" alt=\"kim_zetter_black_hat_keynote\" title=\"kim_zetter_black_hat_keynote\" height=\"223\" width=\"442\"><\/a><\/p>\n<p class=\"text_center\">Zetter speaking in Las Vegas today. Click to enlarge<\/p>\n<\/div>\n<p>The idea of &#8220;cyber norms&#8221; isn&#8217;t an amorphous concept,she explained. In 2015 the United Nations tasked 20 nations, including the US, UK, China and Russia, with developing guidelines for how international law applies in cyberspace, especially considering the growing likelihood of cyberattacks in future conflicts.&nbsp;<\/p>\n<p>The end result of this process was a <a target=\"_blank\" rel=\"nofollow noopener\" href=\"https:\/\/ccdcoe.org\/incyder-articles\/2015-un-gge-report-major-players-recommending-norms-of-behaviour-highlighting-aspects-of-international-law\/\">report<\/a> that outlined normal behavior and principles in cyberspace, and put a fine point on the dangers stemming from cyberattacks against critical infrastructure.<\/p>\n<p>&#8220;They agreed that states should not intentionally damage other states&#8217; critical infrastructure or otherwise impair the operation of critical infrastructure that provides public services,&#8221; Zetter recapped.<\/p>\n<div aria-hidden=\"true\" class=\"adun\" data-pos=\"top\" data-raptor=\"condor\" data-xsm=\",fluid,mpu,\" data-sm=\",fluid,mpu,\" data-md=\",fluid,mpu,\"> <noscript> <a href=\"https:\/\/pubads.g.doubleclick.net\/gampad\/jump?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2YvV6ObW3y9OfmSH9D2yMKgAAABE&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0\" target=\"_blank\" rel=\"noopener\"> <img decoding=\"async\" src=\"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2YvV6ObW3y9OfmSH9D2yMKgAAABE&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0\" alt> <\/a> <\/noscript> <\/div>\n<p>&#8220;They also agreed that states shouldn&#8217;t allow their territory to be used for cyberattacks against other states, and should take steps to mitigate malicious activity emanating from their territory when it&#8217;s aimed at critical infrastructure of other states.&#8221;<\/p>\n<div aria-hidden=\"true\" class=\"adun\" data-pos=\"top\" data-raptor=\"falcon\" data-xmd=\",fluid,mpu,leaderboard,\" data-lg=\",fluid,mpu,leaderboard,\" data-xlg=\",fluid,billboard,superleaderboard,mpu,leaderboard,\" data-xxlg=\",fluid,billboard,superleaderboard,brandwidth,brandimpact,leaderboard,mpu,\"> <noscript> <a href=\"https:\/\/pubads.g.doubleclick.net\/gampad\/jump?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=4&amp;c=44YvV6ObW3y9OfmSH9D2yMKgAAABE&amp;t=ct%3Dns%26unitnum%3D4%26raptor%3Dfalcon%26pos%3Dmid%26test%3D0\" target=\"_blank\" rel=\"noopener\"> <img decoding=\"async\" src=\"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=4&amp;c=44YvV6ObW3y9OfmSH9D2yMKgAAABE&amp;t=ct%3Dns%26unitnum%3D426raptor%3Dfalcon%26pos%3Dmid%26test%3D0\" alt> <\/a> <\/noscript> <\/div>\n<div class=\"adun_eagle_desktop_story_wrapper\">\n<div aria-hidden=\"true\" class=\"adun\" data-pos=\"mid\" data-raptor=\"eagle\" data-xxlg=\",mpu,dmpu,\"> <noscript> <a href=\"https:\/\/pubads.g.doubleclick.net\/gampad\/jump?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=3&amp;c=33YvV6ObW3y9OfmSH9D2yMKgAAABE&amp;t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0\" target=\"_blank\" rel=\"noopener\"> <img decoding=\"async\" src=\"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=3&amp;c=33YvV6ObW3y9OfmSH9D2yMKgAAABE&amp;t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0\" alt> <\/a> <\/noscript> <\/div>\n<\/p><\/div>\n<p>As we&#8217;ve all witnessed, this quickly went out the window following Russia&#8217;s illegal invasion of Ukraine in February.<\/p>\n<h3 class=\"crosshead\"> <span>Rise of the IT Army<\/span><br \/>\n<\/h3>\n<p>Zetter, for her part, focused on Ukrainian hacktivists and sympathizers, possibly because Russia usually displays very little regard for international norms, cyber or otherwise.&nbsp;<\/p>\n<p>Shortly after Russia <a target=\"_blank\" href=\"https:\/\/www.theregister.com\/2022\/02\/23\/us_sanctions_russia\/\" rel=\"noopener\">invaded<\/a> and began conducting <a target=\"_blank\" href=\"https:\/\/www.theregister.com\/2022\/05\/10\/us_eu_russia\/\" rel=\"noopener\">data-wiper attacks<\/a> against Ukrainian organizations and infrastructure, Ukraine&#8217;s Vice Prime Minister Mykhailo Fedorov <a href=\"https:\/\/twitter.com\/fedorovmykhailo\/status\/1497642156076511233?lang=en\" rel=\"nofollow\">issued a call to arms<\/a> for volunteer hacktivists to launch offensive cyber operations against Russia and issued a list of 31 government and commercial websites to attack.<\/p>\n<p>The so-called <a target=\"_blank\" rel=\"nofollow noopener\" href=\"https:\/\/foreignpolicy.com\/2022\/04\/11\/russia-cyberwarfare-us-ukraine-volunteer-hackers-it-army\/\">IT Army<\/a> quickly mobilized and within days launched <a target=\"_blank\" href=\"https:\/\/www.theregister.com\/2022\/04\/26\/kaspersky_ddos_up\/\" rel=\"noopener\">DDoS attacks<\/a> against the Moscow stock exchange, Russian foreign ministry and a state-owned bank. Meanwhile, the initial 31-org target list grew to more than 600.<\/p>\n<div aria-hidden=\"true\" class=\"adun\" data-pos=\"top\" data-raptor=\"falcon\" data-xsm=\",fluid,mpu,\" data-sm=\",fluid,mpu,\" data-md=\",fluid,mpu,\"> <noscript> <a href=\"https:\/\/pubads.g.doubleclick.net\/gampad\/jump?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=4&amp;c=44YvV6ObW3y9OfmSH9D2yMKgAAABE&amp;t=ct%3Dns%26unitnum%3D4%26raptor%3Dfalcon%26pos%3Dmid%26test%3D0\" target=\"_blank\" rel=\"noopener\"> <img decoding=\"async\" src=\"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=4&amp;c=44YvV6ObW3y9OfmSH9D2yMKgAAABE&amp;t=ct%3Dns%26unitnum%3D426raptor%3Dfalcon%26pos%3Dmid%26test%3D0\" alt> <\/a> <\/noscript> <\/div>\n<p>Other cybercrime gangs including Anonymous soon joined in with more DDoS and hack-and-leak attacks, and the list of Russian organizations hit by hacktivists skyrocketed.<\/p>\n<p>&#8220;In addition, there appears to be in-house teams conducting more sophisticated operations for the IT Army that either consists of Ukrainian defense and intelligence personnel, or has direct ties to them and may also be getting tasking from them,&#8221; Zetter said, citing a June <a href=\"https:\/\/css.ethz.ch\/en\/publications\/risk-and-resilience-reports\/details.html?id=\/t\/h\/e\/i\/the_it_army_of_ukraine\" rel=\"nofollow\">report<\/a> by cyberdefense researcher Stefan Soesanto for Switzerland&#8217;s Center for Security Studies.<\/p>\n<p>In his report, Soesanto linked this government-connected team to the cyberattack that knocked <a href=\"https:\/\/www.reuters.com\/technology\/russian-cyber-experts-struggle-recover-rutube-access-third-day-outage-2022-05-11\/\" rel=\"nofollow\">RuTube offline<\/a> for three days.<\/p>\n<p>A third potentially problematic element, according to Zetter is Ukrainian-owned security firms in and outside the country that provide support tools to the IT Army.&nbsp;<\/p>\n<p>This, she said, includes the developers behind disBalancer, a distributed penetration testing&nbsp; product to help identify DDoS vulnerabilities. In March, the developed rolled out a new app called <a href=\"https:\/\/disbalancer.medium.com\/disbalancer-launches-liberator-a6c145cb88e4\" rel=\"nofollow\">Liberator<\/a>, which is essentially the same tool that can be used to conduct DDoS attacks against Russian websites.<\/p>\n<div aria-hidden=\"true\" class=\"adun\" id=\"story_eagle_xsm_sm_md_xmd_lg_xlg\" data-pos=\"mid\" data-raptor=\"eagle\" data-xsm=\",mpu,dmpu,\" data-sm=\",mpu,dmpu,\" data-md=\",mpu,dmpu,\" data-xmd=\",mpu,dmpu,\" data-lg=\",mpu,dmpu,\" data-xlg=\",mpu,dmpu,\"> <noscript> <a href=\"https:\/\/pubads.g.doubleclick.net\/gampad\/jump?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=3&amp;c=33YvV6ObW3y9OfmSH9D2yMKgAAABE&amp;t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0\" target=\"_blank\" rel=\"noopener\"> <img decoding=\"async\" src=\"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=3&amp;c=33YvV6ObW3y9OfmSH9D2yMKgAAABE&amp;t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0\" alt> <\/a> <\/noscript> <\/div>\n<p>Around that time, another Estonian company launched a <a href=\"https:\/\/portswigger.net\/daily-swig\/concerns-raised-over-bug-disclosure-program-aimed-at-tackling-russias-propaganda-machine\" rel=\"nofollow\">bug bounty program<\/a> seeking vulnerabilities in Russian critical infrastructure systems with the aim of then passing these on to Ukrainian hacktivists.<\/p>\n<p>&#8220;Despite the fact that these two companies are both based in Estonia, a member of NATO and the EU, their activity doesn&#8217;t seem to have sparked any criticism from other NATO and EU member states,&#8221; Zetter said.&nbsp;<\/p>\n<p>&#8220;Obviously, there are unique circumstances to consider,&#8221; she added. Namely: Russia invaded its neighboring country in violation of international law and has committed alleged war crimes against Ukrainians. Plus, these cyberattacks against Russian targets are being carried out during a war.<\/p>\n<p>&#8220;The IT Army also seems to be showing some restraint in not destroying or disrupting Russian emergency services,&#8221; Zetter said.&nbsp;<\/p>\n<h3 class=\"crosshead\"> <span>&#8216;Setting dangerous precedents&#8217;<\/span><br \/>\n<\/h3>\n<p>But, she added, citing Soesanto: &#8220;This activity is in danger of setting unintended legal and ethical precedents that may create significant political blowback in the future.&#8221;<\/p>\n<p>&#8220;What if a Russian-owned company located in Germany were to organize an offensive bug bounty program that targets Ukrainian critical infrastructure, and shares the discovered vulnerabilities with the Russian intelligence community? Would Berlin, Brussels and Washington deem this acceptable behavior by the private sector?,&#8221; she asked.<\/p>\n<p>Plus, what happens to the IT Army when the war ends? Do the hacktivists simply disband and stop all ethically murky cyber activity? Probably not.<\/p>\n<p>&#8220;Soesanto says continuing to ignore the essence of the IT Army will wreak havoc on the future stability of cyberspace, and with it the national security landscape in Europe and beyond,&#8221; Zetter said. Meanwhile, &#8220;civilian infrastructure is very much on the agenda of attackers and will only become a greater target going forward,&#8221; she noted.&nbsp;<\/p>\n<p>It&#8217;s tough to argue against either point. Unfortunately we&#8217;ll likely have to watch them play out in real time. \u00ae<\/p>\n<p> READ MORE <a href=\"https:\/\/go.theregister.com\/feed\/www.theregister.com\/2022\/08\/11\/black_hat_hacktivists\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The inside scoop on the Ukrainian IT army, and what could happen next Black Hat\u00a0 The hacktivist attacks that have occurred during the ongoing war in Ukraine are setting a dangerous precedent for cyber norms \u2014 and infrastructure security, according to journalist and author Kim Zetter.\u2026 READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":47940,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[63],"tags":[],"class_list":["post-47939","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-the-register"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Russian invasion has dangerously destabilized cyber security norms 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/russian-invasion-has-dangerously-destabilized-cyber-security-norms\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Russian invasion has dangerously destabilized cyber security norms 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/russian-invasion-has-dangerously-destabilized-cyber-security-norms\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2022-08-11T21:30:10+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/regmedia.co.uk\/2022\/08\/11\/kim_zetter_black_hat_keynote.jpg?x=442&amp;y=223&amp;infer_y=1\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/russian-invasion-has-dangerously-destabilized-cyber-security-norms\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/russian-invasion-has-dangerously-destabilized-cyber-security-norms\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Russian invasion has dangerously destabilized cyber security norms\",\"datePublished\":\"2022-08-11T21:30:10+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/russian-invasion-has-dangerously-destabilized-cyber-security-norms\\\/\"},\"wordCount\":862,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/russian-invasion-has-dangerously-destabilized-cyber-security-norms\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/08\\\/russian-invasion-has-dangerously-destabilized-cyber-security-norms.jpg\",\"articleSection\":[\"The Register\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/russian-invasion-has-dangerously-destabilized-cyber-security-norms\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/russian-invasion-has-dangerously-destabilized-cyber-security-norms\\\/\",\"name\":\"Russian invasion has dangerously destabilized cyber security norms 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/russian-invasion-has-dangerously-destabilized-cyber-security-norms\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/russian-invasion-has-dangerously-destabilized-cyber-security-norms\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/08\\\/russian-invasion-has-dangerously-destabilized-cyber-security-norms.jpg\",\"datePublished\":\"2022-08-11T21:30:10+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/russian-invasion-has-dangerously-destabilized-cyber-security-norms\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/russian-invasion-has-dangerously-destabilized-cyber-security-norms\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/russian-invasion-has-dangerously-destabilized-cyber-security-norms\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/08\\\/russian-invasion-has-dangerously-destabilized-cyber-security-norms.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/08\\\/russian-invasion-has-dangerously-destabilized-cyber-security-norms.jpg\",\"width\":442,\"height\":223},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/russian-invasion-has-dangerously-destabilized-cyber-security-norms\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Russian invasion has dangerously destabilized cyber security norms\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Russian invasion has dangerously destabilized cyber security norms 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/russian-invasion-has-dangerously-destabilized-cyber-security-norms\/","og_locale":"en_US","og_type":"article","og_title":"Russian invasion has dangerously destabilized cyber security norms 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/russian-invasion-has-dangerously-destabilized-cyber-security-norms\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2022-08-11T21:30:10+00:00","og_image":[{"url":"https:\/\/regmedia.co.uk\/2022\/08\/11\/kim_zetter_black_hat_keynote.jpg?x=442&amp;y=223&amp;infer_y=1","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/russian-invasion-has-dangerously-destabilized-cyber-security-norms\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/russian-invasion-has-dangerously-destabilized-cyber-security-norms\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Russian invasion has dangerously destabilized cyber security norms","datePublished":"2022-08-11T21:30:10+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/russian-invasion-has-dangerously-destabilized-cyber-security-norms\/"},"wordCount":862,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/russian-invasion-has-dangerously-destabilized-cyber-security-norms\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/08\/russian-invasion-has-dangerously-destabilized-cyber-security-norms.jpg","articleSection":["The Register"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/russian-invasion-has-dangerously-destabilized-cyber-security-norms\/","url":"https:\/\/www.threatshub.org\/blog\/russian-invasion-has-dangerously-destabilized-cyber-security-norms\/","name":"Russian invasion has dangerously destabilized cyber security norms 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/russian-invasion-has-dangerously-destabilized-cyber-security-norms\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/russian-invasion-has-dangerously-destabilized-cyber-security-norms\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/08\/russian-invasion-has-dangerously-destabilized-cyber-security-norms.jpg","datePublished":"2022-08-11T21:30:10+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/russian-invasion-has-dangerously-destabilized-cyber-security-norms\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/russian-invasion-has-dangerously-destabilized-cyber-security-norms\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/russian-invasion-has-dangerously-destabilized-cyber-security-norms\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/08\/russian-invasion-has-dangerously-destabilized-cyber-security-norms.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/08\/russian-invasion-has-dangerously-destabilized-cyber-security-norms.jpg","width":442,"height":223},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/russian-invasion-has-dangerously-destabilized-cyber-security-norms\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Russian invasion has dangerously destabilized cyber security norms"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/47939","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=47939"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/47939\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/47940"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=47939"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=47939"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=47939"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}