Wikileaks Alerted Hackers To CyberCom

An internal assessment at US Cyber Command has concluded that diplomatic cables published by Wikileaks probably revealed details that resulted in operational security changes by foreign, state-aligned hacking groups targeting the United States.

In 2010, Wikileaks began publishing hundreds of thousands of diplomatic cables between the State Department and 274 of its consulates, embassies and diplomatic missions stationed around the globe.The documents provided an unvarnished look at internal conversations between diplomats abroad and policymakers in Washington DC.

The Situational Awareness Report which was obtained through a Freedom of Information Act request by the National Security Archives at George Washington University, was drafted in early December 2010 by Fusion Cell, an intelligence arm of US. CyberCom just days after the cables began to leak. It determined that the release would likely provide foreign intelligence services and their hacking arms with "lessons learned" about how their activities were being tracked by the US government.

"The release of the latest set of classified data will likely result in observable changes in [operational security] procedures, coordination and collaboration among Computer Network Operations organizations, Tactics, Techniques and Procedures and overall sophistication levels [redacted]" the report stated.

Though it is significantly redacted, the CyberCom report detailed how the National Security Agency and other agencies rushed to identify documents contained in the dump that "may disclose cyber operations equities" and urged other organisations to do the same.

It provided a number of categories of information that were "likely exposed" by the leak, all of which are redacted in the version released to the public.

"The redacted cables clearly state that US Government entities have knowledge of specific adversary tactics, techniques and procedures, including malware, toolsets, IP addresses and domains used in intrusion activity," the report stated.

The document suggested that the release of the cables "led to a period in which the US government was hindered in its ability to track the activities of at least one of the most sophisticated APTs operating on the geopolitical stage," wrote Michael Martelle, a research fellow at the National Security Archive's Cyber Vault Project.

WikiLeaks:      WikiLeaks:       NSA Archive:       FWC:        

You Might Also Read: 

Wikileaks Release Details Of Mass Surveillance In Russia:

The Image Of Julian Assange Grows Darker:

 

 

 

« Cloud Has Become A Business Essential
Container Shipping Gets A Cyber Security Mandate »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

FT Cyber Resilience Summit: Europe

FT Cyber Resilience Summit: Europe

27 November 2024 | In-Person & Digital | 22 Bishopsgate, London. Business leaders, Innovators & Experts address evolving cybersecurity risks.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Genie Networks

Genie Networks

Genie Networks is a leading technology company providing networking and security solutions for optimizing the performance of large networks.

NESEC

NESEC

NESEC is a specialist in information security consulting services and solutions.

VisionWare

VisionWare

VisionWare provide consulting services and solutions in areas covering both physical and digital security.

Decision Group

Decision Group

Decision Group are a Total Solution Supplier offering Network Forensics and Lawful Interception tools.

Atempo

Atempo

Atempo is a leading independent European-based software vendor with a global presence. We provide solutions to protect, store, move and recover all your data.

Havelsan

Havelsan

HAVELSAN is a leading technology company in Turkey developing indigenous systems for domestic and foreign military, public and private sector clients.

bluedog Security Monitoring

bluedog Security Monitoring

Sentinel from bluedog provides powerful and affordable internal network monitoring.

LiveAction

LiveAction

LiveAction provides end-to-end visibility of network and application performance from a single pane of glass.

QuSecure

QuSecure

QuSecure provides a software-driven security architecture that overlays your current infrastructure and provides next-generation security to protect your entire network from quantum threats.

PCS Security (PCSS)

PCS Security (PCSS)

PCS Security provides secure, reliable and state-of-the-art security solutions to help our customers address their security concerns.

Fibernet

Fibernet

Fibernet's innovative solutions in the fields of cybersecurity and fiber optics range from telecommunications infrastructure to small business cybersecurity.

Vertex Cyber Security

Vertex Cyber Security

Vertex provide Cyber Security Services to small to large businesses including Advise, Consulting, Adding Security Partnership, Penetration Testing, ISO 27001-2 and Audits.

Bastion Networks

Bastion Networks

Bastion are a security-focussed managed solution provider and consultancy. We work with advanced cyber security vendors to produce managed security solutions to protect from online threats.

AuditBoard

AuditBoard

AuditBoard is the leading cloud-based platform transforming audit, risk, ESG, and InfoSec management.

Ipseity Security

Ipseity Security

Ipseity Security provide security-centric advisory and consulting services for organizations to secure their perimeter-less digital transformation to meet business and security requirements.

SecuLore

SecuLore

An innovator in public-safety-focused cybersecurity, SecuLore is dedicated to protecting critical infrastructure from cyber attacks.