ITPro Podcast: The changing face of cyber warfare
Russian-sponsored cyber attacks may not have had the feared impact, but for Europe they’re here to stay

It’s been over a year since Russia’s unprovoked invasion of Ukraine, and for those in the tech sector cyber warfare has defined the conflict. Ukrainian organisations, both public and private, have been subject to attacks including wiper malware, spear phishing, and data breaches.
National cyber security agencies, as well as teams of security experts from throughout the field, remain on high alert for heightened Russian cyber activity. Understanding the strategies of these hackers, as well as their individual motivations, has been key to retaining the integrity of targeted systems.
In this episode, Jane and Rory speak to Daniel Thanos, head of Arctic Wolf Labs, to discuss the current state-sponsored threat group landscape, and how the terms of the conflict have shifted over time.
Highlights
“Some groups are more closely affiliated to the government than others. And that could be because quite literally you might have members of the group that it’s their moonlighting job, they literally can be folks that are involved in state cyber operations but by night this is like their freelance gig.”
“I think the outcome that the Russians certainly wanted, happened differently. What I will tell you is if you talk to people that I've been involved in the Ukrainian CERT, the folks that are actually involved in the cyber defence of Ukraine, they have thwarted a lot of attacks. And they continue to do so every day.”
“Their intelligence programmes against NATO aren't going to change, they're only going to intensify. Because now as a result of this war, and as a result of their disastrous policies, they're going to get exactly what they didn't want, which is an expansion of NATO. So NATO now is going to become an even bigger threat to them. And so you can be guaranteed that they're going to only increase their cyber operations against it.”
Read the full transcript here.
Get the ITPro daily newsletter
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
Footnotes
- Intellias: Disaster recovery during Russia's war on Ukraine
- Microsoft: Russia increasingly timing cyber attacks with missile strikes in Ukraine
- 'CryWiper' trojan disguises as ransomware, says Kaspersky
- The new wave of cyber security threats facing critical national infrastructure (CNI)
- What is cyber warfare?
- Russian cyber attacks on Ukraine: What we know so far
- Microsoft: Russia increasingly timing cyber attacks with missile strikes in Ukraine
- UK's £6m cyber support package for Ukraine revealed for first time
- Critical infrastructure at risk again from Stuxnet-like attack
- Stuxnet is back, Iran admits
Subscribe
ITPro is a global business technology website providing the latest news, analysis, and business insight for IT decision-makers. Whether it's cyber security, cloud computing, IT infrastructure, or business strategy, we aim to equip leaders with the data they need to make informed IT investments.
For regular updates delivered to your inbox and social feeds, be sure to sign up to our daily newsletter and follow on us LinkedIn and Twitter.
-
Bigger salaries, more burnout: Is the CISO role in crisis?
In-depth CISOs are more stressed than ever before – but why is this and what can be done?
By Kate O'Flaherty Published
-
Cheap cyber crime kits can be bought on the dark web for less than $25
News Research from NordVPN shows phishing kits are now widely available on the dark web and via messaging apps like Telegram, and are often selling for less than $25.
By Emma Woollacott Published
-
‘Phishing kits are a force multiplier': Cheap cyber crime kits can be bought on the dark web for less than $25 – and experts warn it’s lowering the barrier of entry for amateur hackers
News Research from NordVPN shows phishing kits are now widely available on the dark web and via messaging apps like Telegram, and are often selling for less than $25.
By Emma Woollacott Published
-
Healthcare systems are rife with exploits — and ransomware gangs have noticed
News Nearly nine-in-ten healthcare organizations have medical devices that are vulnerable to exploits, and ransomware groups are taking notice.
By Nicole Kobie Published
-
Alleged LockBit developer extradited to the US
News A Russian-Israeli man has been extradited to the US amid accusations of being a key LockBit ransomware developer.
By Emma Woollacott Published
-
February was the worst month on record for ransomware attacks – and one threat group had a field day
News February 2025 was the worst month on record for the number of ransomware attacks, according to new research from Bitdefender.
By Emma Woollacott Published
-
CISA issues warning over Medusa ransomware after 300 victims from critical sectors impacted
News The Medusa ransomware as a Service operation compromised twice as many organizations at the start of 2025 compared to 2024
By Solomon Klappholz Published
-
Warning issued over prolific 'Ghost' ransomware group
News The Ghost ransomware group is known to act fast and exploit vulnerabilities in public-facing appliances
By Solomon Klappholz Published
-
The new era of cyber threats
ITPro Podcast With AI-powered attacks and state-backed groups, security teams face face a new wave of sophisticated threats
By Rory Bathgate Published
-
The Zservers takedown is another big win for law enforcement
News LockBit has been dealt another blow by law enforcement after Dutch police took 127 of its servers offline
By Solomon Klappholz Published