{
	"id": "a0a2591f-66cb-4288-b638-440e6c5d9371",
	"created_at": "2026-04-06T00:10:55.46851Z",
	"updated_at": "2026-04-10T03:21:14.729576Z",
	"deleted_at": null,
	"sha1_hash": "4b932536c30d63343ae336f1db3df98693284a54",
	"title": "Cyber Attacks in Times of Conflict | CyberPeace Institute",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 39818,
	"plain_text": "Cyber Attacks in Times of Conflict | CyberPeace Institute\r\nArchived: 2026-04-05 21:20:10 UTC\r\nCyber Attacks in\r\nTimes of Conflict\r\nPlatform #Ukraine\r\nMonitoring the harm to civilians from cyberattacks, in the quest for cyberpeace.\r\nCyberattacks and operations in times of conflict cause harm to civilians.\r\nExplore the conflict in cyberspace\r\nCyber Threats\r\nAnalyzing attacks \u0026 attribution to reach legal accountability\r\nOverview\r\nWhich actors, through what type of cyberattacks, pose the greatest threat?\r\nTimeline\r\nHow have cyberattacks evolved over time relating to the military invasion of Ukraine?\r\nAttack Details\r\nWhat type of cyberattacks and operations have impacted infrastructure and civilian objects?\r\nLatest Analysis\r\nA summary of the findings from our analysis report on the cyberattacks in the latest quarter\r\nImpact \u0026 Harm\r\nTracing harm to civilians to protect civilians\r\nOverview\r\nHow do cyberattacks and operations impact civilians?\r\nGeopolitical Map\r\nWhich countries have been impacted by cyberattacks and how do these relate to geopolitical and economic\r\nactivities?\r\nhttps://cyberpeaceinstitute.org/ukraine-timeline-of-cyberattacks\r\nPage 1 of 2\n\nSectors\r\nHow have specific sectors been impacted by cyberattacks related to the conflict?\r\nLaw \u0026 Policy\r\nDocumenting legal instruments to drive regulatory change\r\nOverview\r\nHow does the legal and normative ecosystem relate to cyberattacks deployed during an armed conflict?\r\nCase Study\r\nWhat happened to Viasat and what does this mean for accountability in cyberspace?\r\nExplainer Videos\r\nInsights from our data analysis on the crucial role of cyberattacks in this conflict.\r\nCyber Dimensions of the Armed Conflict in Ukraine\r\nThe CyberPeace Institute invites you to read about the trends and emerging issues relating to cyber incidents\r\ntaking place in Ukraine, the Russian Federation and other countries impacted by cyberattacks in the context of the\r\narmed conflict through our first of its kind quarterly analysis report.\r\nQuarterly Analysis Report - Q3 July to September 2023\r\nDonation\r\nSupport the CyberPeace Institute\r\nIndividual lives can be changed dramatically by the acts of cyber criminals. We need your support to assist victims\r\nof cyberattacks in the NGO, humanitarian and healthcare sectors.\r\nResults based on data collected between\r\nJanuary 2022 and December 2023\r\nSource: https://cyberpeaceinstitute.org/ukraine-timeline-of-cyberattacks\r\nhttps://cyberpeaceinstitute.org/ukraine-timeline-of-cyberattacks\r\nPage 2 of 2",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"Malpedia"
	],
	"references": [
		"https://cyberpeaceinstitute.org/ukraine-timeline-of-cyberattacks"
	],
	"report_names": [
		"ukraine-timeline-of-cyberattacks"
	],
	"threat_actors": [],
	"ts_created_at": 1775434255,
	"ts_updated_at": 1775791274,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/4b932536c30d63343ae336f1db3df98693284a54.pdf",
		"text": "https://archive.orkl.eu/4b932536c30d63343ae336f1db3df98693284a54.txt",
		"img": "https://archive.orkl.eu/4b932536c30d63343ae336f1db3df98693284a54.jpg"
	}
}