US Military Hackers At Work Supporting Ukraine

General Paul Nakasone, chief of US Cyber Command (pictured) has announced “We’ve conducted a series of operations across the full spectrum; offensive, defensive, and information operations.” This is the first confirmation that the US is engaged in a digital conflict against Russia in support of the Ukraine government.

“Leading up to and during Russia’s unprovoked and illegal further invasion of Ukraine, the United States is supporting Ukraine’s continued access to the Internet and to enhance Ukraine’s cyber defenses. These efforts, coordinated across the US government,” the US Department of State confirmed.

US Cyber Command directs operations through its components. These include the Cyber National Mission Force-Headquarters, Joint Force Headquarters-DoD Information Network, the commander for which is dual-hatted as the Director of the Defense Information Systems Agency and Joint Task Force Ares.

General Nakasone also explained how separate "hunt forward" operations were allowing the US to search out foreign hackers and identify their tools before they were used against America. 

“We remain vigilant every single day. Every single day. I think about it all the time,” Nakasone told Sky News when asked about the risk of an intrusion. “This is why we’re working with a series of partners to ensure we prevent that, not only against the United States but against our allies as well.”   

Nakasone, who also serves as director of the National Security Agency, did not reveal details of the cyber hacking operations, but did tell the outlet that they were lawful and conducted with civilian oversight. “My job is to provide a series of options to the secretary of defense and the president, and so that’s what I do,” he said. It is unclear when the operations began or how many have occurred since Russia began its assault on Ukraine.

“When Moscow ordered the invasion in late February, we stepped up an already high operational tempo. We have been conducting additional hunt forward operations to identify network vulnerabilities.. “We provided remote analytic support to Ukraine and conducted network defense activities aligned to critical networks from outside Ukraine, directly in support of mission partners. In conjunction with interagency, private sector and Allied partners, we are collaborating to mitigate threats to domestic and overseas systems.” Nakasone, said to Congress in April.

The US government has long warned of Russian cyber attacks against America and its allies. In March, President Biden told US companies to tighten their digital defenses due to “evolving intelligence” that indicated Russia could launch various cyber attacks in retaliation for US sanctions imposed in response to the Ukraine invasion.

The FBI Director Christopher Wray has also warned that potential Russian cyber hacking operations would likely become “more destructive as the war keeps going poorly for them.” “We’ve seen the Russian government taking specific preparatory steps towards potential destructive attacks both here and abroad,” Wray said at a recent event.  He also revealed that the FBI has been on a “combat tempo” with a 24/7 command post to tackle potential Russian hacking threats. 

While there have not been any known Russian cyber attacks against the US since the start of the invasion, Ukraine has come under constant cyber attacks. Most notably, the US has accused Russia of carrying out a cyber attack against the Viasat KA-SAT network, cutting off Internet access for thousands of Ukrainians.

US State Dept:     US Cyber Command:      New York Post:      CNN:      Sky:    The Conversation

You Might Also Read: 

NATO & Ukraine Agree Deeper Cyber Co-operation:

 

« EnemyBot Malware Targets Web Servers
Social Media Platforms Must Protect Women Online »

Quartz Conference
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Help Net Security

Help Net Security

Help Net Security has been a prime resource for information security news and insight since 1998.

Secure Recruiting International (SRI)

Secure Recruiting International (SRI)

SRI is an industry leader in Information Security , Networking, Wireless and Storage recruitment.

Applied Risk

Applied Risk

Applied Risk is an established leader in Industrial Control Systems security, focused on critical infrastructure security and combating security breaches that pose a significant threat.

Segusoft

Segusoft

With its encryption platform SEGULINK, Segusoft provides standard software for companies to securely transfer files and messages.

Cyber Forensic & Investigation (CFI)

Cyber Forensic & Investigation (CFI)

Cyber Forensic & Investigation (CFI) is recognized as Thailand’s leader in cyber investigations and digital forensics.

FinCom.co

FinCom.co

FinCom.Co is the world’s first automatic AML/ KYC screening system, for comprehensive compliance.

JpU

JpU

JpU develops a robust, purpose-built mobile network core to simplify the management of IoT networks and consolidate security for all connected devices.

Proton Data Security

Proton Data Security

Proton Data Security is a certified small business specializing in the design, manufacturing and sales of data security products for permanent erasure of hard drives, tapes and optical media.

BwCIRT

BwCIRT

BwCIRT is the Computer Incident Response Team (CIRT) for Botswana and provides an official point of contact for dealing with computer security incidents.

Logit.io

Logit.io

Logit.io is a log analysis & management platform that provides a scalable solution for hosting the open-source tools Elasticsearch, Logstash, and Kibana.

TopSOC Information Security

TopSOC Information Security

TopSOC Information Security provide a wide range of security consultation, implementation and training services.

National Academy of Cyber Security (NACS)

National Academy of Cyber Security (NACS)

National Academy of Cyber Security provides Professional Training Courses and Programmes in Cyber Security.

Identity Management Institute (IMI)

Identity Management Institute (IMI)

Identity Management Institute (IMI) provides professional training and certification in cyber security with a focus on identity and access management, identity theft, and data protection.

Secure Cyber Defense

Secure Cyber Defense

Secure Cyber Defense provides expert cybersecurity consulting and managed detection and response services to companies, local government, schools and universities.

Lupovis

Lupovis

Lupovis is an AI-based deception solution that deploys active decoys turning your network from a flock of sheep to a pack of wolves where the hunter becomes the hunted.

WiebeTech

WiebeTech

WiebeTech’s line of digital forensics tools provide innovative and rugged devices for efficient disk imaging and evidence capture.