US Military Hackers At Work Supporting Ukraine

General Paul Nakasone, chief of US Cyber Command (pictured) has announced “We’ve conducted a series of operations across the full spectrum; offensive, defensive, and information operations.” This is the first confirmation that the US is engaged in a digital conflict against Russia in support of the Ukraine government.

“Leading up to and during Russia’s unprovoked and illegal further invasion of Ukraine, the United States is supporting Ukraine’s continued access to the Internet and to enhance Ukraine’s cyber defenses. These efforts, coordinated across the US government,” the US Department of State confirmed.

US Cyber Command directs operations through its components. These include the Cyber National Mission Force-Headquarters, Joint Force Headquarters-DoD Information Network, the commander for which is dual-hatted as the Director of the Defense Information Systems Agency and Joint Task Force Ares.

General Nakasone also explained how separate "hunt forward" operations were allowing the US to search out foreign hackers and identify their tools before they were used against America. 

“We remain vigilant every single day. Every single day. I think about it all the time,” Nakasone told Sky News when asked about the risk of an intrusion. “This is why we’re working with a series of partners to ensure we prevent that, not only against the United States but against our allies as well.”   

Nakasone, who also serves as director of the National Security Agency, did not reveal details of the cyber hacking operations, but did tell the outlet that they were lawful and conducted with civilian oversight. “My job is to provide a series of options to the secretary of defense and the president, and so that’s what I do,” he said. It is unclear when the operations began or how many have occurred since Russia began its assault on Ukraine.

“When Moscow ordered the invasion in late February, we stepped up an already high operational tempo. We have been conducting additional hunt forward operations to identify network vulnerabilities.. “We provided remote analytic support to Ukraine and conducted network defense activities aligned to critical networks from outside Ukraine, directly in support of mission partners. In conjunction with interagency, private sector and Allied partners, we are collaborating to mitigate threats to domestic and overseas systems.” Nakasone, said to Congress in April.

The US government has long warned of Russian cyber attacks against America and its allies. In March, President Biden told US companies to tighten their digital defenses due to “evolving intelligence” that indicated Russia could launch various cyber attacks in retaliation for US sanctions imposed in response to the Ukraine invasion.

The FBI Director Christopher Wray has also warned that potential Russian cyber hacking operations would likely become “more destructive as the war keeps going poorly for them.” “We’ve seen the Russian government taking specific preparatory steps towards potential destructive attacks both here and abroad,” Wray said at a recent event.  He also revealed that the FBI has been on a “combat tempo” with a 24/7 command post to tackle potential Russian hacking threats. 

While there have not been any known Russian cyber attacks against the US since the start of the invasion, Ukraine has come under constant cyber attacks. Most notably, the US has accused Russia of carrying out a cyber attack against the Viasat KA-SAT network, cutting off Internet access for thousands of Ukrainians.

US State Dept:     US Cyber Command:      New York Post:      CNN:      Sky:    The Conversation

You Might Also Read: 

NATO & Ukraine Agree Deeper Cyber Co-operation:

 

« EnemyBot Malware Targets Web Servers
Social Media Platforms Must Protect Women Online »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

CCN-CERT

CCN-CERT

CCN-CERT is the Spanish national government computer security incident response centre.

RCMP Cybercrime Strategy

RCMP Cybercrime Strategy

The RCMP Cybercrime Strategy sets out in an Operational Framework and Action Plan to combat cybercrime.

Inky Technology Corp

Inky Technology Corp

Inky® Phish Fence is an email protection gateway that uses sophisticated AI, machine learning and computer vision algorithms to block deep sea phishing attacks that get through every other system.

Ogasec

Ogasec

Ogasec is a cybersecurity company formed by the merger between Aker and N-Stalker in 2017. Solutions include Security & Connectivity Networking, Application Security, and Managed Security Services.

KOVRR

KOVRR

Kovrr financially quantifies cyber risk on demand. Our technology enables decision makers to seamlessly drive actionable cyber risk management decisions.

HCC Embedded

HCC Embedded

HCC’s mission is to ensure that data stored or communicated by an embedded IoT application is secure, safe and reliable.

CyberCyte

CyberCyte

CyberCyte provides a disruptive built-in integrated physical, network and perimeter security solution framework.

Norma Inc.

Norma Inc.

Norma provides the secured wireless environment (WiFi and Bluetooth) with the unauthorized AP detection, and secures your IoT assets from various threats.

Everbridge

Everbridge

Everbridge provides enterprise software applications that automate and accelerate organizations’ operational response to critical events in order to keep people safe and businesses running.

SEIRIM

SEIRIM

SEIRIM delivers cybersecurity solutions in Shanghai China specializing in Web Application Security, Network Security for SME's, Vulnerability Management, and serving as Managed Security as a Service.

NetWitness

NetWitness

NetWitness empowers security teams to rapidly detect today’s targeted and sophisticated attacks with unparalleled visibility.

Information Technology Solutions (ITS)

Information Technology Solutions (ITS)

Information Technology Solutions is a single source provider for managing and securing mission-critical IT services.

GetHacked.ca

GetHacked.ca

GetHackded.ca is a certified company offering penetration testing and specialized cybersecurity services.

Commonwealth Scientific & Industrial Research Organisation (CSIRO)

Commonwealth Scientific & Industrial Research Organisation (CSIRO)

CSIRO is Australia's national science agency. We solve the greatest challenges through innovative science and technology.

Two99

Two99

Two99 provide tailored excellence in the areas of E-Commerce, Marketing, Consulting, and Cyber Security.

CoinCover

CoinCover

Blockchain technology is changing everything. However, it brings its own set of unique risks. Coincover ensures everyone is protected, enabling them to innovate freely, without constraints.