US Confirms Pause In Cyber Operations Against Russia

The Trump administration has taken a significant step in its cyber strategy, confirming that the US Cyber Command paused offensive operations targeting Russia for a single day earlier this year. This decision has raised questions about its impact on ongoing diplomatic efforts.  

Republican Congressman Don Bacon of Nebraska confirmedled that the US government halted cyber operations against Russia on 16th February 2025 as part of negotiations aimed at ending the Russia-Ukraine war, as a negotiating tactic. 

Following Bacon's remarks, the Pentagon responded on X, stating that Defence Secretary Pete Hegseth had not cancelled or delayed any cyber operations targeting Russian threats. The statement refuted claims that Cyber Command received a stand-down order from the Department of Defense (DOD).  However, reports indicate that Hegseth instructed US Cyber Command to halt all planning involving Russia, including offensive digital actions. Sources familiar with the matter claim that while the directive was issued, its interpretation remains unclear.  

Historical Precedent  

It is not uncommon for military operations to be temporarily halted during diplomatic negotiations. Previous Democratic and Republican administrations have engaged in similar strategic pauses to prevent miscommunication and maintain diplomatic momentum.  Despite the Pentagon’s denial, the Trump administration has been criticised for its lack of transparency on the issue. Officials have **refused to confirm whether the pause took place**.  

During the  Congressional hearing on 16th May 2025, Democratic Representative Eugene Vindman condemned the Pentagon’s response, accusing it of misleading the public:  "That statement by DOD Rapid Response was an outright lie. It was at least misleading. And that is not what the American people deserve." Vindman further pledged to press Secretary Hegseth for clarification on the matter.  

The DOD Rapid Response account on X, was launched in February with the proclaimed intention by Trump administration officials to deliver the most transparent Defence Department in history, although the  Pentagon has held only one formal ptress briefing to date.  

CBS   |   US Congress  |  The Record  |   DefenseOne  |   Poltico  |  Silicon   |  YouTube

Image: 

You Might Also Read: 

President Trump Fires National Security Agency Chief:


If you like this website and use the comprehensive 7,000+ service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Japan Enacts Landmark Cyber Defence Legislation
Enterprises Can Learn From Government Cyber Defence »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Tines

Tines

The Tines security automation platform helps security teams automate manual tasks, making them more effective and efficient.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

NESECO

NESECO

NESECO is an IT security integration and consulting firm providing security products, solutions, support, consulting, and training services.

HorizonIQ

HorizonIQ

HorizonIQ (formerly Internap Corp / INAP) maximizes efficiency and innovation with flexible infrastructure solutions.

FileWave

FileWave

FileWave offers a single solution for managing apps, devices, and more for Mac, Windows, and mobile devices.

Cybersecurity Collaboration Forum

Cybersecurity Collaboration Forum

The mission of the Cybersecurity Collaboration Forum is to foster information security communication and idea sharing across the C-Suite, enabling leaders to better protect their enterprises.

DivvyCloud

DivvyCloud

DivvyCloud protects your cloud and container environments from misconfigurations, policy violations, threats, and IAM challenges.

GuardRails

GuardRails

GuardRails provides continuous security feedback that empowers developers to find, fix, and prevent vulnerabilities.

iSecurity Consulting

iSecurity Consulting

iSecurity delivers a complete lifecycle of digital protection services across the globe for public and private sector clients.

CyberWhite

CyberWhite

CyberWhite is a disruptive provider of cyber security and risk mitigation solutions.

Security Weaver

Security Weaver

Security Weaver is a leading provider of governance, risk and compliance management (GRCM) software.

Valence Security

Valence Security

Valence manages and secures your Business Application Mesh by delivering visibility, reducing unauthorized access and preventing data loss.

FastNetMon

FastNetMon

FastNetMon is a very high performance DDoS detection and mitigation tool which could detect malicious traffic in your network and immediately block it.

XpertDPO

XpertDPO

XpertDPO provides data security, governance, risk and compliance, GDPR and ISO consultancy to public and private sector organisations.

Trackd

Trackd

At trackd, we’re re-imaging vulnerability remediation for the benefit of the entire cyber security community. Automating Vulnerability Remediation without the Fear of Disruption.

Glasstrail

Glasstrail

Glasstrail are single-minded about helping organisations gather intelligence and manage vulnerabilities in their attack surface before adversaries exploit them.

Minimus

Minimus

Minimus, a pioneering application security startup, offers a groundbreaking platform that eliminates over 95% of Common Vulnerabilities and Exposures (CVEs) from software supply chains.

Octopus Cybersecurity

Octopus Cybersecurity

Octopus VAR is a Validation, Analysis and Reporting tool that gives risk managers and CISOs a powerful control mechanism and a deep view of operational risks.