Biden Warns Putin The US Will React To Attacks

Following an Executive Order  in May requiring US Companies to change the ways they report  serious data breaches, President Biden indicated that he and President Vladimir Putin of Russian had  established a more direct means of communication.  

Now, during an hour-long phone call, Biden has told Putin that the US will take "any necessary action" to stop cyber attacks from Russia. 

This phone call between Putin and Biden took place following their face to face meeting in Geneva in June and took place amid an increase in attacks, including a sophisticated supply chain attack that  that disabled hundreds of US companies and spilled over to Europe.  

Speaking to reporters after the phone call, President Biden said "I made it very clear to him that the United States expects when a ransomware operation is coming from his soil, even though it's not sponsored by the state, we expect them to act if we give them enough information to act on who that is... And, secondly, that we have set up a means of communications now, on a regular basis, to be able to communicate to one another when each of us thinks something is happening in another country that affects the home country," he continued. "And so, it (the phone conversation) went well. I’m optimistic."

When asked whether the US could attack the servers used by the hackers, the US President replied "Yes"

Despite readiness from the Russian side to jointly address international online criminal activity, Russian government sources say that  "no requests have been received from the relevant US departments." This is in contradiction to US government sources, which claim that Biden administration had made "multiple, specific requests for action". 

Damaging large scale Ransomware attacks have grown over the last two years and according to the US, many of the worst attackers originate in Russia, often  with the tacit knowledge and approval, from the Russian government security services. 

Mr Biden said that the call with Putin came as part of a new, "more direct means of communication". The new connection, Mr Biden said, allows each side to "communicate to one another when each of us thinks something's happening in the other country.  "It affects the home country. And so it went well. I'm optimistic."

The message Mr Biden said he had delivered recently to Putin was similar to the message that he brought when the two leaders held their first  in Switzerland. Since then, the Russian based REvil hacking group unleashed a massive attack that caused outages across the globe. 

A Kremlin statement released recently indicated that the two leaders discussed "the need for substantive and constructive cooperation" between Russia and the United States on matters relating to cyber security. But the statement also suggested the US had not made any formal appeals to Russia regarding recent cyber-attacks. "In the context of recent reports about a series of cyber-attacks allegedly committed from the territory of Russia, Vladimir Putin noted that, despite the readiness of the Russian side to jointly suppress criminal manifestations in the information space, no appeals on these issues have been made by the competent US agencies over the past month," the statement said.

Reuters:       AlJazeera:     BBC:        CNN:       Tasnim News:      The Times:   

You Might Also Read: 

Russia Wants A Deal With The US On Cyber Security:

 

« The Post-Covid Cyber Security Challenge
The Five Most Common Security Mistakes At Work »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

ON-DEMAND WEBINAR: How to build and implement an effective endpoint detection and response strategy

ON-DEMAND WEBINAR: How to build and implement an effective endpoint detection and response strategy

Discover how you can implement endpoint detection and response (EDR) tools into your security strategy.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Clusit

Clusit

Clusit is the Italian Association for Information Security, a nonprofit organization devoted to promoting every aspect of information security.

Cyber Risk Agency

Cyber Risk Agency

Cyber Risk Agency is a cybersecurity consulting firm specializing in managing cyber risks for SMEs.

Schneider Electric

Schneider Electric

Schneider Electric develops connected technologies and solutions to manage energy and process in ways that are safe, reliable and sustainable.

Redspin

Redspin

Redspin provide penetration testing, security assessments and consulting services.

IDpendant

IDpendant

IDpendant offers a wide range of services, including authentication technology, client security products, single sign on systems, encryption solutions, card and mobile device management systems.

London Office for Rapid Cybersecurity Advancement (LORCA)

London Office for Rapid Cybersecurity Advancement (LORCA)

LORCA's mission is to support the most promising cyber security innovators in growing solutions to meet the most pressing industry challenges and build the UK’s international cyber security profile.

Gulf Computer Services Co (GCSC)

Gulf Computer Services Co (GCSC)

Gulf Computer Services is a major player in the field of networking & Communication solutions for emerging industries such as Internet Services and Information Technology in Saudi Arabia.

IAmI Authentications

IAmI Authentications

IAmI is a first in Tokenization Cloud-based IAM Security Services, delivering the most advanced form of Two-Factor Authentication.

SensorHound

SensorHound

SensorHound’s mission is to improve the security and reliability of the Internet of Things (IoT).

In Fidem

In Fidem

In Fidem specializes in information security management, with a bold approach that views cybersecurity as a springboard to organizational transformation rather than a barrier to innovation.

Noblis

Noblis

Noblis is a dynamic science, technology, and strategy organization dedicated to creating forward-thinking technical and advisory solutions in the public interest.

JaCIRT

JaCIRT

JaCIRT is the national Cyber Incident Response Team for Jamaica, established to deliver on the mandate outlined in the GoJ’s National Cyber Security Strategy.

Open Data Security (ODS)

Open Data Security (ODS)

Open Data Security is a market leader in the information security sector, offering services to companies, governments and individuals, helping them shield from hackers and cyber attacks.

Kyndryl

Kyndryl

Kyndryl has a comprehensive portfolio that leverages hybrid cloud solutions, business resiliency, and network services to help optimize your IT workloads and transformations.

Trustifi

Trustifi

Trustifi leads the market with the easiest to use and deploy email security products, providing both inbound and outbound email security from a single vendor.

Normalyze

Normalyze

Normalyze are solving some of the most painful problems enterprise IT security teams face in the cloud and data security space. We help enterprises protect all the data they run in the cloud.