President Biden’s Cyber Dilemma

The Biden administration is grappling with two major cyber incidents in its first 50 days in office, underscoring the challenge the new White House faces from foreign actors. Russia and China are suspected in the two incidents, which may have compromised thousands of federal, state and private groups for long periods of time before discovery. The effect has been to move cyber security up the list of the administration’s priorities.

Russia has expressed its alarm after it was reported the United States was planning a series of covert counter-attacks on Russian networks, saying such strikes would amount to cyber crimes.

The US security level is being raised probably because of the recent attacks on the US government systems and these US attacks may also be focused on the Chinese and Russian hackers because of the amount of hacks on Microsoft Exchange is now thought to be tens of thousands of organisations that have probably been cyber attacked and compromised. The hackers have used previously unknown flaws in the email software to steal information and data.  Microsoft has said the attackers are "state-sponsored and operating out of China". And now it looks like other hackers are also attacking these systems.   

The hacking group known as Hafnium breached as many victims they could find across the global Internet, leaving behind backdoors to return to later. This follows the recent SolarWinds cyber hacks, linked to Russia, that affected multiple US government departments and other organisations.

US national security adviser Jake Sullivan wrote on Twitter,“We are closely tracking Microsoft’s emergency patch for previously unknown vulnerabilities in Exchange Server software and reports of potential compromises of US think tanks and defense industrial base entities. We encourage network owners to patch ASAP.” 

One US senator has described the SolarWinds attack as an "act of war", but what options President Biden has is not obvious..

That these cyber attacks by potentially hackers backed by governments is a real problem for the Biden administration and will likley result in US Cybercommand being directed to step up hacking into adversary systems to find out what they are doing and stopping operations against the US before they are unleashed.

The US has often considered espionage as then stealing of information as acceptable, because it practised it extensively, as whistleblower Edward Snowden revealed in 2013 and these attacks and the response may fit into the same category. President Biden is launching an emergency taskforce to address an aggressive cyber-attack that has affected hundreds of thousands of Microsoft customers around the world, the second major hacking campaign to hit the US since the election.

The first major move is expected over the next three weeks, officials said, with a series of clandestine actions across Russian and Chinese networks.  

White House press secretary Jen Psaki warned anyone running the affected Exchange servers to implement Microsoft's patch for the vulnerabilities immediately. "We are concerned that there are a large number of victims and are working with our partners to understand the scope of this... Network owners also need to consider whether they have already been compromised and should immediately take appropriate steps."

The task of cleaning up the hackers' tens of thousands of infections may be, that early detection may give victims a chance to both patch their systems and remove the hackers before they can take advantage of their foothold inside organisations.

The Hill:      New York Times:   Wired:      Guardian:       Yahoo:     Jake Sullivan:       BBC

You Might Also Read: 

Solving Mr. Biden’s Wicked Cyber Problem:

 

« Cyber Security For The Internet of Medical Things
British Schools & Universities Suffer Attacks »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Covenco

Covenco

Covenco is a data management and IT infrastructure specialist. Working with customers to transform their IT environments, with data protection and security at the forefront of everything we do.

Prim'X Technologies

Prim'X Technologies

Prim'X Technologies provides information protection solutions to prevent unauthorised access to sensitive data.

Hague Security Delta (HSD)

Hague Security Delta (HSD)

The Hague Security Delta Campus is home of the leading cyber security cluster in Europe with an Innovation Centre, labs and training facilities.

Cradlepoint

Cradlepoint

With Cradlepoint customers leverage the speed and economics of wired and wireless Internet broadband for branch, mobile, and IoT networks while maintaining end-to-end visibility, security and control.

Codified Security

Codified Security

Codified is a testing platform for mobile application software. We make it easier than ever for companies to detect and fix security vulnerabilities and ensure their applications are compliant.

Halon

Halon

Halon is a flexible security and operations platform for in-transit email.

ETSI

ETSI

ETSI is a European Standards Organization dealing with telecommunications, broadcasting and other electronic communications networks and services including cybersecurity.

Drootoo

Drootoo

Drootoo is transforming businesses and making them high performing entities with its unified cloud platform.

Semmle

Semmle

Semmle's code analysis platform helps teams find zero-days and automate variant analysis. Secure your code with continuous security analysis and automated code review.

Eureka Technology Partners

Eureka Technology Partners

Eureka Technology Partners are committed to helping you focus on your business by taking care of your IT infrastructure and data security needs.

Antares NetlogiX

Antares NetlogiX

Antares Netlogix are a leading Austrian service provider for IT security, critical infrastructures and managed security services.

Cyber Defense Networking Solutions (CDNS)

Cyber Defense Networking Solutions (CDNS)

CDNS is a global network infrastructure provider whose platforms are engineered for security, optimized for speed and designed for resiliency.

Cyber Management Alliance

Cyber Management Alliance

Cyber Management Alliance is closing the divide in cyberspace by bringing together the best qualities of thought leadership and operational mastery of cyber security management.

LetsData

LetsData

LetsData uses AI to provide governments, intergovernmental organizations, civil society, and businesses with data-empowered decisions on communication in the age of online disinformation.

DuckDuckGoose

DuckDuckGoose

DuckDuckGoose offer advanced solutions to protect against manipulated videos, images, voices and texts.

Black Cipher Security

Black Cipher Security

Black Cipher is a New Jersey-based cybersecurity and incident response consulting firm.