US Moves Cyber Defences To High Alert

As the war escalates between Russia and Ukraine, the US Department of Homeland Security (DHS) has published a warning to businesses to be on high alert for Russian cyber attacks and so has the UK’s National Cyber Security Centre (NCSC). 

Russian-directed cyber attacks against the US are now being considered an imminent possibility by the US government. 

US cyber security officials are urging federal agencies and large organisations to remain vigilant against the threat of Russian cyber attacks amid the country’s ongoing invasion of Ukraine. 

The DHS has been designated as the lead federal agency managing the domestic response to the Russia-Ukraine crisis in the wake of warnings about potential cyber attacks on the US and ongoing disinformation campaigns. Over twenty senators from both parties want to know more about how the DHS and its component agencies are proactively working to harden the digital defences of the federal government and critical infrastructure.

The White House Press Secretary Jen Psaki recently said the US was prepared to respond to any cyberattack launched against critical infrastructure or companies. “In terms of the financial impact, as I said, these are the most impactful and significant sanctions the US has ever taken.  But financial sanctions are just one part of our response... We’re also unveiling today an expansive and unprecedented set of export restrictions developed in historically close coordination with the European Union, Australia, Japan, Canada, New Zealand, the United Kingdom, and Taiwan. 

The new measures include sweeping restrictions on Russian military end users to limit Putin’s military capabilities and to deny exports to Russia of sensitive modern technology, primarily in the defence, aerospace and maritime sectors. 

“In total, the United States and our partners will effectively be cutting off more than half of all high-tech imports going into Russia.  This includes curbing Russia’s access to advance semiconductors and other foundational technologies that Russia needs to diversify and modernise its economy.,” Psaki said recently.

In a letter to Secretary of Homeland Security Alejandro Mayorkas, US senators have requested a briefing about what DHS is doing to protect agencies,  businesses and core services like electricity and Internet that Americans rely on. “Given Russia’s history of disruptive cyber and disinformation activities, we are concerned that the United States may be targeted in retaliation for actions taken to impose costs on Russia for its unprovoked invasion of Ukraine,” the senators wrote.  

The department of the DHS agency most responsible for this task, the Cybersecurity and Infrastructure Security Agency (CISA), has been warning the public for months while putting out actionable guidance for hardening systems and meeting with companies from vulnerable critical infrastructure sectors to coordinate further defenses. 

While the agency has announced caution and is monitoring the different malware that have been used in Ukraine, CISA Director Jen Easterly and others have also emphasised that there is no credible intelligence about an impending hacking campaign right now.

  • US Senators want to know what strategy is in place if US critical infrastructure is targeted by Russian hackers and how the agency is prioritising the most at-risk organisations or sectors for technical support. 
  • They also want to know what advice is being sent out throughout the US, particularly for smaller businesses that may lack dedicated IT or cyber security executives and who aren’t part of the Joint Cyber Defense Collaborative, CISA’s department for engaging with the private sector.
  • While CISA and DHS are focused on internal US defenses, the senators also want an update on what is being done to coordinate with NATO allies and Ukraine.

While social media companies have become under significant pressure to get to grips with coordinated state disinformation campaigns on their platforms, US lawmakers want to know how the invasion of Ukraine may have altered or augmented Russia’s disinformation strategy and how DHS is responding.  

The White House:     DHS:      CNN:    Washington Post:    Time:   The Hill:    SC Magazine

You Might Also Read:

Cyber Attacks May Lead To A “shooting war”:
 

« Two Thirds Of Organisations Are Not Equipped To Deal With Cyber Threats
Only A Few Employees Cause The Majority Of Breaches »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Perkins Coie LLP

Perkins Coie LLP

Perkins Coie LLP is an internationalk law firm with offices across the USA and Asia. Practice areas include Privacy and Data Security.

Code42

Code42

Code42 CrashPlan, is an enterprise SaaS solution that backs up all distributed end-user data on a single, secure platform.

CERT.BY

CERT.BY

The National Computer Emergency Response Team of the Republic of Belarus.

Siepel

Siepel

Siepel manufactures high quality shielded rooms and anechoic chambers dedicated to TEMPEST, NEMP & HIRF.

Dragos

Dragos

Dragos has built the first industrial cybersecurity ecosystem, the ultimate security defense.

SGBox

SGBox

SGBox is a highly flexible and scalable solution for IT security. Choose the modules which your company needs and implement it without any modification to your network infrastructure.

ReFirm Labs

ReFirm Labs

ReFirm Labs provides the tools you need for firmware security, vetting, analysis and continuous IoT security monitoring.

Tines

Tines

The Tines security automation platform helps security teams automate manual tasks, making them more effective and efficient.

ZecOps

ZecOps

ZecOps is a cybersecurity automation company offering solutions for servers, endpoints, mobile devices, and custom devices.

ScorpionShield

ScorpionShield

ScorpionShield CyberSecurity is an EC-Council Accredited Training Center, and an On-Demand Service for Cybersecurity professionals.

UST

UST

UST is a global provider of digital technology and transformation, IT services and solutions including managed security services.

Data#3 Limited (DTL)

Data#3 Limited (DTL)

Data#3 Limited (DTL) is a leading Australian IT services and solutions provider.

DH2i

DH2i

DH2i is a leading provider of multi-platform Software Defined Perimeter and Smart Availability software enabling customers to create an entire IT infrastructure that is always-secure and always-on.

Lakera

Lakera

Lakera empowers developers and organizations to build GenAI applications without worrying about AI security risks.

DynTek

DynTek

DynTek delivers exceptional, cost-effective professional IT consulting services, end-to-end IT solutions and managed IT services.

ABPSecurite

ABPSecurite

ABPSecurite is a leading value-added distributor and a network performance solutions provider.