<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Tom Johansmeyer, Author at The Loop</title>
	<atom:link href="https://theloop.ecpr.eu/author/t_johansmeyer/feed/" rel="self" type="application/rss+xml" />
	<link></link>
	<description>ECPR&#039;s Political Science Blog</description>
	<lastBuildDate>Wed, 15 Oct 2025 08:59:42 +0000</lastBuildDate>
	<language>en-GB</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://theloop.ecpr.eu/wp-content/uploads/2020/09/cropped-Favicon-32x32.png</url>
	<title>Tom Johansmeyer, Author at The Loop</title>
	<link></link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>NotPetya, Ukraine, and the limits of economic impact from cyber attacks</title>
		<link>https://theloop.ecpr.eu/notpetya-ukraine-and-the-limits-of-economic-impact-from-cyber-attacks/</link>
					<comments>https://theloop.ecpr.eu/notpetya-ukraine-and-the-limits-of-economic-impact-from-cyber-attacks/#respond</comments>
		
		<dc:creator><![CDATA[Tom Johansmeyer]]></dc:creator>
		<pubDate>Mon, 18 Aug 2025 08:18:41 +0000</pubDate>
				<category><![CDATA[All Articles]]></category>
		<category><![CDATA[Featured]]></category>
		<category><![CDATA[Russia]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Ukraine]]></category>
		<category><![CDATA[cyber catastrophe]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[NotPetya]]></category>
		<category><![CDATA[security]]></category>
		<guid isPermaLink="false">https://theloop.ecpr.eu/?p=24079</guid>

					<description><![CDATA[<p>Tom Johansmeyer contends that the damage NotPetya caused in Ukraine is much smaller than many believe. A closer look at the $560 million in harm caused by that infamous cyber attack suggests that cyber attacks may only be of limited effectiveness. This, he argues, changes how cyber sits in the security environment</p>
<p>The post <a href="https://theloop.ecpr.eu/notpetya-ukraine-and-the-limits-of-economic-impact-from-cyber-attacks/">NotPetya, Ukraine, and the limits of economic impact from cyber attacks</a> appeared first on <a href="https://theloop.ecpr.eu">The Loop</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p class="has-medium-font-size"><strong>Tom Johansmeyer</strong> contends that the damage NotPetya caused in Ukraine is much smaller than many believe. A closer look at the $560 million in harm caused by that infamous cyber attack suggests that cyber attacks may only be of limited effectiveness. This, he argues, changes how cyber sits in the security environment</p>



<h2 class="wp-block-heading" id="h-the-notpetya-attack">The NotPetya attack</h2>



<p>The NotPetya cyber attack of 2017 captured headlines and imaginations. <a href="https://www.wired.com/story/notpetya-cyberattack-ukraine-russia-code-crashed-the-world/"><em>Wired</em> called it</a> 'the most destructive and costly cyber-attack in history'. Many have speculated that the damage it caused could have been far worse.</p>



<p>Conducted in 2017 by Russia’s <a href="https://www.vice.com/en/article/us-charged-sandworm-gru-russia-most-destructive-hackers/">GRU</a> – similar to the US Defense Intelligence Agency – NotPetya was a wiper <a href="https://www.csa.gov.sg/resources/publications/a-closer-look-at-wiper-malware">masquerading</a> as ransomware. Victims received a prompt to pay a nominal amount (<a href="https://www.theverge.com/2017/6/27/15881110/petya-notpetya-paying-ransom-email-blocked-ransomware">$300</a>) to regain access to their systems. The true purpose, however, was to destroy data. NotPetya’s intended victim was Ukraine, where it gained a digital foothold in accounting software company <a href="https://www.theregister.com/2017/07/05/ukraine_authorities_raid_me_docs_in_notpetya_investigation">MeDoc</a>. Yet the malware spread quickly, its unintended victims eventually spanning more than <a href="https://www.bbc.co.uk/news/technology-40428967">60 countries</a>, including <a href="https://www.group-ib.com/blog/petya/">Russia</a> itself.</p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p>NotPetya's victims were prompted to pay a nominal fee to regain access – but its true purpose was to destroy their data</p>
</blockquote>



<h2 class="wp-block-heading" id="h-a-cyber-attack-overhyped">A cyber attack overhyped?</h2>



<p>NotPetya remains widely misunderstood; the victim of extensive popular reporting. The event has been hyped, hyperbolised, and ascribed an estimated $10 billion economic impact worldwide, which itself begs for <a href="https://warontherocks.com/2024/04/why-natural-catastrophes-will-always-be-worse-than-cyber-catastrophes/">contextualisation</a>.</p>



<p>Despite NotPetya's perceived magnitude and importance, discussion has tended to stay at a superficial level. Underlying detail has been probed only periodically. Even then, the focus has tended to stay on large economic impacts sustained by <a href="http://chrome-extension://efaidnbmnnnibpcajpcglclefindmkaj/https://www.verisk.com/4a25ed/siteassets/media/pcs/pcs-cyber-catastrophe-notpetyas-tail.pdf">high-profile companies</a> such as Merck, Maersk, and Fedex/TNT. NotPetya’s loss may have been popularly <a href="https://www.wired.com/story/notpetya-cyberattack-ukraine-russia-code-crashed-the-world/">characterised</a> as cataclysmic, but it was in fact a <a href="https://bindinghook.com/articles-binding-edge/debunking-notpetyas-cyber-catastrophe-myth/">below-average cyber catastrophe</a>. It was also generally ineffective. And while NotPetya's target was Ukraine, most of the damage occurred elsewhere, which leaves a gap in the broader discussion.</p>



<p>The economic effects of the attack on its intended target – Ukraine – could thus benefit from deeper exploration.</p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p>NotPetya has been hyped, hyperbolised, and ascribed an estimated $10 billion economic impact worldwide. Its true impact, however, remains widely misunderstood</p>
</blockquote>



<h3 class="wp-block-heading" id="h-cost-of-notpetya-by-victim">Cost of NotPetya, by victim</h3>



<figure class="wp-block-image size-large"><img fetchpriority="high" decoding="async" width="1024" height="819" src="https://theloop.ecpr.eu/wp-content/uploads/2025/08/NotPetya-1024x819.jpg" alt="Pie chart to show percentage of costs for Merck, Ukraine, FedEx/TNT, Russia, St Gobain, Maersk, Other known victims and Unassigned" class="wp-image-24082" srcset="https://theloop.ecpr.eu/wp-content/uploads/2025/08/NotPetya-1024x819.jpg 1024w, https://theloop.ecpr.eu/wp-content/uploads/2025/08/NotPetya-300x240.jpg 300w, https://theloop.ecpr.eu/wp-content/uploads/2025/08/NotPetya-768x614.jpg 768w, https://theloop.ecpr.eu/wp-content/uploads/2025/08/NotPetya.jpg 1200w" sizes="(max-width: 1024px) 100vw, 1024px" /><figcaption class="wp-element-caption">Source: Author’s calculations using publicly available data</figcaption></figure>



<h2 class="wp-block-heading" id="h-the-cost-to-ukraine">The cost to Ukraine</h2>



<p>Experts believe NotPetya caused up to <a href="https://irregularwarfare.org/articles/cyber-attacks-in-perspective-cutting-through-the-hyperbole/">$560 millio</a>n in economic harm to Ukraine, though that estimate may be on the high side. It takes the upper end of a range of gross domestic product (GDP) impact as a point estimate, which skews our understanding of the utility of offensive cyber operations.</p>



<p>Scholars and researchers have largely accepted 0.5% of GDP as a measure of NotPetya’s impact on Ukraine. This figure featured in the work of <a href="http://chrome-extension://efaidnbmnnnibpcajpcglclefindmkaj/https://www.belfercenter.org/sites/default/files/pantheon_files/files/publication/004-isec_a_00418-Maschmeyer.pdf">Lennart Maschmeyer</a>, which certainly lends the estimate credibility. And as an estimate of the upper end of the economic damage NotPetya caused in Ukraine, it’s effective. As always, though, context is crucial.</p>



<p>Maschmeyer pulls the 0.5% of GDP estimate from a non-profit independent Ukrainian news source: <a href="https://hromadske.ua/posts/naslidki-kiberataki">hromadske</a>. However, the original source of the estimate is difficult to trace. The hromadske piece refers to an Associated Press article that no longer seems to be available. In it, Ukrainian finance minister Oleksandr Danyliuk offers the 'boldest assumption' of NotPetya’s impact at 0.5% of GDP. (Translated via Google Translate, <a href="https://hromadske.ua/posts/naslidki-kiberataki">the original</a> is за його підрахунками загальні збитки в масштабах країни можуть скласти до 0,5% ВВП.) No further information on methodology appears to be available from Maschmeyer, hromadske, or any other sources.</p>



<h2 class="wp-block-heading" id="h-understanding-materiality">Understanding materiality</h2>



<p>NotPetya’s numbers may seem quite large: $560 million in local damage (based on the impact to Ukraine’s GDP) and $10 billion overall. As catastrophe events go, however, this figure is relatively small. A useful measure comes from cyber insurance scholars Martin Eling, Mauro Elvedi, and Greg Falco, who set a <a href="https://www.tandfonline.com/doi/full/10.1080/10920277.2022.2034507">threshold</a> of 0.2-2% of GDP to gauge the significance of economic loss from cyber attacks.</p>



<p>They did not reach this measure easily, because <a href="https://doi.org/10.1017/S1357321725000091/">only two</a> cyber catastrophes since 1998 had caused this much damage. MyDoom in 2004 and SoBig in 2003 led to economic damage exceeding 0.3% of US GDP at the time. It is not possible to isolate the damage by country from cyber attacks occurring more than 20 years ago, and their approach intentionally stresses the model to make a point: 0.2% of GDP is a high bar. NotPetya may have reached it in Ukraine, but not anywhere else.</p>



<p>And in fact, NotPetya may not have reached that threshold even in Ukraine.</p>



<p>According to Danyliuk, 0.5% of GDP was the 'boldest' of assumptions made. With no lower end estimate available, it is of course impossible to determine whether NotPetya may have failed to reach the 0.2% identified by Eling, Elvedi, and Falco. However, if one generously maintains that the event was sufficiently significant that it intuitively must have exceeded 0.2% of Ukraine’s GDP – which itself is a reasonable position – then the economic loss may fall as low as $200 million. Its significance per Eling, Elvedi, and Falco's test is still offset by the fact that the tangible impact was small.</p>



<h2 class="wp-block-heading" id="h-enduring-lesson">Enduring lesson</h2>



<p>Perhaps that’s the enduring lesson of the economic impact of NotPetya in Ukraine. The worst-case estimate – 0.5% of GDP at $560 million – is manageable. There is, it appears, a limit on the economic harm that cyber attacks can effect, particularly in light of <a href="https://theloop.ecpr.eu/recent-cyber-catastrophes-show-an-intensifying-trend-but-they-are-manageable/">past activity</a>. And by probing the economic impact of the <a href="https://www.wired.com/story/notpetya-cyberattack-ukraine-russia-code-crashed-the-world/">go-to example</a> of cyber operations, it becomes possible to see the limits of even the seemingly most menacing of cyber aggression. The limited economic damage caused by NotPetya suggests that the threat of runaway code may not be as concerning as some believe. This leaves room for the more effective integration of offensive cyber operations into security strategy.</p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p>The worst-case estimate of NotPetya's economic impact on Ukraine is 0.5% of GDP, which suggests there is a limit on the economic harm cyber attacks can effect</p>
</blockquote>



<p>It is also important to understand scale and avoid hyperbolisation, and that means understanding as clearly as possible the effects of such events as NotPetya. In doing so, though, we should use those insights productively. Cyber attacks can be disruptive, but their effects are also <a href="http://chrome-extension://efaidnbmnnnibpcajpcglclefindmkaj/https://www.tandfonline.com/doi/pdf/10.1080/01402390.2017.1288107">transitory</a>. This can make them an effective temporary alternative to kinetic engagement.</p>
<p>The post <a href="https://theloop.ecpr.eu/notpetya-ukraine-and-the-limits-of-economic-impact-from-cyber-attacks/">NotPetya, Ukraine, and the limits of economic impact from cyber attacks</a> appeared first on <a href="https://theloop.ecpr.eu">The Loop</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://theloop.ecpr.eu/notpetya-ukraine-and-the-limits-of-economic-impact-from-cyber-attacks/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
