Russian Spy Chief Says SolarWinds Was An Inside Job

The BBC Moscow correspondent, Steve Rosenberg, has had an exclusive interview with Sergei Naryshkin, the head of Russia’s Foreign Intelligence Service (SVR), who has said that his agency was not linked to a massive cyber attack in the US last year. Naryshkin also said that this claim was like a “bad crime novel” in response to the accusations from UK and US governments that Russian intelligence carried out the SolarWinds cyber attack. 

Asked directly if the SVR was responsible for the SolarWinds attack, Naryshkin quipped with a smile that he would be "flattered" if the SVR had been responsible for such a sophisticated attack but that he could not "claim the creative achievements of others as his own".

He said there is no evidence to show or prove who did the SolarWinds attacks, however he said that there is evidence from Edward Snowden, who leaked US intelligence documents that the US was using operations that implanted software into systems to make cyber information gathering and attacks effective.

The United States and Britain cast Russia as a dangerous former superpower, which they say has poisoned enemies with nerve agents and radioactive isotopes, meddled in Western elections and carried out hacking operations across the worldNaryshkin said all claims that these attacks were controlled or backed by the Russian Intelligence Agency are absurd.

 Mr Naryshkin said that in his opinion it was probable that Western intelligence undertook the SolarWinds cyber attack operation. 

The hack of SolarWinds, which was identified in December 2020, gave access to thousands of companies and government offices that used its products. Microsoft President Brad Smith described the attack as “the largest and most sophisticated attack the world has ever seen."

Britain's GCHQ cyber spying agency said that it was highly likely that SVR was responsible for the SolarWinds attack. Russia’s spy chief  Naryshkin also said that contact has been re-established with the head of Britain's secret intelligence service MI6, and that he hoped to be having a face-to-face meeting soon.

BBC:          Reuters:        Nasdaq:              MSN:

You Might Also Read:

The End Of The American Cyber Empire:

 

« UPDATE: Ransom Attack On Irish Health Service Continues
The Role Of Enterprise Architecture In Cyber Defence »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Booz Allen Hamilton

Booz Allen Hamilton

Booz Allen Hamilton is a management & tech consulting firm. Technology services include cloud computing, cyber security, systems development and integration.

Ethio-CERT

Ethio-CERT

National Cyber Emergency Readiness and Response Team of Ethiopia.

European Cyber Security Organisation (ECSO)

European Cyber Security Organisation (ECSO)

The main objective of ECSO is to support all types of initiatives or projects that aim to develop, promote and encourage European cybersecurity.

Security Brigade

Security Brigade

Security Brigade is an information security firm specializing in Penetration Testing, Vulnerability Assessment, Web-application Security and Source Code Security Audit.

GTB Technologies

GTB Technologies

GTB Technologies is a cyber security company that focuses on providing enterprise class data protection and data loss prevention solutions.

Kroll

Kroll

Kroll provides clients a way to build, protect and maximize value through our differentiated financial and risk advisory and intelligence.

Precise Biometrics

Precise Biometrics

Precise Biometrics develop and sell fingerprint software for convenient and secure authentication of people’s identity in mobile devices, smart cards and other products with fingerprint sensors.

Securicon

Securicon

Securicon provides expert consulting for application, system and network security.

CybernetIQ

CybernetIQ

CLAW by CybernetIQ is the industry's most advanced SOAR platform helping unify all cybersecurity tools under one umbrella and providing organizations faster, better and more accurate cybersecurity.

Crown Sterling

Crown Sterling

Crown Sterling delivers next generation software-based, AI-driven cryptography in the form of random number generators and encryption products.

Sontiq

Sontiq

Sontiq is committed to providing best-in-class, highly scalable, award-winning identity security solutions to consumers, businesses and government agencies.

Otorio

Otorio

OTORIO delivers industrial cybersecurity and digital risk-management solutions and services. We help our customers to keep their revenue-generating operations resilient, efficient, and safe.

Xperience

Xperience

Xperience solves our clients’ toughest challenges by delivering business efficiency through digital transformation solutions across cloud, managed IT, CRM and ERP.

McDonald Hopkins

McDonald Hopkins

McDonald Hopkins is a business advisory and advocacy law firm. We focus on insightful legal solutions that help our clients strategically plan for an increasingly competitive future.

ACI Learning

ACI Learning

ACI Learning - Training tomorrow’s industry leaders with formats for all types of learners in Audit, Cybersecurity, and IT.

Glasstrail

Glasstrail

Glasstrail are single-minded about helping organisations gather intelligence and manage vulnerabilities in their attack surface before adversaries exploit them.