Hacktivists, Proxy Groups, Cyber Volunteers

The Future of Non-State Actors’ Involvement in Military Cyber Operations

doi: 10.32565/aarms.2024.3.6

Abstract

This paper explores the involvement of hacktivists, cyber volunteers and proxy groups in military cyber operations, with a particular focus on their roles in the ongoing Russian–Ukrainian war. The research aims to analyse the participation of these non-state actors, their legal implications, and how their involvement could influence the strategic, operational and tactical practices of small and medium-sized NATO member states, such as Hungary. Drawing from case studies, literature review and in-depth interviews with Hungarian military intelligence and public administration leaders, the paper formulates two hypotheses: 1. Hacktivist groups, unless integrated into a state’s cyber strategy, hinder tactical objectives and raise significant international legal concerns; and 2. Such groups pose a strategic threat to small NATO countries, including Hungary. The findings emphasise the necessity for NATO states to consider how to engage and regulate cyber volunteers effectively, while minimising the risks posed by hacktivist and proxy groups. Additionally, the research underscores the lack of a unified legal framework governing the use of these non-state actors, which complicates their regulation and control in cyberspace conflicts. The paper concludes with recommendations for how NATO states can leverage the openness of civilians to participate in cyber defence while maintaining legal and operational oversight, supporting the involvement of various cyber groups within the framework of international law.

Keywords:

Proxy Groups Hacktivists Cyber Volunteers Cyber Warfare

How to Cite

Krasznay, C. (2025) “Hacktivists, Proxy Groups, Cyber Volunteers: The Future of Non-State Actors’ Involvement in Military Cyber Operations”, AARMS – Academic and Applied Research in Military and Public Management Science. Budapest, 23(3), pp. 107–124. doi: 10.32565/aarms.2024.3.6.

References

ASHDOWN, Neil (2024): Unity or Coherence: Shaping Future Civil–Military Intelligence Collaboration in the Cyber Domain. In KWAN, Claire – LINDSTRÖM, Lauri – GIOVANELLI, Davide – PODIŅŠ, Kārlis – ŠTRUCL, Damjan (eds.): CyCon 2024: Over the Horizon. 16th International Conference on Cyber Conflict. Tallinn: NATO CCDCoE, 311–325. Online: https://doi.org/10.23919/CyCon62501.2024.10685631

ANTONIUK, Daryna (2023): What’s in a NoName? Researchers See a Lone-wolf DDoS Group. The Record, 4 September 2023. Online: https://therecord.media/noname-hacking-group-targets-ukraine-and-allies

BREWSTER, Thomas (2022): An ‘Unhappy American’ in the Russia–Ukraine Information War Promises a Huge Leak of Data Stolen from the Kremlin’s Internet Censor. Forbes, 10 march 2022. Online: https://www.forbes.com/sites/thomasbrewster/2022/03/10/dddosecrets-in-the-russia-ukraine-information-war-promises-a-huge-leak-of-data-stolen-from-the-kremlins-internet-censor/

CHAN, Kristy – KHAW, Joseph (2024): Not All Those Who Wander (Over the Horizon) Are Lost: The Applicability of Existing Paradigms of International Law to Cyberspace and the Interpretation of Customary International Law. In KWAN, Claire – LINDSTRÖM, Lauri – GIOVANELLI, Davide – PODIŅŠ, Kārlis – ŠTRUCL, Damjan (eds.): CyCon 2024: Over the Horizon. 16th International Conference on Cyber Conflict. Tallinn: NATO CCDCoE, 177–190. Online: https://doi.org/10.23919/CyCon62501.2024.10685595

Cyberint Research Team (2023): Behind the Mask of Anonymous Sudan: An Analysis. Online: https://cyberint.com/blog/research/anonymous-sudan-an-analysis/

Cyberknow (2024): CyberTracker Update 26. Russia–Ukraine War. Online: https://cyberknow.substack.com/p/cybertracker-update-26-russia-ukraine

FOWLER, Jeremiah (2022): Is Anonymous Rewriting the Rules of Cyberwarfare? Timeline of Their Attacks against the Russian Government. Online: https://www.websiteplanet.com/blog/anonymous-cyberwarfare-report/

FORNUSEK, Martin (2024): Ministry: Ukrainian Hackers Disrupt Transport Services in Russian Cities. The Kyiv Independent, 13 March 2024. Online: https://kyivindependent.com/ministry-ukrainian-hackers-disrupt-payment-system-in-moscow-subway/

Government of France (2018): Paris Call for Trust and Security in Cyberspace. Online: https://pariscall.international/en/principles

Government of Hungary (2020): Government Resolution 1163/2020 (IV. 21.) on Hungary’s National Security Strategy. Online: https://honvedelem.hu/hirek/government-resolution-1163-2020-21st-april.html

Government of Ireland (2019): National Cyber Security Strategy. Online: https://www.ncsc.gov.ie/pdfs/National_Cyber_Security_Strategy.pdf

Government of Portugal (2019): Estratégia Nacional de Segurança do Ciberespaço 2019–2023. Online: https://files.diariodarepublica.pt/1s/2019/06/10800/0288802895.pdf?lang=EN

GYURÁK, Gábor (2024): A katonai kibertér műveletek lehetséges kapcsolódási pontjai a Pécsi Tudományegyetem kibertérrel kapcsolatos kutatásaihoz. Nemzetközi Katonai Kibertér Műveleti Konferencia, Szentendre, 7 March 2024.

HEALEY, Jason – GRINBERG, Olivia (2022): ‘Patriotic Hacking’ Is No Exception. Online: https://www.lawfaremedia.org/article/patriotic-hacking-no-exception

JORDAN, Tim – TAYLOR, Paul A. (2004): Hacktivism and Cyberwars. Rebels with a Cause? London – New York: Routledge. Online: https://doi.org/10.4324/9780203490037

KARATZOGIANNI, Athina (2015): Firebrand Waves of Digital Activism 1994–2014. The Rise and Spread of Hacktivism and Cyberconflict. London: Palgrave Macmillan. Online: https://doi.org/10.1057/9781137317933

KIM-MCLEOD, Riam (2024): Russia–Ukraine War: Telegram-based Hacktivism in 2023. SecAlliance, 27 February 2024. Online: https://www.secalliance.com/blog/russia-ukraine-war-telegram-based-hacktivism-in-2023

KOVÁCS, László – KRASZNAY, Csaba (2010): A Digital Mohács. A Cyber Attack Scenario against Hungary. Nemzet és Biztonság: Biztonságpolitikai Szemle, 3(Special Issue), 49–59.

KOVAL, Nikolay (2015): Cyber War in Perspective: Russian Aggression against Ukraine. In GEERS, Kenneth (ed.): Cyber War in Perspective: Russian Aggression against Ukraine. Tallinn: NATO CCDCoE, 55–58.

LOWE, Christian (2009): Kremlin Loyalist Says Launched Estonia Cyber-Attack. Reuters, 13 March 2009. Online: https://www.reuters.com/article/us-russia-estonia-cyberspace-idUSTRE52B4D820090313/

OTTIS, Rain (2008): Analysis of the 2007 Cyber Attacks Against Estonia from the Information Warfare Perspective. Tallinn: NATO CCDCoE. Online: https://ccdcoe.org/uploads/2018/10/Ottis2008_AnalysisOf2007FromTheInformationWarfarePerspective.pdf

OTTIS, Rain (2011): A Systematic Approach to Offensive Volunteer Cyber Militia. Tallinn: TUT Press.

ROMAGNA, Marco (2019): Hacktivism: Conceptualization, Techniques, and Historical View. In HOLT, Thomas J. – BOSSLER, Adam M. (eds.): The Palgrave Handbook of International Cybercrime and Cyberdeviance. Cham: Springer, 1–27. Online: https://doi.org/10.1007/978-3-319-90307-1_34-1

RUFFIN, Oxblood (2010): Hacktivism: From Here to There. Threat Post, 9 December 2010. Online: https://threatpost.com/hacktivism-here-there-120910/74759/

Sekoia TDR – Amaury G. – Maxime A. (2024): NoName057(16)’s DDoSia Project: 2024 Updates and Behavioural Shifts. Sekoia, 1 March 2024. Online: https://blog.sekoia.io/noname05716-ddosia-project-2024-updates-and-behavioural-shifts/

SCHMITT, Michael N. ed. (2017): Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations. Cambridge: Cambridge University Press. Online: https://doi.org/10.1017/9781316822524

SCHMITT, Michael N. – VIHUL, Liis (2014): Proxy Wars in Cyber Space: The Evolving International Law of Attribution. Fletcher Security Review, 1(2), 54–73.

SMITH, Margaret W. – DEAN, Thomas (2023): The Irregulars: Third-Party Cyber Actors and Digital Resistance Movements in the Ukraine Conflict. In 2023 15th International Conference on Cyber Conflict: Meeting Reality (CyCon). Tallinn: IEEE, 103–119. Online: https://doi.org/10.23919/CyCon58705.2023.10182061

SOESANTO, Stefan (2022): The IT Army of Ukraine: Structure, Tasking, and Eco-System. CSS Cyberdefense Reports, June 2022. Online: https://doi.org/10.3929/ETHZ-B-000552293

SUN TZU (2006): The Art of War. Minneapolis: Filiquarian Publishing.

THØGERSEN, Marie (2023): Obligations of Non-participating States When Hackers on Their Territory Engage in Armed Conflicts. In 2023 15th International Conference on Cyber Conflict: Meeting Reality (CyCon). Tallinn: IEEE, 39–54. Online: https://doi.org/10.23919/CyCon58705.2023.10182021

TUROVSKY, Daniil (2018): “It’s Our Time to Serve the Motherland” How Russia’s War in Georgia Sparked Moscow’s Modern-day Recruitment of Criminal Hackers. Meduza, 7 August 2018. Online: https://meduza.io/en/feature/2018/08/07/it-s-our-time-to-serve-the-motherland

UCMC (2016): Security Service of Ukraine Possesses Audio Records of Krasnov’s Conversations with his Russian Supervisor. Ukraine Crisis Media Center, 3 March 2016. Online: https://uacrisis.org/en/40837-sbu-3

United Nations General Assembly (2013): Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security. A/68/98. New York: United Nations. Online: https://documents.un.org/doc/undoc/gen/n13/371/66/pdf/n1337166.pdf?token=j2rtp8zdWwLTUkk6bu&fe=true

United States District Court for the District of Alaska (2017): United States Versus Peter Yuryevich Levashov. Online: https://www.justice.gov/opa/press-release/file/956511/dl

U.S. Department of Justice (2018): Russian National Who Operated Kelihos Botnet Pleads Guilty to Fraud, Conspiracy, Computer Crime and Identity Theft Offenses. Office of Public Affairs, 12 September 2018. Online: https://www.justice.gov/opa/pr/russian-national-who-operated-kelihos-botnet-pleads-guilty-fraud-conspiracy-computer-crime

Downloads

Download data is not yet available.