USA & Europe Undergoing A Wave Of Cyber Attacks

It is now clear that Russia is delivering a wave of cyber attacks against a number of European and numerous US federal agencies and organisations. Many US operations have recently been hacked, among them is the Department of Energy, which manages US nuclear infrastructure and it controls America’s nuclear policy.

The new campaign has not only been directed at the US government - a large numbers of businesses, universities and other organisations have also been affected with their data hacked and help to ransom.

The US Cybersecurity & Infrastructure Security Agency (CISA) has attributed these recent cyber attacks to a Russian ransomware group CLOP, rather than the Russian state, however this is a rather pointless distinction as to whether a Russian government employee, or a hired gun that does the actual hacking. CISA’s response comes as Progress Software, the US firm that makes the software exploited by hackers, said it had discovered a second vulnerability in the code that the company was working to fix.

CLOP, the ransomware gang allegedly responsible, is known to demand multimillion-dollar ransoms, but no ransom demands have been made of federal agencies, according to a senior US official.

Russian intelligence often hires professional cyber criminals to execute high-profile cyber operations, especially those targeting US high-value targets, to ensure that they have plausible deniability. Indeed, Russia currently has some of the most sophisticated and destructive arsenal of cyber weapons of any country.

Russia views cyber as a potent non-kinetic tool capable of disrupting an opponent’s society, by targeting his military, economy, and vital support structures such as hospitals, or even plunging an entire country into darkness, when war is going to happen.

Johns Hopkins University in Baltimore and the university’s renowned health system said in a statement this week that “sensitive personal and financial information,” including health billing records may have been stolen in the hack.

NCSC:    Symantec:     Fox:    CNN:   Trustwave:   JSTOR:    Image: iStock 

You Might Also Read: 

Reshaping The Future Of War With Malware:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Don't Use ChatGPT At Work
Only Half Of Citizens Are Happy With Digital Public Services »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

FT Cyber Resilience Summit: Europe

FT Cyber Resilience Summit: Europe

27 November 2024 | In-Person & Digital | 22 Bishopsgate, London. Business leaders, Innovators & Experts address evolving cybersecurity risks.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Booz Allen Hamilton

Booz Allen Hamilton

Booz Allen Hamilton is a management & tech consulting firm. Technology services include cloud computing, cyber security, systems development and integration.

Norwegian Center for Information Security (NorSIS)

Norwegian Center for Information Security (NorSIS)

NorSIS) is an independent organization that works to increase knowledge and understanding of information security for businesses and individuals.

Intensity Analytics

Intensity Analytics

Intensity Analytics is a software firm that develops next-generation, physical user and entity behavioral authentication ("physical UEBA") security software technology.

National Cyber Summit (NCS)

National Cyber Summit (NCS)

The National Cyber Summit is the preeminent event for cyber training, education and workforce development aimed at protecting our nation's infrastructure from the ever-evolving cyber threat.

Andreessen Horowitz (a16z)

Andreessen Horowitz (a16z)

Andreessen Horowitz (known as "a16z") is a venture capital firm in Silicon Valley, California that backs bold entrepreneurs building the future through technology.

CyberCX

CyberCX

CyberCX provides services from strategic consulting, security testing and training to world-class managed services and engineering solutions.

Nexor

Nexor

Nexor are a UK-based cyber security company with 30 years' experience in secure information exchange.

High Security Center (HSC)

High Security Center (HSC)

High Security Center provide real-time threat protection. We protect your company from targeted and persistent attacks using technologies such as Machine Learning and Behavioral Analysis.

Sentra

Sentra

Sentra is focused on improving data security practices within the cloud, mitigating the risks of damaging data leaks by providing comprehensive visibility into critical data assets.

ImmuneBytes

ImmuneBytes

ImmuneBytes is a cutting-edge security startup that aims to provide a secure blockchain environment for a dependable and open Web3 ecosystem.

The Security Bulldog

The Security Bulldog

The Security Bulldog distills and assimilates open source cyber intelligence to enable security teams to understand threats more quickly, make better decisions, and accelerate detection and response.

Lodestone

Lodestone

Lodestone partners with clients to help them mitigate business and reputational risk, through our human-based, approach to cyber security, digital forensics and incident response.

Confidencial

Confidencial

Confidencial is a provider of solutions that help organizations secure their most sensitive information, regardless if that information exists inside or is shared outside the organization.

Token

Token

Token is changing the way our customers secure their organizations by providing passwordless, biometric, multifactor authentication.

AppSOC

AppSOC

AppSOC is a leader in Application Security Posture Management (ASPM) and Code-to-Cloud Vulnerability Management.

SafeAeon

SafeAeon

SafeAeon is a leading Cybersecurity-as-a-Service provider, offering 24x7 premium Managed Security Services with AI-powered and Human-driven 24x7 SOC.