Confirmed: US Cyber Attack On Russia In 2018

President Donald Trump has, for the first time, confirmed that  the US conducted a covert cyber-attack in 2018 against Russia's Internet Research Agency (IRA) a so called 'troll farm' blamed by the US for helping to facilitate interference both in the 2016 presidential election and the 2018 midterms.  

Trump gave the confirmation during an interview in the Washington Post when he was  asked he had launched a cyber-attack. Trump replied, "Correct."

US Cyber Command was elevated to the status of a unified command in 2017 and given new authorities to conduct offensive cyber operations in 2018. The cyber-attack appears to have been the first that was designed to frustrate Moscow’s attempts to interfere with a US election.

Russian interference in the 2018 midterm elections was serious and pervasive and President Trump criticised former President Obama for not doing enough to address the interference ahead of the 2016 elections, saying Obama "knew before the election that Russia was playing around.... And the reason he said nothing was that he didn't want to touch it because he thought (Hillary Clinton) was winning because he read phony polls. So, he thought she was going to win. And we had the silent majority that said, 'No, we like Trump.' "

Trump claimed that unlike his predecessor, he acted on intelligence the US had about Russia's election interference by launching the cyber-attack.

However, President Obama did announce sanctions against Russia n December 2016 and expelled some Russian diplomats in retaliation for Russia's interference in the US presidential election. The operation against the Russian organisation, was carried out in order to prevent any interference in the 2018 midterm elections and according to sources, senior US officials also confirmed that the strike occurred and was effective, taking the Internet Research Agency offline.

In the interview, Trump said the cyber-attack was part of a broader policy to confront Russia. When questioned in a separate TV interview as to why he didn't confirm the attack before, Trump said "because they don't like me to talk, intelligence says, 'please don't talk intelligence,' you know sometimes intelligence is good, and sometimes you look at James Comey, and you look at John Brennan and you look at James Clapper, and I'm supposed to believe that intelligence? I never believe that intelligence."

The US intelligence community has concluded that Russian President Vladimir Putin ordered a cyber campaign in 2016 to interfere in the presidential election and it believes the IRA works at the direction of the Kremlin.

CNN  reported in October 2018 that the US military's Cyber Command had begun targeting Russian operatives believed to be attempting to influence the 2018 midterm elections, as part of a broad effort in coordination with several government agencies, an administration official has confirmed. 

CNN:      Washington Post:          New York Post:       Guardian:    

You Might Also Read: 

Russian FSB Hacked: "Largest data breach in its history":

 

« High Profile Twitter Users Hacked
Russian Hackers At Work Stealing Coronavirus Vaccine Data »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

BSI Group

BSI Group

BSI is the business standards company that equips businesses with the necessary solutions to turn standards of best practice into habits of excellence

Juniper Networks

Juniper Networks

Juniper Networks is the industry leader in network innovation. We provide network infrastructure and network security solutions.

IPVanish

IPVanish

IPVanish has its roots in over 15 years of network management, IP services, and content delivery services. Now we're bringing these finely honed skills to VPN.

SI-CERT

SI-CERT

SI-CERT (Slovenian Computer Emergency Response Team) is the national cyber scurity incident response center for Slovenia.

Mobile Guroo

Mobile Guroo

Mobile Guroo is a strategy and systems integrator for Enterprise Mobility Management projects.

Security Audit Systems

Security Audit Systems

Security Audit Systems is a website security specialist providing website security audits and managed web security services.

Yubico

Yubico

Yubico sets new global standards for simple and secure access to computers, mobile devices, servers, and internet accounts.

Haystax Technology

Haystax Technology

Haystax’s security analytics platform applies artificial intelligence techniques to identify and prioritize threats in real time.

Independent Security Evaluators (ISE)

Independent Security Evaluators (ISE)

ISE is an independent security consulting firm headquartered in Baltimore, Maryland dedicated to securing high value assets for global enterprises and performing groundbreaking security research.

Telecommunications & Digital Government Regulatory Authority (TDRA) - UAE

Telecommunications & Digital Government Regulatory Authority (TDRA) - UAE

TDRA focuses on regulating the telecommunications sector and enabling government entities in the field of smart transformation. It is responsible for the overall digital infrastructure in the UAE.

H3Secure

H3Secure

H3 Secure focuses on Secure Data Erasure Solutions, Mobile Device Diagnostics and Information Technology Security Consulting.

oneM2M

oneM2M

oneM2M is a global organization creating a scalable and interoperable standard for communications of devices and services used in M2M applications and the Internet of Things.

Cynexlink

Cynexlink

Cynexlink offers Managed IT Services with Security, Network, Storage & Cloud solutions for all size of business.

Trail of Bits

Trail of Bits

Trail of Bits combine high-end security research with a real-world attacker mentality to reduce risk and fortify code.

Two Six Technologies

Two Six Technologies

Two Six Technologies delivers R&D, innovation, productization and implementation expertise in cyber, data science, mobile, microelectronics and information operations.

Nitrokey

Nitrokey

Nitrokey is the world-leading company in open source security hardware. Nitrokey develops IT security hardware for data encryption, key management and user authentication.