Phoenix Soaring: What We Can Learn from Ukraine's Cyber Defenders
This panel discussion explores the evolution of cyber warfare and resilience strategies in the context of the ongoing conflict in Ukraine. It highlights the shift from destructive, chaotic cyber attacks to more focused espionage and data collection operations targeting critical infrastructure. The speakers emphasize the importance of international cooperation, information sharing, and proactive defense measures like the 'Shields Up' campaign to mitigate risks to national security. The session provides insights into building operational and societal resilience against sophisticated state-sponsored threats.
Beyond the Headlines: The Reality of Modern State-Sponsored Cyber Warfare
TLDR: This panel discussion at Black Hat 2023 moves past the typical "cyber threat actor" rhetoric to examine the shift in state-sponsored operations from chaotic, destructive attacks to focused, persistent espionage. By analyzing the conflict in Ukraine, the speakers highlight how critical infrastructure and election systems are being targeted for data collection rather than just disruption. For researchers and pentesters, the key takeaway is that modern defense requires proactive threat hunting and a shift toward "secure-by-design" architectures rather than reactive patching.
State-sponsored cyber operations have matured. The era of noisy, destructive malware campaigns that grab headlines is being supplemented—and in many cases, superseded—by quiet, surgical espionage. If you are still looking for the next NotPetya, you are looking at the wrong target. The real-world risk today is not just a system going offline; it is the silent exfiltration of data from critical infrastructure and the long-term compromise of systems that underpin democratic processes.
The Shift in Offensive Strategy
The conflict in Ukraine serves as a masterclass in how state-sponsored actors have evolved their tactics. Historically, we saw a heavy reliance on T1498-network-denial-of-service and destructive wipers. While these techniques remain in the playbook, the current focus has shifted toward T1592-gather-victim-org-information and long-term persistence.
Attackers are no longer just trying to break things. They are trying to understand the battlefield. By targeting situational awareness systems and tactical infrastructure, they gain the intelligence necessary to inform kinetic operations. For a researcher, this means the "threat" is no longer a single payload; it is a multi-stage campaign that relies on living-off-the-land techniques and compromised supply chains to maintain access.
Why Critical Infrastructure is the New Frontline
Critical infrastructure—specifically power grids and election systems—has become the primary target for these operations. The technical challenge here is that these systems are often built on legacy protocols that were never designed with modern security in mind. When an adversary gains a foothold in an Industrial Control System (ICS) or a voter registration database, they are not looking for a quick payout. They are looking for a strategic advantage.
For those of us conducting penetration tests, this highlights a critical gap in our methodology. We often focus on the web application layer or the perimeter, but we rarely test the resilience of the underlying operational technology. If you are testing an environment that touches critical infrastructure, your scope must include the interdependencies between IT and OT. An attacker does not care about your firewall rules if they can pivot through a misconfigured management interface or an insecure API used by a third-party vendor.
The Defensive Pivot: Moving Beyond Patching
Defenders are finally acknowledging that patching is not a strategy. The "Shields Up" campaign discussed by CISA is a direct response to the realization that we cannot simply patch our way out of a sophisticated, state-sponsored threat. The focus is moving toward OWASP A06:2021-Vulnerable and Outdated Components mitigation, but more importantly, toward architectural resilience.
If you are working with a blue team, your advice should move away from "patch this" and toward "how do we segment this?" or "how do we detect this movement?" The goal is to make the cost of the attack higher than the value of the intelligence gained. This is the essence of deterrence by denial.
Actionable Intelligence for Researchers
The most valuable skill for a modern researcher is not finding a zero-day, but understanding the adversary's intent. When you are performing a red team engagement, ask yourself: what would a state actor want to know about this network? Are they looking for user credentials, or are they looking for the configuration files of the SCADA systems?
We need to start treating our infrastructure as if it is already compromised. This means implementing robust logging, monitoring for anomalous traffic patterns, and, most importantly, building systems that can continue to operate even when a component is compromised.
The next time you are looking at a target, look past the obvious vulnerabilities. Investigate the supply chain, the third-party integrations, and the administrative interfaces that are often left wide open. The goal is not just to find a bug; it is to understand the system well enough to identify where the adversary is hiding. If you want to stay ahead, you have to stop thinking like a bug hunter and start thinking like a defender who knows exactly what the adversary is after. The landscape is not changing; it has already changed. It is time for our research to catch up.
Target Technologies
Attack Techniques
All Tags
Up Next From This Conference

Chained to Hit: Discovering New Vectors to Gain Remote and Root Access in SAP Enterprise Software

Zero-Touch-Pwn: Abusing Zoom's Zero Touch Provisioning for Remote Attacks on Desk Phones

ODDFuzz: Hunting Java Deserialization Gadget Chains via Structure-Aware Directed Greybox Fuzzing
Similar Talks

Kill List: Hacking an Assassination Site on the Dark Web

Counter Deception: Defending Yourself in a World Full of Lies

