Britain Plots Cyber Revenge On Russia For Novichok Poisonings

The head of the UK’s intelligence agency has warned that Britain and its allies will take revenge on Vladimir Putin’s regime for the Novichok attack in Salisbury in May, after Theresa May announced on Wednesday that Russian spies were believed to be behind the attack.

Speaking on September 7th, GCHQ director Jeremy Fleming (pictured) described the threat from Russia as “real” and “active”, vowing to “deploy the full range of tools” against the Kremlin.

Mr Fleming said: "We have ascertained exactly who was responsible and the methods they used.

"As you would expect, teams from across GCHQ have worked tirelessly with partners at home and abroad to ensure that our world-class intelligence has informed that investigation.

"Yesterday two GRU operatives were named and arrest warrants issued.

"The threat from Russia is real. It's active. "And it will be countered by a strong international partnership of allies. Able to deploy the full range of tools from across our national security apparatus. And ready to reject the Kremlin's brazen determination to undermine the international rules-based order."

It comes after Mrs May received the backing of US president Donald Trump, German chancellor Angela Merkel, French president Emmanuel Macron and Canadian prime minister Justin Trudeau. The leaders issued a joint statement with Mrs May, agreeing with the UK’s position.

The statement said: "We have full confidence in the British assessment that the two suspects were officers from the Russian military intelligence service, also known as the GRU, and that this operation was almost certainly approved at a senior government level.”

Prime Minisyer Threresa Mrs May has revealed that the UK suspects Alexander Petrov and Ruslan Boshirov, members of Russia’s GRU military intelligence service, to be responsible for the attack on Sergei and Julia Skripal. The pair became critically unwell in Salisbury city centre on March 4.

The poison was smeared on Mr Skripal’s front door that day by the two Russian spies who travelled to the UK to carry out the deadly mission, according to detectives.

Four months later in July Dawn Sturgess and Charlie Rowley fell ill after coming into contact with the same nerve agent at Mr Rowley’s home in Amesbury. Ms Sturgess later died in hospital. But Russia has strongly denied any involvement in the deeply shocking incident. The country’s UN representative accused the UK of stoking “disgusting anti-Russian hysteria”.

He said to the UN security council: "I'm not going to go through the list of this whole unfounded and mendacious cocktail of facts.

"London needs this story for just one purpose - to unleash a disgusting anti-Russian hysteria and to involve other countries in this hysteria."

Express:       GCHQ:    Image: GCHQ

You Might Also Read: 

Former UK Spy Boss Say Russia Is 'live testing' Cyber-Attacks:

Cyber Threat Warnings ‘Blinking Red’:

 

« The 'Deep Web' May Be x 500 Bigger Than The ‘Normal Web’
Will Russian Hackers Affect this Year's US Election? »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

ON-DEMAND WEBINAR: Learn how SOAR helps you streamline security

ON-DEMAND WEBINAR: Learn how SOAR helps you streamline security

Watch this webinar to explore the Security orchestration, automation, and response (SOAR) paradigm, its relationship with organization IT practices, and its role in your security strategy.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

SC Media

SC Media

SC Media arms information security professionals with the in-depth, unbiased business and technical information they need to tackle the countless security challenges they face.

Mimecast

Mimecast

Mimecast delivers cloud-based email management for Microsoft Exchange and Microsoft Office 365 including archiving, continuity and security.

Veeam

Veeam

Veeam is the leader in intelligent data management for the Hyper-Available Enterprise.

Auxilium Cyber Security

Auxilium Cyber Security

Auxilium Cyber Security is independent information security consultancy company.

California Cybersecurity Institute (CCI) - Cal poly

California Cybersecurity Institute (CCI) - Cal poly

The CCI provides a hands-on research and learning environment to explore new cyber technologies and train and test tactics alongside law enforcement and cyberforensics experts.

Georgia Cyber Center

Georgia Cyber Center

Georgia Cyber Center is dedicated to training the next generation of professionals through education and real-world practice while also supporting innovation in new technologies for online defenses.

Styra

Styra

Styra allows companies to secure cloud environments and applications, including those built on the popular Kubernetes open-source cloud platform.

AUTOCRYPT

AUTOCRYPT

AUTOCRYPT is a mobility security provider dedicated to the safety of future transportation

Carve Systems

Carve Systems

Carve Systems was founded to bring enterprise level information security, training, and risk management services to organizations of any size and industry.

TAV Technologies

TAV Technologies

TAV Technologies is a provider of technology services to the aviation industry in areas including airport infrastructure systems, digital transformation and cybersecurity.

Futurae Technologies

Futurae Technologies

Futurae - enabling trust and invisible security for your users on all devices and applications. Strong customer authentication (SCA) made easy.

SpecTrust

SpecTrust

SpecTrust provides an all-in-one defense solution for identity abuse & fraud, enabling your company's talent to stay focused on the core business.

TwoThreeFour

TwoThreeFour

ThreeTwoFour provide tailored cyber security solutions, delivered by highly-skilled, experienced consultants who respond to the real needs of you and your business.

OSI Security

OSI Security

OSI Security's primary services include penetration testing, security auditing, web application security testing and risk management.

VP Techno Labs®

VP Techno Labs®

VP Techno Labs is specialized in all types of application penetration testing, business disaster recovery planning & data recovery, malware removal, incident response, fraud detection & prevention.

Ethiopian Cybersecurity Association (ECySA)

Ethiopian Cybersecurity Association (ECySA)

ECySA was formed to play an influential part in the ongoing and dawning cybersecurity practices of Ethiopia, efficiently creating public and private awareness on all kinds of cyber risks and threats.