Jump directly to page content

Cyber Sanctions

Last update 13 October 2021

At: Annegret Bendiek, Matthias Schulze: »Attribution: A Major Challenge for EU Cyber Sanctions«, SWP Research Paper 2021/RP 11, 16.12.2021.

 

Criterion

Required features

WannaCry
(12/05/2017)

NotPetya
(27/06/2017)

Cloud Hopper 2016

Bundestag hack
(30/04/2015)

OPCW 2018
(13/04/2018)

Cyberattack
(Art. 1(3) and (7) Regulation (EU) 2019/796)

Actions involving any of the following

 

 

 

 

 

 

a. access to information systems;

yes

yes

yes

yes

no

 

b. information system interference;

yes

yes

yes

yes

no

 

c. data interference; or

yes

yes

yes

yes

no

 

d. data interception

no

no

yes

yes

yes

 

where such actions are not duly authorised by the owner or by another right holder of the system or data, or of part of it, or are not permitted under the law of the Union or the Member State concerned.

 

 

 

 

 

 

Including attempted cyberattacks

 

 

 

 

yes

Attacker determination
(Art. 1(2) and (4) Regulation [EU] 2019/796)

Attackers are located outside the EU (natural/legal persons, entities or bodies) or operate from outside the EU

yes

yes

yes

yes

yes

 

Attackers use infrastructure outside the EU

yes

yes

yes

yes

no

 

Victims: within the EU (critical infrastructures, including submarine cables and objects launched into space as part of critical infrastructure)

 

 

 

 

 

 

Cyberattacks constituting an external threat include those which:

 

 

 

 

 

 

a. originate, or are carried out, from outside the Union;

yes

yes

yes

yes

no

 

b. use infrastructure outside the Union;

yes

yes

yes

yes

yes

 

c. are carried out by any natural or legal person, entity or body established or operating outside the Union; or

yes

yes

yes

yes

yes

 

d. are carried out with the support, at the direction or under the control of any natural or legal person, entity or body operating outside the Union.

yes

yes

yes

yes

yes

Damage and scope
(Art. 2 Regulation [EU] 2019/796)

a. the scope, scale, impact or severity of disruption caused, including to economic and societal activities, essential services, critical state functions, public order or public safety;

approx. 150 countries

approx. 65 countries

unknown

Germany only

Netherlands only

 

approx. 23,000 systems, including critical infrastructure

approx. 49,000 systems

unknown

approx. 50 systems

approx. 1 system

 

Economic costs

 

 

 

 

 

 

b. the number of natural or legal persons, entities or bodies affected;

among others, Télefonica and O2 (Spain and EU), DB Schenker of Deutsche Bahn (Germany), Renault (France), Banco Bilbao Vizcaya Argentaria (Spain), Sandvik (Sweden)

among others Maersk (Denmark), Rosneft (Russia), Merck Sharp & Dohme (USA), Mondelez (USA), FedEx/TNT (USA/ Germany), Reckitt Benckiser (UK), Saint-Gobain (France) and Beiersdorf (Germany), as well as 80 hospitals & medical facilities of the Heritage Valley Health System (USA)

IBM, HPE (both USA), Ericsson, SKF (both Sweden), Valmet (Finland), Fujitsu (Japan), Tata Consultancy Services (India), NTT Data (Japan), Dimension Data (South Africa), Computer Sciences Corporation, DXC Technology, Sabre Corp, Huntington Ingalls Industries (all USA), as well as NASA (USA) and the U.S. Navy

1 Bundestag

1 OPCW

 

c. the number of Member States concerned;

at least 6

at least 3

at least 2

1

1

 

d. the amount of economic loss caused, such as through large-scale theft of funds, eco-nomic resources or intellectual property;

approx. US$4 billion

approx. US$10 billion

unknown, approx. several million USD

approx. US$1 billion

none

 

e. the economic benefit gained by the perpetrator for himself or for others;

approx. US$70,000

unknown

unknown

unknown

unknown

 

f. the amount or nature of data stolen or the scale of data breaches; or

unknown

unknown

intellectual property

unknown

none

 

g. the nature of commercially sensitive data accessed

 

 

 

 

 

Target or victim
(Art. 1(4) Regulation [EU] 2019/796)

 

inconclusive

sabotage and disruption

industrial and political espionage

political espionage

political espionage

 

 

disruption

“tacit bargaining” towards Ukraine

 

allegation of influence operation

 

 

 

“signalling” towards the NSA

 

 

 

 

 

 

Profit

 

 

 

 

 

 

diversionary tactics

 

 

 

 

 

a. critical infrastructure, including submarine cables and objects launched into outer space, which is essential for the maintenance of vital functions of society, or the health, safety, security and people’s economic or social well-being;

yes

no

no

no

no

 

b. services necessary for the maintenance of essential social and/or economic activities, in particular in the following sectors:

unknown

no

no

unknown

no

 

1. energy (electricity, oil and gas);

unknown

unknown

no

no

no

 

2. transport (air, rail, water and road);

yes

yes

no

no

no

 

3. banking, financial market infra-structures;

yes

yes (but outside the EU)

no

no

no

 

4. health (healthcare providers, hospitals and private clinics);

yes

yes

no

no

no

 

5. drinking water supply and distri-bution;

unknown

unknown

no

no

no

 

6. digital infrastructure; and any other sector which is essential for the Member State concerned;

unknown

unknown

yes

no

no

 

c. critical state functions, particularly in the areas of:

 

yes (but outside the EU)

no

no

no

 

1. defence;

unknown

unknown

yes (but outside the EU)

no

no

 

2. governance;

yes

unknown

no

yes

no

 

3. the functioning of institutions, including those required for public elections or the voting process;

no

unknown

no

indirectly

no

 

4. the functioning of economic and civil in-frastructure;

unknown

yes (but outside the EU)

yes

no

no

 

5. internal security;

unknown

unknown

no

no

no

 

6. external relations, including diplomatic missions;

no

unknown

no

no

yes

 

d. the storage or processing of classified information;

no

unknown

no

presumably

no

 

e. government emergency response teams.

no

unknown

no

no

no

Attribution

 

June 2017: NSA and GCHQ suspect military intelligence RGB in North Korea

April 2018: ESET sees similarities with Industroyer

December 2010: U.S. attributes to APT 10

June 2015: C. Guarnieri suspects APT 28

October 2018: Dutch make political attribution

 

 

18/12/2017: public attribution by UK and U.S. with “high probability”

January 2018: CIA with “high certainty”

 

July 2017: ThreatConnect discovers similarities with DNC hack

NCSC (UK) supports: “almost certainly responsible”

 

 

16/04/2018: EU Council condemns

15/02/2018: political attribution via Five Eyes

 

2016: German Agency for the Protection of the Constitution (BfV) designates Russia

October 2018: European Council, Commission and HR publicly attribute

 

 

 

February 2020: UK & US attribute legally to Russia

 

January 2018: AIVD publicises APT 29

 

 

 

 

 

 

July 2018: U.S. indictment for DNC hack

 

 

 

 

 

 

March 2019: Mueller Report names 12 GRU officials

 

 

 

 

 

 

October 2019: federal government publicly attributes to Russia

 

Significance & scope of public evidence

 

medium

medium

low

medium

high

Sanctions/Reaction

 

September 2018: U.S. indictment

15/10/2020: U.S. indictment against 6 Russian citizens

December 2010: DoJ indictment

July 2018: DoJ indictment against 12 Russian hackers, DNC hack

October 2018: U.S. indictment

 

 

30/07/2020: EU sanctions (2020/1125)

July 2020: EU sanctions (2020/1125)

12/04/2019: statement of the EU HR

October 2020: EU sanctions (EU 2020/1536)

July 2020: EU sanctions (EU 2020/1125)

 

 

 

 

July 2020: EU sanctions (EU 2020/1125 and 2020/1744)

 

 

Sanctioned individuals/ defendants based in the USA

 

Park Jin Hyok

Yuri Sergeyevich Andrienko

Zhu Hua

Viktor Borisovich Netyksho

Aleksei Sergeyevich Morenets 

 

 

Jon Chang Hyok

Sergey Vladimirovich Detistov

Zhang Shilong

Boris Alekseyevich Antonov

Evgenii Mikhaylovich Serebriakov

 

 

Kim Il

Pavel Valeryevich Frolov

 

Dimitry Sergeyevich Yermakov

Artem Andreyevich Malyshev

 

 

 

Anatoliy Sergeyevich Kovalev

 

Aleksey Viktorovich Lukashev

Dimitry Sergeyevich Badin

 

 

 

Artem Valeryevich Ochichenko

 

Sergey Aleksandrovich Morgachev

Oleg Mikhaylovich Sotnikov

 

 

 

Petr Nikolayevich Pliskin

 

Nikolay Yuryebich Kozachek

Alexey Valerevich Minin 

 

 

 

 

 

Pavel Vyacheslavovich Yershov

 

 

 

 

 

 

Artem Andreyevich Malyshev

 

 

 

 

 

 

Aleksandr Vladimirovich Osadchuk

 

 

 

 

 

 

Aleksey Aleksandrovich Potemkin

 

 

 

 

 

 

Anatoliy Sergeyevich Kovalev

 

Sanctioned individuals/ defendants of the EU

 

Chosun Expo

Main Centre for Special Technologies (GTsST) of the Main Directorate of the General Staff of the Armed Forces of the Russian Federation (GU/GRU)

Tianjin Huaying Haitai Science and Technology Development

85th Main Centre for Special Services (GTsSS) of the Main Directorate of the General Staff of the Armed Forces of the Russian Federation (GU/GRU)

85th Main Centre for Special Services (GTsSS) of the Main Directorate of the General Staff of the Armed Forces of the Russian Federation (GU/GRU)

 

 

 

 

Gao Quiang

Dimitry Sergeyevich Badin

Aleksei Sergeyevich Morenets

 

 

 

 

Zhang Shilong

Igor Olegovich Kostyukov

Evgenii Mikhaylovich Serebriakov

 

 

 

 

 

 

Oleg Mikhaylovich Sotnikov

 

 

 

 

 

 

Alexey Valerevich Minin

Political support of attribution

 

Estonia

Denmark

UK

unknown

UK

 

 

Netherlands

Latvia

Canada

 

 

 

 

France

Sweden

Australia

 

 

 

 

UK

Finland supports U.S. attribution

New Zealand

 

 

 

 

Canada

 

USA

 

 

 

 

Australia

 

Germany

 

 

 

 

New Zealand

 

 

 

 

 

 

Japan

 

 

 

 

 

 

USA also welcomed the EU’s restrictive measures