Security

RuNet – Russia successfully concluded tests on its Internet infrastructure

Russia successfully disconnected from the internet

Russia’s government announced that it has successfully concluded a series of tests for its RuNet intranet aimed at country disconnection from the Internet.

The Russian Government has announced on Monday that it has successfully concluded the test on its RuNet intranet and the complete disconnection of the country from the Internet.

“The results of the exercises showed that, in general, both authorities and telecom operators are ready to effectively respond to emerging risks and threats, to ensure the stable functioning of both the Internet and the unified telecommunication network in the Russian Federation,” said the deputy head of the Ministry of Communications Alexey Sokolov.

The exercises aimed at testing and ensuring the integrity and the security of Russia’s Internet infrastructure, so-called RuNet.

The tests were conducted over the past two weeks, the simulation saw the involvement of the country agencies and Internet Service Providers.

The tests were carried out over multiple days, starting last week, and involved Russian government agencies, local internet service providers, and local Russian internet companies.

“The Russian Communications Ministry said on December 23 that the drills were aimed at ensuring the “integrity” of the Internet.” reads a post published by RadioLiberty.

“The purpose of the task is to ensure the reliable operation of the Internet in Russia in any conditions and under any circumstances,” said Aleksei Sokolov, deputy communications minister, in televised remarks on December 23 from the Monitoring and Cyber Threat Response Center.”

The Russian experts tested the RuNet in a scenario that sees it disconnected from the Internet where the Internet traffic was re-routed internally.

The Russian authorities did not reveal the type of tests conducted on its infrastructure, it is only known that the experts also simulated a cyber attack from a foreign state-actor that forced the country from disconnecting from the Internet.

“According to Sokolov, several scenarios were worked out during the exercises. One of them is checking the integrity and security of the Internet as a result of external negative influences.” reported the Tass press agency. “Another was related to the security of cellular subscribers, including the protection of their personal data, the ability to intercept traffic, SMS and disclose information about their location.”

The test results will be presented to Russian President Putin next year.

“Also, together with the Ministry of Emergencies, we evaluated the level of interagency coordination during the repair and construction work on communication networks as a result of emergencies and natural disasters,” added Alexei Sokolov.

The news of the tests of the RuNet was reported by the Russian news agency RosBiznesKonsalting (RBK) in early 2019, the tests were planned for April, but they were later delayed.

According to the “The National Digital Economy Program” bill submitted to Parliament in 2018, Russian Internet service providers (ISPs) should ensure operations even if nation-state actors carry out cyber attacks to isolate Russia from the Internet. The authorities want to ensure that the access to Russian Internet resources will be maintained also under attack, to do this, Russian experts are thinking a sort of DNS managed by Moscow.

Currently, among the 12 organizations that oversee DNS base servers worldwide there isn’t an entity in Russia.

ISPs should be able to route traffic through nodes under the control of the Russian Government to allow the connections between Russians entities.

Of course, the concentration of the traffic through nodes controlled by Moscow could open the door to a massive surveillance

[adrotate banner=”9″] [adrotate banner=”12″]

Pierluigi Paganini

(SecurityAffairs – RuNey, Russia)

[adrotate banner=”5″]

[adrotate banner=”13″]

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

Fintech firm Figure disclosed data breach after employee phishing attack

Fintech firm Figure confirmed a data breach after hackers used social engineering to trick an…

18 hours ago

U.S. CISA adds a flaw in BeyondTrust RS and PRA to its Known Exploited Vulnerabilities catalog

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds a flaw in BeyondTrust RS and…

19 hours ago

Suspected Russian hackers deploy CANFAIL malware against Ukraine

A new alleged Russia-linked APT group targeted Ukrainian defense, government, and energy groups, with CANFAIL…

24 hours ago

New threat actor UAT-9921 deploys VoidLink against enterprise sectors

A new threat actor, UAT-9921, uses the modular VoidLink framework to target technology and financial…

2 days ago

Attackers exploit BeyondTrust CVE-2026-1731 within hours of PoC release

Attackers quickly targeted BeyondTrust flaw CVE-2026-1731 after a PoC was released, enabling unauthenticated remote code…

2 days ago

Google: state-backed hackers exploit Gemini AI for cyber recon and attacks

Google says nation-state actors used Gemini AI for reconnaissance and attack support in cyber operations.…

2 days ago

This website uses cookies.