President Biden’s Cyber Dilemma

The Biden administration is grappling with two major cyber incidents in its first 50 days in office, underscoring the challenge the new White House faces from foreign actors. Russia and China are suspected in the two incidents, which may have compromised thousands of federal, state and private groups for long periods of time before discovery. The effect has been to move cyber security up the list of the administration’s priorities.

Russia has expressed its alarm after it was reported the United States was planning a series of covert counter-attacks on Russian networks, saying such strikes would amount to cyber crimes.

The US security level is being raised probably because of the recent attacks on the US government systems and these US attacks may also be focused on the Chinese and Russian hackers because of the amount of hacks on Microsoft Exchange is now thought to be tens of thousands of organisations that have probably been cyber attacked and compromised. The hackers have used previously unknown flaws in the email software to steal information and data.  Microsoft has said the attackers are "state-sponsored and operating out of China". And now it looks like other hackers are also attacking these systems.   

The hacking group known as Hafnium breached as many victims they could find across the global Internet, leaving behind backdoors to return to later. This follows the recent SolarWinds cyber hacks, linked to Russia, that affected multiple US government departments and other organisations.

US national security adviser Jake Sullivan wrote on Twitter,“We are closely tracking Microsoft’s emergency patch for previously unknown vulnerabilities in Exchange Server software and reports of potential compromises of US think tanks and defense industrial base entities. We encourage network owners to patch ASAP.” 

One US senator has described the SolarWinds attack as an "act of war", but what options President Biden has is not obvious..

That these cyber attacks by potentially hackers backed by governments is a real problem for the Biden administration and will likley result in US Cybercommand being directed to step up hacking into adversary systems to find out what they are doing and stopping operations against the US before they are unleashed.

The US has often considered espionage as then stealing of information as acceptable, because it practised it extensively, as whistleblower Edward Snowden revealed in 2013 and these attacks and the response may fit into the same category. President Biden is launching an emergency taskforce to address an aggressive cyber-attack that has affected hundreds of thousands of Microsoft customers around the world, the second major hacking campaign to hit the US since the election.

The first major move is expected over the next three weeks, officials said, with a series of clandestine actions across Russian and Chinese networks.  

White House press secretary Jen Psaki warned anyone running the affected Exchange servers to implement Microsoft's patch for the vulnerabilities immediately. "We are concerned that there are a large number of victims and are working with our partners to understand the scope of this... Network owners also need to consider whether they have already been compromised and should immediately take appropriate steps."

The task of cleaning up the hackers' tens of thousands of infections may be, that early detection may give victims a chance to both patch their systems and remove the hackers before they can take advantage of their foothold inside organisations.

The Hill:      New York Times:   Wired:      Guardian:       Yahoo:     Jake Sullivan:       BBC

You Might Also Read: 

Solving Mr. Biden’s Wicked Cyber Problem:

 

« Cyber Security For The Internet of Medical Things
British Schools & Universities Suffer Attacks »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

BackupVault

BackupVault

BackupVault is a leading provider of completely automatic, fully encrypted online, cloud backup.

SolarWinds

SolarWinds

SolarWinds as a worldwide leader in solutions for network and IT service management, application performance, and managed services.

Cloud Distribution

Cloud Distribution

Cloud Distribution is a value-added distributor that specialises in bringing innovative and disruptive cyber security, mobile security, networking and data protection solutions to market.

FAMOC

FAMOC

FAMOC is an enterprise mobile management solution that delivers comprehensive security and management for applications, documents, email, and mobile devices.

Kount

Kount

Kount's “decision engine” platform is ideal for managing fraud in online/telephone channels that process payments and onboard new customers.

Raytheon Technologies

Raytheon Technologies

Raytheon Intelligence & Space delivers solutions that protect every side of cyber for government agencies, businesses and nations.

Avansic

Avansic

Avansic is a leading provider of e-discovery and digital forensics services to attorneys, litigation support teams, and business communities.

National Cybersecurity Hub South Africa

National Cybersecurity Hub South Africa

The mission of the National Cybersecurity Hub is to be the central point of collaboration for cybersecurity incidents in South Africa.

Cybersecurity Innovation Hub

Cybersecurity Innovation Hub

Cybersecurity Innovation Hub is a non-profit network organization focused on cooperation, information sharing, research and implementation of cutting-edge technologies in cybersecurity.

ColorTokens

ColorTokens

ColorTokens Xtended ZeroTrust Platform protects from the inside out with unified visibility, micro-segmentation, zero-trust network access, cloud workload and endpoint protection.

Texas A&M Cybersecurity Center

Texas A&M Cybersecurity Center

Texas A&M Cybersecurity Center is dedicated to combating adversaries who desire to harm our citizens, our government, and our industry through cyber-attacks.

eXate

eXate

eXate provides pioneering technology that empowers organisations to protect, control and manage their sensitive data centrally, providing a complete data privacy solution.

JupiterOne

JupiterOne

JupiterOne is the security product that is changing how organizations manage and secure their software defined assets.

Dhound

Dhound

Dhound is a cybersecurity company providing web application penetration testing.

BluescreenIT (BIT)

BluescreenIT (BIT)

BluescreenIT is an IT Security Consultancy and IT and Cyber Security Training company supporting industry, local authorities, MoD and governmental IT departments.

Appalachia Technologies

Appalachia Technologies

Appalachia is a full service Managed Services Provider with a focus on cybersecurity, backed by the best engineers.

Strac

Strac

Eliminate Personal Data Risks from your business. Our Dataless SaaS removes the need to manage sensitive data across web, mobile apps, servers and communication channels.