USA & Europe Undergoing A Wave Of Cyber Attacks

It is now clear that Russia is delivering a wave of cyber attacks against a number of European and numerous US federal agencies and organisations. Many US operations have recently been hacked, among them is the Department of Energy, which manages US nuclear infrastructure and it controls America’s nuclear policy.

The new campaign has not only been directed at the US government - a large numbers of businesses, universities and other organisations have also been affected with their data hacked and help to ransom.

The US Cybersecurity & Infrastructure Security Agency (CISA) has attributed these recent cyber attacks to a Russian ransomware group CLOP, rather than the Russian state, however this is a rather pointless distinction as to whether a Russian government employee, or a hired gun that does the actual hacking. CISA’s response comes as Progress Software, the US firm that makes the software exploited by hackers, said it had discovered a second vulnerability in the code that the company was working to fix.

CLOP, the ransomware gang allegedly responsible, is known to demand multimillion-dollar ransoms, but no ransom demands have been made of federal agencies, according to a senior US official.

Russian intelligence often hires professional cyber criminals to execute high-profile cyber operations, especially those targeting US high-value targets, to ensure that they have plausible deniability. Indeed, Russia currently has some of the most sophisticated and destructive arsenal of cyber weapons of any country.

Russia views cyber as a potent non-kinetic tool capable of disrupting an opponent’s society, by targeting his military, economy, and vital support structures such as hospitals, or even plunging an entire country into darkness, when war is going to happen.

Johns Hopkins University in Baltimore and the university’s renowned health system said in a statement this week that “sensitive personal and financial information,” including health billing records may have been stolen in the hack.

NCSC:    Symantec:     Fox:    CNN:   Trustwave:   JSTOR:    Image: iStock 

You Might Also Read: 

Reshaping The Future Of War With Malware:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Don't Use ChatGPT At Work
Only Half Of Citizens Are Happy With Digital Public Services »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Dome9

Dome9

Dome9 is a cloud firewall management service that stops vulnerabilities, secures remote access, and centralizes policy management.

ThetaRay

ThetaRay

ThetaRay’s solution for Industrial cyber security protects against unknown cyber-attacks that target industry and critical infrastructure.

CERT.LV

CERT.LV

CERT.LV is the national Computer Emergency Response Team for Latvia.

Aeriandi

Aeriandi

Aeriandi is a leading provider of hosted PCI security compliance solutions for call centres, trusted by high street banks and major Telcos.

Stealthcare

Stealthcare

Stealthcare is a full service, global cyber security firm offering solutions that educate, empower and protect.

Hypersecu Information Systems

Hypersecu Information Systems

Hypersecu Information Systems, Inc. is a solution provider dedicated to multi-factor authentication, public key infrastructure and software copyright protection.

H-ON Consulting

H-ON Consulting

H-ON Consulting develops and applies robust cyber security procedures enabling control systems to be secure.

ST Engineering

ST Engineering

ST Engineering is a leading provider of trusted and innovative cybersecurity solutions.

Global Accelerator Network (GAN)

Global Accelerator Network (GAN)

Global Accelerator Network are a highly curated community of independent Accelerators, Partners and Investors.

CITRA - Information Security and Emergency Response

CITRA - Information Security and Emergency Response

CITRA is responsible for overseeing the telecommunications sector, monitoring and protecting the interests of users and service providers, and regulating the services of telecomms networks in Kuwait.

Kontex

Kontex

Kontex is a Cyber Security consultancy creating resilient solutions. From Strategy, Advisory and Implementation to Management and everything in between.

Cornami

Cornami

Cornami delivers real-time computing on encrypted data sets, which is vital for data privacy and cloud security.

Retruster

Retruster

Protect your users against phishing emails, ransomware & fraud with the most advanced, user-friendly, non-intrusive solution available.

Darktrace

Darktrace

Darktrace is a global leader in cybersecurity AI, delivering complete AI-powered solutions in its mission to free the world of cyber disruption.

Amplix

Amplix

In the race to create value for your enterprise, Amplix is your best asset for making technology decisions and optimizing your IT infrastructure, cloud usage, and security posture.

Permiso Security

Permiso Security

Permiso combines industry leading Identity Security Posture Management with Identity Threat Detection and Response, leaving no place to hide for identity threats lurking in your environment.