Russia's new cyber laws will fuel additional online crime across the world by threat groups - both state-linked and criminal - operating out of Russia.
That's according to the latest report by cyber intelligence firm IntSights, which analyses the implications of Russia's upcoming internet laws, particularly its 'Sovereign Internet' law, on consumers, businesses, and cyber crime.
The report, entitled "The Dark Side of Russia: How New Internet Laws & Nationalism Fuel Russian Cybercrime", claims that Russia's new internet laws, which will come into effect on 1st November, will make it difficult for companies operating in Russia to protect both their communications and the privacy of their customers.
In April, Russia's State Duma approved the controversial Sovereign Internet bill, which empowers the government to create a Chinese-style standalone internet infrastructure. This could be used to cut the country off from the global internet, while continuing to function internally.
The government will still likely turn a blind eye to threat actors that target foreign entities
Developing such a network will cost around $470 million, according to government estimates, at a time with one-in-ten city dwellers don't even have indoor sanitation.
To enable the Sovereign Internet bill to deliver on its promises, ISPs in the country will be forced to direct all internet traffic through internet exchanges located in Russia, whith will be continuously monitored.
The new law will also affect cyber criminals working in Russia. The underground cyber crime landscape in Russia enjoys the tacit protection of the authorities, who in many cases turn a blind eye to hackers as long as they don't target individuals or organisations in Russia and the CIS.
After the Sovereign Internet law comes into effect, hackers operating within Russia will need to ensure that the services they use to cover their tracks, such as virtual private networks, are either Russian or conform to strict sovereign internet requirements.
"The sovereign internet will make it much easier for Russian law enforcement to crack down on hackers that target Russian entities," explains Andrey Yakovlev in the IntSights' report.
"But the government will still likely turn a blind eye to threat actors that target foreign entities - particularly those operating in enemy states, like the United States."
The policy will make it even easier for the authorities in Russia to apprehend groups that carry out attacks within Russian and the CIS, encouraging more activity against people and organisations outside Russia.
Just earlier this week, Microsoft warned that it a hacking group linked to the Russian state was targeting Internet-of-things devices in a bid to breach secure corporate networks.
Last month, cyber security researchers said they had discovered a new "highly targeted" form of mobile malware, dubbed 'Monokle', with links to Russian cyber criminals.
And a report out this week that focused on China's APT41 indicated that hackers employed by the Chinese state for the purpose of online espionage also have a penchant for conducting cyber crime for their own benefit at night.
The flaw could allow an attacker with a foothold on the local network to instantly become a Domain Admin
Six per cent of Google Cloud buckets are misconfigured and vulnerable to unauthorised access, research reveals
Finding exposed cloud databases on internet is not a difficult job, according to researchers
Post-Covid-19, security is no longer an ‘IT issue’ – it’s a C-suite item and a fundamental strategic priority
Chinese state-sponsored cyber actors are targeting bugs in F5, Citrix, Pulse and Microsoft Exchange Servers, US agencies warn
Organisations need to patch their systems immediately, they advise
The vulnerability could allow an attacker to have access to an organisation's Active Directory domain controllers