Cyberwarfare is the word used politically to define the most aggressive attacks on the Internet as a form of hacking secret security or important information from the government or countries. On the other words, it can be defined as an activity by national army which uses the Internet as digital battle or an invasion of another country (Paganini, 2013).
It is believed that cyberwarfare is necessary to be defined as model of conflict (Paganini, 2013). According to Paganini, almost every countries are now investing in cyber capabilities in order to protect and defence for unpredictable future cyberwar. For better explaining the acts of cyber war, the Estonia’s government networks in 2007 was a great example, an offense occurred in a period of intense political contrasts with Russia (Financial Times).
However, there is a recent cyberwarfare from Russian and Ukraine. According to a reporter’s from Texas cyber security firm that a group of Russian hackers exploited Microsoft Windows to keep tracks or spy on Nato and other targets. The hackers also not only attacks a telecommunications firm from French but also an unknown Western European government and an organization in U.S. (iSIGHT, 2014).
“Sandworm Team” is monitored by iSIGHT whose group has been started nearly 5 years ago which impacting all versions of Microsoft Windows (Ward, 2014). Moreover, it is discovered that the hackers prefer to target victims by sending virus as a file which infects the computers once it’s opened which is called “spear-phishing attack”(Jones, 2014).
Furthermore, CNN’s Richard Quest interviews McAfee CEO Michael DeCesare in the face of growing cyber security concerns in Ukraine about whether or not the Russians are really using cyberwar to attack. It discusses that how Russians forces jam phones and block Internet.
According to the report of iSIGHT, a number of attacks have been observed and specific to the Ukrainian conflict with Russia to geopolitical issues. Therefore, Microsoft now released an update to fix security flaw to minimize any future attacks (Jones, 2014).