As Russian artillery bombarded Ukraine's infrastructure on Sunday, one of the country's most senior government ministers issued an unusual call to arms.
The world was already supplying Ukraine with anti-tank missiles and military intelligence, but Vice Prime Minister Mykhailo Fedorov, tweeting a link to a public channel on Telegram, also called for hackers and tech specialists to join the "cyber front".
While crowdsourcing cyber operations have been linked to conflicts in the past, the size and public nature of this campaign are largely unprecedented.
"In the past, we've had much smaller rudimentary groups doing this, and they tended to be associated with one of the conflict groups," said Australian strategic analyst Alan Dupont.
"This is a clearly different phenomenon. We haven't seen it before at this level.
"It is fascinating how cleverly and adroitly Ukraine has mobilised these cyber groups and weaponised them against the Russians, who are meant to be the world-leaders in this area."
The war in Europe's east is already seeing an online tit-for-tat and experts are concerned volunteerism could have unpredictable consequences.
Hacker collective Anonymous claimed credit for several cyber attacks, including launching distributed denial of service attacks (DDoS) — in which a website is bombarded with traffic and rendered unreachable — against pro-Kremlin Russian media.
While many Ukrainian citizens were picking up assault rifles and crafting Molotov cocktails in a ground war, volunteers were also joining the fight online.
Since launching at the weekend, one public Telegram channel, the IT ARMY of Ukraine Telegram channel, has grown to more 265,000 subscribers — it is unlikely every account in the group is genuine.
The channel encouraged sympathetic volunteers to target state services and Russian businesses, including energy provider Gazprom and cryptocurrency exchanges connected to Russian banks, with DDoS attacks.
The IT ARMY of Ukraine also asked subscribers to mass report Russian YouTube channels "that openly lie about the war in Ukraine" for terms of service violations.
The ABC has been unable to attribute all cyber incidents to specific Ukrainian supporters.
It's not the only example of cyberwarfare crowdsourcing. The Security Service of Ukraine's Telegram posted on Monday it created a chat bot for tips about Russian online vulnerabilities.
Yegor Aushev, co-founder of Kyiv-based tech company Cyber Unit Technologies, said he had also joined the fray.
Multiple media outlets reported the cyber security expert declared on a domestic hacker forum: "Ukrainian cyber community! It's time to get involved in the cyber defence of our country."
He asked for tech specialists to respond to his call with a resume and told the ABC, in written correspondence, many have answered the call — some based outside of Ukraine.
"So far we have around 1000+ hackers, this number is growing and they're just starting their work," he said.
"Presidents of different countries don't want to fight against Russia together with us but people from these countries are ready."
The ABC was unable to independently verify this claim.
On Monday, Mr Yeshov tweeted his company would pay up to $100,000 in cryptocurrency to hackers who could identify bugs in Russian software.
A history of cyber violence
Russian state and patriotic hackers are among some of the most notorious perpetrators of computer intrusions in the world.
They've been blamed for cyberattacks and disinformation campaigns across Europe and Asia and were identified as the actors behind hacked emails belonging to the Democratic National Committee (DNC) ahead of the US Presidential Elections in 2016.
Ukraine is no stranger to being the target of digital subterfuge.
The country's power grid was hacked in 2015 and 2016. A year later, a powerful malware called NotPetya wreaked havoc on Ukraine's banks, airports and energy firms.
NotPetya was later linked to Russian intelligence by the US, who brought charges against at least four of the malware's developers.
Weeks before Russian tanks rolled into the country, the websites for Ukraine's defence ministry, its army and two state banks were reportedly taken down in an apparent DDoS attack.
A "wiper" malware — which deletes information from computers in targeted networks — was also unleashed on the eastern European nation.
When Russian President Vladimir Putin's troops moved into Ukraine and economic sanctions began ramping up, one of the world's most prolific ransomware gangs, Conti, announced in a blog post it would defend Russia.
"If anybody will decide to organise a cyber attack or any war activities against Russia, we are going to use our all possible resources to strike back at the critical infrastructures of an enemy," the group said.
Conti was last year the number one cyber extortion threat in Australia and New Zealand, according to Australian cyber security company CyberCX.
Cyber security outlets reported on Monday that an enormous cache of internal chats between Conti members had been leaked, in an apparent retaliation to its support for Russia.
The ABC has been unable to verify the authenticity of the leak.
Cyberwar could reach Australia
The digital skirmishes between Ukraine and Russia could impact Australia in two ways, said CyberCX chief security officer Alastair MacGibbon, who previously worked as cyber security advisor to former prime minister Malcolm Turnbull.
"One is the Russian state carrying out a cyber attack against Ukraine where the spill-over spreads laterally and ends up affecting countries like Australia... we saw that in 2017 with the NotPetya malware.
"The other is the risk that Russian nationalists or crime groups, like Conti, increase disruption efforts around the world."
Robert M Lee, founder of US cybersecurity firm Dragos, urged caution to those hoping to participate in crowdsourced cyber activities for Ukraine.
He said offensive cyber activities against targets in Russia were unlikely to change the ground war for Ukraine at this point.
"There is no amount of cyber [activity] that's going to stop a tank," he said.
Mr Lee, who has previously worked for the NSA securing US infrastructure from cyber threats, said attacks by international volunteers against Russian businesses were likely to be "nuisance level".
He said Russians were willing to go outside their borders to defend their interests and warned such nuisance attacks were "inherently escalatory".
Mr Lee says Ukraine is in a "very hard position", acknowledging it is "very easy to critique when you're not getting shot at".
Concerns of pro-Kremlin retaliation haven't diminished Ukrainian desire to undermine President Putin.
Mr Aushev said he was coordinating volunteers in both defensive and offensive operations.
"[We tell them to] hack the same infrastructures in Russia as [Russia] destroyed in Ukraine," he said.
"If they bombed energy sector of Ukraine — it means everyone has moral rights to hack energy sector of Russia."
The greatest work of his volunteer army may not be felt for some time, he said.
"To prepare big attacks, it takes time. According to statistics, around one to three months," he said.
"So I guess Russia will suffer from such attacks soon."