US Military Hackers At Work Supporting Ukraine

General Paul Nakasone, chief of US Cyber Command (pictured) has announced “We’ve conducted a series of operations across the full spectrum; offensive, defensive, and information operations.” This is the first confirmation that the US is engaged in a digital conflict against Russia in support of the Ukraine government.

“Leading up to and during Russia’s unprovoked and illegal further invasion of Ukraine, the United States is supporting Ukraine’s continued access to the Internet and to enhance Ukraine’s cyber defenses. These efforts, coordinated across the US government,” the US Department of State confirmed.

US Cyber Command directs operations through its components. These include the Cyber National Mission Force-Headquarters, Joint Force Headquarters-DoD Information Network, the commander for which is dual-hatted as the Director of the Defense Information Systems Agency and Joint Task Force Ares.

General Nakasone also explained how separate "hunt forward" operations were allowing the US to search out foreign hackers and identify their tools before they were used against America. 

“We remain vigilant every single day. Every single day. I think about it all the time,” Nakasone told Sky News when asked about the risk of an intrusion. “This is why we’re working with a series of partners to ensure we prevent that, not only against the United States but against our allies as well.”   

Nakasone, who also serves as director of the National Security Agency, did not reveal details of the cyber hacking operations, but did tell the outlet that they were lawful and conducted with civilian oversight. “My job is to provide a series of options to the secretary of defense and the president, and so that’s what I do,” he said. It is unclear when the operations began or how many have occurred since Russia began its assault on Ukraine.

“When Moscow ordered the invasion in late February, we stepped up an already high operational tempo. We have been conducting additional hunt forward operations to identify network vulnerabilities.. “We provided remote analytic support to Ukraine and conducted network defense activities aligned to critical networks from outside Ukraine, directly in support of mission partners. In conjunction with interagency, private sector and Allied partners, we are collaborating to mitigate threats to domestic and overseas systems.” Nakasone, said to Congress in April.

The US government has long warned of Russian cyber attacks against America and its allies. In March, President Biden told US companies to tighten their digital defenses due to “evolving intelligence” that indicated Russia could launch various cyber attacks in retaliation for US sanctions imposed in response to the Ukraine invasion.

The FBI Director Christopher Wray has also warned that potential Russian cyber hacking operations would likely become “more destructive as the war keeps going poorly for them.” “We’ve seen the Russian government taking specific preparatory steps towards potential destructive attacks both here and abroad,” Wray said at a recent event.  He also revealed that the FBI has been on a “combat tempo” with a 24/7 command post to tackle potential Russian hacking threats. 

While there have not been any known Russian cyber attacks against the US since the start of the invasion, Ukraine has come under constant cyber attacks. Most notably, the US has accused Russia of carrying out a cyber attack against the Viasat KA-SAT network, cutting off Internet access for thousands of Ukrainians.

US State Dept:     US Cyber Command:      New York Post:      CNN:      Sky:    The Conversation

You Might Also Read: 

NATO & Ukraine Agree Deeper Cyber Co-operation:

 

« EnemyBot Malware Targets Web Servers
Social Media Platforms Must Protect Women Online »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

InformationWeek

InformationWeek

InformationWeek is the world's most trusted online community for business technology professionals like you.

Institute for National Security and Counterterrorism (INSCT)

Institute for National Security and Counterterrorism (INSCT)

INSCT is a center for the study of national security, international security, and counterterrorism. Research programs include New Frontiers in Science, Cyber, & Technology

Research Institute in Trustworthy Industrial Control Systems (RITICS)

Research Institute in Trustworthy Industrial Control Systems (RITICS)

RITICS is one of three Research Institutes formed as part of the UK National Cyber Security Strategy.

Cyber 2.0

Cyber 2.0

Cyber 2.0 is the only system in the world that blocks all forms of cyber attack within the organization, including new and unfamiliar attack methods.

Zeneth Technology Partners

Zeneth Technology Partners

Zeneth is a consulting firm providing information technology and cybersecurity services to federal and commercial clients.

KOVRR

KOVRR

Kovrr financially quantifies cyber risk on demand. Our technology enables decision makers to seamlessly drive actionable cyber risk management decisions.

Xilinx

Xilinx

Xilinx is the inventor of the FPGA, programmable SoCs, and now, the ACAP. We are building the Adaptable, Intelligent World.

Cyber Security Academy (CSA)

Cyber Security Academy (CSA)

The CSA aims to educate professionals who wish to contribute to strengthening the digital defensibility of states, organisations and individual citizens.

IPification

IPification

IPification is a highly secure, credential-less, network-based authentication solution for frictionless user experience on mobile and IoT devices.

Cyturus Technologies

Cyturus Technologies

Cyturus Technologies delivers cybersecurity business risk quantification services using our proprietary Adaptive Risk Model (ARM).

ByteSnipers

ByteSnipers

ByteSnipers specialize in penetration testings and secure development services. Our focus is on your security.

SynSaber

SynSaber

SynSaber is a data collection, detection, and visibility solution that forms the foundation of industrial cybersecurity.

Kalima Systems

Kalima Systems

Kalima’s mission is to securely collect, transport, store and share Industrial IoT (IIoT) trusted data in real time with devices, services and mobile workers.

Auriga Consulting

Auriga Consulting

Auriga is a center of excellence in Cyber Security, Assurance and Monitoring Services, with a renowned track record of succeeding where others have failed.

r00tz Asylum

r00tz Asylum

r00tz Asylum is a nonprofit dedicated to teaching kids around the world how to love being white-hat hackers.

GoodAccess

GoodAccess

GoodAccess is the cybersecurity platform that gives your business the security benefits of zero trust without the complexities so your users can securely access digital resources anytime, anywhere.