Russia's new cyber laws will fuel additional online crime across the world by threat groups - both state-linked and criminal - operating out of Russia.
That's according to the latest report by cyber intelligence firm IntSights, which analyses the implications of Russia's upcoming internet laws, particularly its 'Sovereign Internet' law, on consumers, businesses, and cyber crime.
The report, entitled "The Dark Side of Russia: How New Internet Laws & Nationalism Fuel Russian Cybercrime", claims that Russia's new internet laws, which will come into effect on 1st November, will make it difficult for companies operating in Russia to protect both their communications and the privacy of their customers.
In April, Russia's State Duma approved the controversial Sovereign Internet bill, which empowers the government to create a Chinese-style standalone internet infrastructure. This could be used to cut the country off from the global internet, while continuing to function internally.
The government will still likely turn a blind eye to threat actors that target foreign entities
Developing such a network will cost around $470 million, according to government estimates, at a time with one-in-ten city dwellers don't even have indoor sanitation.
To enable the Sovereign Internet bill to deliver on its promises, ISPs in the country will be forced to direct all internet traffic through internet exchanges located in Russia, whith will be continuously monitored.
The new law will also affect cyber criminals working in Russia. The underground cyber crime landscape in Russia enjoys the tacit protection of the authorities, who in many cases turn a blind eye to hackers as long as they don't target individuals or organisations in Russia and the CIS.
After the Sovereign Internet law comes into effect, hackers operating within Russia will need to ensure that the services they use to cover their tracks, such as virtual private networks, are either Russian or conform to strict sovereign internet requirements.
"The sovereign internet will make it much easier for Russian law enforcement to crack down on hackers that target Russian entities," explains Andrey Yakovlev in the IntSights' report.
"But the government will still likely turn a blind eye to threat actors that target foreign entities - particularly those operating in enemy states, like the United States."
The policy will make it even easier for the authorities in Russia to apprehend groups that carry out attacks within Russian and the CIS, encouraging more activity against people and organisations outside Russia.
Just earlier this week, Microsoft warned that it a hacking group linked to the Russian state was targeting Internet-of-things devices in a bid to breach secure corporate networks.
Last month, cyber security researchers said they had discovered a new "highly targeted" form of mobile malware, dubbed 'Monokle', with links to Russian cyber criminals.
And a report out this week that focused on China's APT41 indicated that hackers employed by the Chinese state for the purpose of online espionage also have a penchant for conducting cyber crime for their own benefit at night.
More than 2,000 servers in teh UK vulnerable to Citrix remote access security flaw
New TrickBot backdoor is designed for persistence, stealth, and reconnaissance on compromised machines
Warning over LockerGoga and MegaCortex ransomware attacks targeting private industry in western countries
The actors behind the two ransomware were found using stolen login credentials, SQL injections, phishing attacks, and several other techniques to gain entry into a corporate network
Researchers find one-in-172 RSA certificates using a common factor to generate keys
Analysis of Zeppelin's code suggests that it was first compiled last month