Russia - NATO Cyber War Heats Up

natos28membe.jpg

While NATO forces and the Russian military reluctantly operate side-by-side in Syria, adding to the tensions built over Moscow's involvement in the east Ukraine war, a far quieter battle between the two rivals has been unfolding over the Internet. While Russian hackers have long been a problem for the US and some European countries, a recent report from Bloomberg News claims that the cyberattacks have been far more aggressive and in greater number since NATO and Russia recommenced hostilities with each other for the first time since the end of the Cold War.
"They have let loose the hounds," said Tom Kellermann, chief security officer at Trend Micro, a Tokyo-based security firm, to Bloomberg News. "These guys have been untouchable for years and now they are coming back to the stable to pay homage.”

Breaches of the New York Times website, the US House of Representatives, a German steel plant and the Polish stock market are just a few of the attacks that showcase how hackers are targeting NATO members. U.S. officials believe that targeting vital infrastructure, such as airports, power grids, global stock exchanges could lean on Western country's pressure points that may lead to a broader conflict, claimed the Bloomberg News report.

Despite the hackers claiming to be part of a militant organization that is angry over the bombing raids against the Islamic State group in Iraq and Syria, it turns out, according to the Bloomberg report that the hacks were orchestrated by Russian hackers who have with links to the government in Moscow.
"These are absolutely unsubstantiated allegations, which are often absurd," said Dmitry Peskov, a spokesman for the Kremlin, who spoke with Bloomberg. "We also have been the targets of attacks, which again shows that everyone can just as easily be subject to such attacks. International cooperation is required to expose and deal with these threats. But unfortunately, we don’t always see a constructive approach on this issue from our partners."

US government officials characterize the attacks as state sponsored, while also noting that they are designed to test the boundaries of the cyber battlefield. While Russia has requested that the US and Moscow work together on targeting the hackers, which include attacks by Chinese operatives, little work has been done that would suggest the situation is getting better.
"To anyone looking for signs that things are getting a lot worse, there are plenty of them out there," said John Hultquist, head of cyber-espionage threat intelligence at ISight Partners, a Dallas, Texas-based cyber security firm. "Everyone seems a lot less timid about using methods other than just intelligence collection now. They are simply more aggressive and less restrained."
Ein News: http://bit.ly/1PtDLhi

 

« Asking Just 4 Questions Will Stop 90% of Hacks
The Jobs Robots Will Take First… »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Cybsecurity Foundation (CSF)

Cybsecurity Foundation (CSF)

Cybsecurity is a non-profit NGO, which aims to work on improvement of security levels in the Polish cyberspace.

Fieldfisher

Fieldfisher

Fieldfisher's Technology, Outsourcing & Privacy Group has class-leading expertise in privacy, data & cybersecurity, digital media, big data, the cloud, mobile payments and mobile apps.

Lumeta

Lumeta

Lumeta’s cyber situational awareness platform is the unmatched source for enterprise network infrastructure analytics and security monitoring for breach detection.

APWG

APWG

APWG is the international coalition unifying the global response to cybercrime across industry, government, law-enforcement and NGO communities.

HireVergence

HireVergence

HireVergence is a full service IT staffing and recruiting firm with a focus on cyber and information security.

CybSafe

CybSafe

CybSafe is a cloud-based platform focussed on addressing the human component of cyber security - an intelligent approach to awareness training.

Trusted Knight

Trusted Knight

Trusted Knight is a leading provider of security software solutions focused on defeating newly developed malware and crimeware trojans.

BeDefended

BeDefended

BeDefended is an Italian company operating in IT Security and specialized in Cloud and Application Security with years of experience in penetration testing, consulting, training, and research.

Indusface

Indusface

Indusface offers best website security, web application firewall and SSL certificate to keep your online business much safer.

Haechi Audit

Haechi Audit

Haechi Audit is a leading smart contract security audit firm. We provide the most secure smart contract security audit and smart contract development services to our global clients.

Crosspring

Crosspring

Crosspring is an incubator/accelerator for people who have the ambition to start a successful business or want to extend their existing business in the areas of FinTech, AR, VR, Cybersecurity and SaaS

Armo

Armo

Armo technology enhances any Kubernetes deployment with security, visibility, and control from the CI/CD pipeline through production.

Prescott

Prescott

Prescott acts as your guiding light in the preparation for your CMMC assessment and long after by governing your cybersecurity practice.

Astute Technology Management

Astute Technology Management

Astute Technology Management helps businesses take control of their technology and work with greater confidence.

Index Engines

Index Engines

Index Engines is the world’s leading AI-powered analytics engine to detect data corruption due to ransomware.

Digital WarRoom

Digital WarRoom

Digital WarRoom is an eDiscovery company offering cloud-based and on-premise eDiscovery solutions. Request a demo.