US Cyber Command Were Running An 'Election Special'

US Cyber Command has expanded its overseas operations aimed at finding foreign hacking groups during the 2020 Election in an effort to identify not only Russian hacking tactics, but also those of China and Iran. The  US teams aimed at identifying malicious foreign cyber actors before the Presidential  election, conducting missions to  seek out not only Russian hackers, but those from all major adversaries, including Iran and China. 

A military spokesman said that cyber operations against foreign actors, across the whole spectrum of offensive and defensive measures, began ahead of the election and will continue after the election.

This expansion of Cyber Command's "hunt forward" operations has been built on an effort that began in 2018 to identify foreign hackers and tactics. While a senior election security official from the Cybersecurity and Infrastructure Security Agency told reporters that "it has been quiet" as far as foreign interference and malicious cyber activity are concerned, they also cautioned that "we're not out of the woods yet", making it clear relevant agencies remain on high alert. 

Cyber Command said those efforts had uncovered malware being used by adversarial hacking teams. Other government agencies used that information to help state and local officials shore up their election system defenses and to notify the public about threats.In addition to new operations in Europe to pursue Russian hackers. Cyber Command has sent teams to the Middle East and Asia over the past two years to help find Iranian, Chinese and North Korean hacking teams and identify the tools they were using to break into computer networks. 

Cyber Command sends teams of experts overseas to work with partner and allied nations to help them find, identify and remove hostile intrusions on their government or military computer networks. For the allied nations, inviting Cyber Command operatives not only helps improve their network defenses but also demonstrates to adversaries that the United States military is working with them. 

For the United States, the deployments give their experts an early look at tactics that potential adversaries are honing in their own neighborhoods, techniques that could later be used against Americans.

CISA:     CNN:      New York Times:   Wired:   Washington Post

You Might Also Read:

Voter Data Being Used To Disrupt US Election:

 

« Critical Cyber Security Threats & Solutions For Business
Criminal Use Of Artificial Intelligence »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Free Access: Cyber Security Supplier Directory listing 5,000+ specialist service providers.

BackupVault

BackupVault

BackupVault is a leading provider of completely automatic, fully encrypted online, cloud backup.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

DigitalStakeout

DigitalStakeout

A simple and cost-effective solution to monitor, investigate and analyze data from the web, social media and cyber sources to identify threats and make better security decisions.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Kaspersky Lab

Kaspersky Lab

Kaspersky Lab is one of the world’s largest privately held vendors of endpoint cybersecurity solutions.

TechDefence Labs

TechDefence Labs

TechDefence Labs provide pentesting and security assessment services for networks, web apps, mobile apps and source code reviews.

Iceberg

Iceberg

Iceberg has been established to provide companies with cyber security experts who will protect businesses from the unseen threat of cyber crime.

LMG Security

LMG Security

LMG Security is a cybersecurity consulting, research and training firm.

Securmatic

Securmatic

SecurMatic is a Cyber Security Services Company that supports organizations to build cyber security into their operations that will reduce their overall exposure to cyber risk.

Araxxe

Araxxe

Araxxe delivers Revenue Assurance, End-to-End Billing Verification and Interconnect Fraud Detection solutions to communication companies worldwide.

Sanderson

Sanderson

Sanderson is a recruitment company providing expert recruitment services in areas including Cyber & Information Security.

OpSec Security

OpSec Security

OpSec Online is the only brand protection solution that spans all channels so your brands are protected no matter what digital venue the criminals target.

SecondWrite

SecondWrite

SecondWrite’s next-generation malware detection engine delivers a combination of automatic deep code inspection and accurate scoring of zero-day malware.

SEMNet

SEMNet

SEMNet is an IT solutions provider and an infrastructure and security consulting firm.

Rubrik

Rubrik

Rubrik helps enterprises achieve data control to drive business resiliency, cloud mobility, and regulatory compliance.