US Accuses Russia Of Attacking Energy Infrastructure

The US has accused Russia of a wide-ranging cyber-assault on its energy grid and other key parts of its infrastructure, as it stepped up sanctions on Russian intelligence for its interference in the 2016 elections.

US officials said that malware had been found in the operating systems of several organisations and companies in the US energy, nuclear, water and “critical manufacturing” sector, and the malware as well as other form of cyber-attacks had been traced back to Moscow.

“Russia’s behaviour continues to trouble us and we are continuing to push back in meaningful ways,” a senior national security official said.

The FBI and the Department of Homeland Security (DHS) issued an alert, urging other firms in the industry to review their cybersecurity. The alert said the concerted cyber-attack on US infrastructure began in March 2016.

“It is the judgment of the DHS than Russian government cyber-hackers were behind the hacking of organisations in the energy sector,” a senior official said, adding that it was clear that the cyber-attack was coordinated and “deliberately targeted”.

Officials added that the motive of the attack was initially surveillance, to gather information on computer management systems in the US energy grid.

The cybersecurity alert said: “DHS and FBI characterise this activity as a multi-stage intrusion campaign by Russian government cyber actors who targeted small commercial facilities’ networks where they staged malware, conducted spear phishing and gained remote access into energy sector networks.”

“After obtaining access, the Russian government cyber actors conducted network reconnaissance, moved laterally, and collected information pertaining to industrial control systems,” it added.

The US treasury announced new sanctions against Russian individuals and entities, including the FSB and GRU intelligence agencies, as well as the Internet Research Agency in St Petersburg, for interference in the 2016 elections.

As a result of Russia’s election interference, officials said that thousands of Russian-planted stories reached “millions of people online” during the US presidential campaign.

The new sanctions represent the broadest set of US punitive measures against Russia since the start of the Trump administration, and many of their targets are the same as those identified by an indictment by Robert Mueller, the special counsel investigating Russian interference in the 2016 election and possible collusion with the Trump campaign.
Mueller’s investigation has been denounced as a politically motivated witch-hunt by the president and his supporters, and the new measures represent the latest example of dissonance in attitudes towards Russia between Trump and other parts of the administration.

Adam Schiff, the top Democrat on the House intelligence committee, said the sanctions did not go nearly far enough in view of the scale of the Russian attack on the 2016 election.

“The sanctions today are a grievous disappointment, and fall far short of what is needed to respond to that attack on our democracy, let alone deter Russia’s escalating aggression, which now includes a chemical weapons attack on the soil of our closest ally,” Schiff said in a statement.

He pointed out that many of the sanctions targeted had already been designated by the Obama administration, and claimed that the new designated targets did not reflect “new work within the administration” but were selected on the basis of the Mueller’s indictment.

“It appears that Mr Mueller is doing more to place consequences on Russia’s behavior than the rest of the administration,” Schiff said.

The sanctions were also imposed for the role of Russian intelligence in distributing the NotPetya malware and ransomware which US officials attributed to Moscow in February. 

Officials said it was initially targeted at Ukraine but was allowed to “propagate recklessly without bounds” and caused an estimated $10bn in damage around the world, making it the most damaging cyber-attack in history.
The treasury announced it had sanctioned five entities and 19 individuals for cyber-attacks, including during the election. 

“The administration is confronting and countering malign Russian cyber-activity, including their attempted interference in US elections, destructive cyber-attacks, and intrusions targeting critical infrastructure,” Steven Mnuchin, the treasury secretary, said in a statement.

“These targeted sanctions are a part of a broader effort to address the nefarious attacks emanating from Russia. Treasury intends to impose additional … sanctions, informed by our intelligence community, to hold Russian government officials and oligarchs accountable for their destabilising activities by severing their access to the US financial system.”

Among those directly targeted are six senior officers of the Russian military intelligence service, the GRU, including its chief, Igor Korobov, and three of his deputies.

Guardian

You Might Also Read:


 

 

« Dark Web Fraud Undetectable By Police
Ensure Your Cloud Storage Is Compliant With GDPR »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

BackupVault

BackupVault

BackupVault is a leading provider of completely automatic, fully encrypted online, cloud backup.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Kualitatem

Kualitatem

Kualitatem Inc. is an independent software testing and information systems auditing company

European Cyber Security Organisation (ECSO)

European Cyber Security Organisation (ECSO)

The main objective of ECSO is to support all types of initiatives or projects that aim to develop, promote and encourage European cybersecurity.

Hack in the Box Security Conference (HitBSecConf)

Hack in the Box Security Conference (HitBSecConf)

HITBSecConf is a platform for the discussion and dissemination of next generation computer security issues. Our events feature two days of training and a two-day multi-track conference

Sogeti

Sogeti

Sogeti deliver solutions that enable digital transformation and offer cutting-edge expertise in Cloud, Cybersecurity, Digital Manufacturing, Quality Assurance, Testing, and emerging technologies.

Operational Center for Information Systems Security (COSSI)

Operational Center for Information Systems Security (COSSI)

COSSI is responsible for the detection and mitigation of cyber attacks directed at French Government information systems.

S21sec

S21sec

S21sec is a leading European pure play cybersecurity consultancy, services and solutions provider.

Pentera Security

Pentera Security

Pentera (formerly Pcysys) is focused on the inside threat. Our automated penetration-testing platform mimics the hacker's attack - automating the discovery of vulnerabilities.

Granted Consultancy

Granted Consultancy

Granted Consultancy is a business consultancy that specialises in securing funding to support companies with the development and commercialisation of new and innovative products and technologies.

Raonsecure

Raonsecure

Raonsecure is one of Korea’s leading ICT security software companies – providing a variety of PC and mobile security solutions to financial institutions, government, and enterprise.

Britive

Britive

The Britive Platform is a cloud-native security solution built for the most demanding cloud-forward enterprises.

Panacea Infosec

Panacea Infosec

Panacea Infosec is a leading provider of information security compliance services. We help our clients in protecting their data, reducing security risks and fighting cybercrime.

US Digital Corps

US Digital Corps

The U.S. Digital Corps is a new two-year fellowship for early-career technologists where you will work every day to make a difference in critical impact areas including cybersecurity.

SolCyber

SolCyber

SolCyber, a Forgepoint company, is the first modern MSSP to deliver a curated stack of enterprise strength security tools and services that are accessible and affordable for any organization.

Sentra

Sentra

Sentra is focused on improving data security practices within the cloud, mitigating the risks of damaging data leaks by providing comprehensive visibility into critical data assets.

NAK Consulting Services

NAK Consulting Services

NAK is helping organisations to create Secure, Agile IT Environments. Our goal is to be the trusted advisor and managed service partner for our clients.

Plex IT

Plex IT

Plex IT provides managed IT services to organisations along with managed security services.