in

The last tactic of Ukraine is a drone that seeks to catch him. When Russia opens it displays its threat: a virus

The Russian invasion in Ukraine has led to two very different lines of development in kyiv. On the one hand, and in the face of investment in sophisticated and expensive armament, Ukraine has shown that systems relatively simple and low costas The mounted shotguns In drones, they can be equal or more decisive in asymmetric combat scenarios. On the other, and given the adversity, the creation of one of the most powerful industries From the planet: national combat drones.

The last one is a surprise.

Technology on the battlefield. We have gone counting months ago. The war between Russia and Ukraine, marked from the beginning by intensive use of New technologieshe has seen in the drones one of his more decisive instruments. However, a recent video Shared in social networks of Russian origin warns about a new and worrying front: Malware use by Ukraine embedded in drones capable of infecting Russian systems.

Although these computer threats have been considered lower so far (mainly because they do not attack complete networks, but individual devices such as computers or the captured drones themselves) their appearance represents a more than significant change in the cyber dimension of the conflict.

Ukrainian malware. Apparently, Forbes counted that the malware detected in Ukrainian drones has Specific functions: physically damage USB ports, prevent the Reflasso of the system, block the reprogramming of the drone or even very important, allow Ukraine to locate the new Russian operators if the drone is reused by Moscow.

As? These malicious codes are designed to sabotage any reuse attempt by the enemy, disabled the electronics of the devices or creating vulnerabilities They can be remotely exploited. In a context in which both countries face resource restrictions, limiting the ability to have enemy drones represents a crucial strategic advantage for Ukraine.

Operational impact and consequences. No doubt, the use of malware has immediate tactical implications. Russia depends on the detailed analysis of the enemy drones captured for Adapt your systems of countermeasures, which requires manipulating its components and studying its software.

If these drones are protected with code that disables or compromises their systems when connecting them, the reverse engineering process becomes slower, complex and, ultimately, risky. Thus, Ukraine manages to extend the useful life cycle of its drones before Moscow develops an effective countermelted, something vital in an environment where technological innovation translates into direct tactical advantage.

“Human” talent. Development looks in the form achieved with the Double cannon or with The optical fiber. The success of these strategies lies in the force of Ukrainian technological sectorthat before the war already stood out for its dynamism and human talent. With a robust base of software engineers and cybersecurity experts, Ukraine has managed to transfer civil abilities to the military, generating asymmetric tools that do not require great physical resources, but a high degree of technical sophistication.

The development of malware in drones allows maximizing the impact of available resources, hindering Russian work without increasing the number of devices deployed.

A new cyber career in the theater. Not just that. The introduction of malware also marks the beginning of a new phase in the struggle for technological superiority. If Ukraine has begun to use malware with limited but effective functions, it is reasonable to anticipate that Russia will respond with Your own developments Similar offensives, as has happened with previous innovations of both sides.

In this way, a climbing cycle is opened: more advanced malware will require better defenses, which in turn will be target of more sophisticated versions. In a short time, it is assumed that both parties could implement specific antivirus protection in drones, harden managerial device management protocols and use new malicious software variants that attack command and control networks or even open rear doors for intelligence operations.

Technological consequences. In the last three years, both Russia and Ukraine have converted their respective scientific ecosystems into Weapons at the service of war effort. The Ukrainian decision to integrate malware into its drones not only slows the Russian reusing, but redefines the battle for Technological supremacy In the conflict.

In addition, the strategy can be extended perfectly to other electronic devices, including smart weapons, communications sensors or systems. What began as an innovative tactic could be consolidated as a digital war doctrine, influencing the design, use and protection of all military equipment from now on.

If you want also, the deployment of malware in Ukrainian drones shows how modern war has moved towards the scope of the code, where only a small script can have effects comparable to a certain shot … without the need for a single bullet.

Image | Rawpixel

In Xataka | To hunt Russian drones, Ukraine is resorting to a revolutionary technique … from World War I

In Xataka | A Russian drone has opened one of the greatest engineering works. The problem: it was the sarcophagus of Chernobil reactor 4

What do you think?

Leave a Reply

Your email address will not be published. Required fields are marked *

GIPHY App Key not set. Please check settings

Goal has an excellent reason to launch a gigantic flame variant 4: Specialization capacity

The traditional couple model is in crisis. And it has translated into more people eating alone in restaurants