Russian Spy Chief Says SolarWinds Was An Inside Job

The BBC Moscow correspondent, Steve Rosenberg, has had an exclusive interview with Sergei Naryshkin, the head of Russia’s Foreign Intelligence Service (SVR), who has said that his agency was not linked to a massive cyber attack in the US last year. Naryshkin also said that this claim was like a “bad crime novel” in response to the accusations from UK and US governments that Russian intelligence carried out the SolarWinds cyber attack. 

Asked directly if the SVR was responsible for the SolarWinds attack, Naryshkin quipped with a smile that he would be "flattered" if the SVR had been responsible for such a sophisticated attack but that he could not "claim the creative achievements of others as his own".

He said there is no evidence to show or prove who did the SolarWinds attacks, however he said that there is evidence from Edward Snowden, who leaked US intelligence documents that the US was using operations that implanted software into systems to make cyber information gathering and attacks effective.

The United States and Britain cast Russia as a dangerous former superpower, which they say has poisoned enemies with nerve agents and radioactive isotopes, meddled in Western elections and carried out hacking operations across the worldNaryshkin said all claims that these attacks were controlled or backed by the Russian Intelligence Agency are absurd.

 Mr Naryshkin said that in his opinion it was probable that Western intelligence undertook the SolarWinds cyber attack operation. 

The hack of SolarWinds, which was identified in December 2020, gave access to thousands of companies and government offices that used its products. Microsoft President Brad Smith described the attack as “the largest and most sophisticated attack the world has ever seen."

Britain's GCHQ cyber spying agency said that it was highly likely that SVR was responsible for the SolarWinds attack. Russia’s spy chief  Naryshkin also said that contact has been re-established with the head of Britain's secret intelligence service MI6, and that he hoped to be having a face-to-face meeting soon.

BBC:          Reuters:        Nasdaq:              MSN:

You Might Also Read:

The End Of The American Cyber Empire:

 

« UPDATE: Ransom Attack On Irish Health Service Continues
The Role Of Enterprise Architecture In Cyber Defence »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Mielabelo

Mielabelo

Belgian consulting firm providing services in the security and compliance of information systems and IT service management.

Wall Street Technology Association (WSTA)

Wall Street Technology Association (WSTA)

The Wall Street Technology Association (WSTA) provides financial industry technology professionals with forums to learn from and connect with each other.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Seclab

Seclab

Seclab is an innovative player in the protection of industrial systems and critical infrastructure against sophisticated cyber attacks.

TruSTAR Technology

TruSTAR Technology

TruSTAR is a threat intelligence exchange platform built to protect and incentivize information sharing.

VU Security

VU Security

VU is a specialist in Cybersecurity software development with a focus on the prevention of fraud and identity theft.

macmon secure

macmon secure

macmon secure develops network security software, focussing on Network Access Control.

Ritz

Ritz

Ritz is the largest holistic pure-play cyber security solutions provider in Myanmar.

Standards Council of Canada (SCC)

Standards Council of Canada (SCC)

SCC leads and facilitates the development and use of national and international standards and accreditation services in Canada.

AXELOS

AXELOS

AXELOS develops best practice frameworks and methodologies used globally by professionals working primarily in IT management and cyber resilience.

Vigilant Technology Solutions

Vigilant Technology Solutions

Vigilant is a global cyber security technology company offering solutions to manage entire IT & cyber security lifecycles.

Etonwood

Etonwood

Etonwood specialises in infrastructure and vendor technology recruitment in areas including cloud platforms, cyber security and service management.

Kainos

Kainos

Kainos is a leading provider of Digital Services and Platforms. Our services include Digital Transformation, Cyber Security, Cloud, AI, IoT and more.

Jit

Jit

Jit empowers developers to own security for the product they are building from day zero.

DataStealth

DataStealth

DataStealth is a data protection platform that allows organizations to discover, classify, and protect their most sensitive data and documents.

Information Security Society of Africa – Nigeria (ISSAN)

Information Security Society of Africa – Nigeria (ISSAN)

The Information Security Society of Africa – Nigeria (ISSAN) is a not-for-profit organization dedicated to the protection of Nigeria’s cyberspace.