US Moves Cyber Defences To High Alert

As the war escalates between Russia and Ukraine, the US Department of Homeland Security (DHS) has published a warning to businesses to be on high alert for Russian cyber attacks and so has the UK’s National Cyber Security Centre (NCSC). 

Russian-directed cyber attacks against the US are now being considered an imminent possibility by the US government. 

US cyber security officials are urging federal agencies and large organisations to remain vigilant against the threat of Russian cyber attacks amid the country’s ongoing invasion of Ukraine. 

The DHS has been designated as the lead federal agency managing the domestic response to the Russia-Ukraine crisis in the wake of warnings about potential cyber attacks on the US and ongoing disinformation campaigns. Over twenty senators from both parties want to know more about how the DHS and its component agencies are proactively working to harden the digital defences of the federal government and critical infrastructure.

The White House Press Secretary Jen Psaki recently said the US was prepared to respond to any cyberattack launched against critical infrastructure or companies. “In terms of the financial impact, as I said, these are the most impactful and significant sanctions the US has ever taken.  But financial sanctions are just one part of our response... We’re also unveiling today an expansive and unprecedented set of export restrictions developed in historically close coordination with the European Union, Australia, Japan, Canada, New Zealand, the United Kingdom, and Taiwan. 

The new measures include sweeping restrictions on Russian military end users to limit Putin’s military capabilities and to deny exports to Russia of sensitive modern technology, primarily in the defence, aerospace and maritime sectors. 

“In total, the United States and our partners will effectively be cutting off more than half of all high-tech imports going into Russia.  This includes curbing Russia’s access to advance semiconductors and other foundational technologies that Russia needs to diversify and modernise its economy.,” Psaki said recently.

In a letter to Secretary of Homeland Security Alejandro Mayorkas, US senators have requested a briefing about what DHS is doing to protect agencies,  businesses and core services like electricity and Internet that Americans rely on. “Given Russia’s history of disruptive cyber and disinformation activities, we are concerned that the United States may be targeted in retaliation for actions taken to impose costs on Russia for its unprovoked invasion of Ukraine,” the senators wrote.  

The department of the DHS agency most responsible for this task, the Cybersecurity and Infrastructure Security Agency (CISA), has been warning the public for months while putting out actionable guidance for hardening systems and meeting with companies from vulnerable critical infrastructure sectors to coordinate further defenses. 

While the agency has announced caution and is monitoring the different malware that have been used in Ukraine, CISA Director Jen Easterly and others have also emphasised that there is no credible intelligence about an impending hacking campaign right now.

  • US Senators want to know what strategy is in place if US critical infrastructure is targeted by Russian hackers and how the agency is prioritising the most at-risk organisations or sectors for technical support. 
  • They also want to know what advice is being sent out throughout the US, particularly for smaller businesses that may lack dedicated IT or cyber security executives and who aren’t part of the Joint Cyber Defense Collaborative, CISA’s department for engaging with the private sector.
  • While CISA and DHS are focused on internal US defenses, the senators also want an update on what is being done to coordinate with NATO allies and Ukraine.

While social media companies have become under significant pressure to get to grips with coordinated state disinformation campaigns on their platforms, US lawmakers want to know how the invasion of Ukraine may have altered or augmented Russia’s disinformation strategy and how DHS is responding.  

The White House:     DHS:      CNN:    Washington Post:    Time:   The Hill:    SC Magazine

You Might Also Read:

Cyber Attacks May Lead To A “shooting war”:
 

« Two Thirds Of Organisations Are Not Equipped To Deal With Cyber Threats
Only A Few Employees Cause The Majority Of Breaches »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law are experts in information technology, data privacy and cybersecurity law.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Cyberlytic

Cyberlytic

Cyberlytic applies artificial intelligence to combat the most sophisticated of web application threats, addressing the growing problem of high volumes of threat data.

Sonatype

Sonatype

Sonatype protects the world's enterprise software from security, compliance, licensing risks, while reducing application development and deployment time.

Corero Network Security

Corero Network Security

Corero Network Security is dedicated to improving the security of the Internet through the deployment of its innovative DDoS & Network Security Solutions.

Hortonworks

Hortonworks

Hortonworks Data Governance Initiative addresses the need for open source governance solution to manage data classification, data lineage, security and data lifecycle management.

Alarum Technologies

Alarum Technologies

Alarum Technologies (formerly Safe-T) is a global provider of cyber security and privacy solutions to consumers and enterprises.

Ground Labs

Ground Labs

Ground Labs is a security software company dedicated to making sensitive data discovery products that help organisations prevent sensitive data loss.

X-act Forensics

X-act Forensics

X-act forensics are computer forensic experts with experience in cases of computer fraud, intellectual property theft, and social networking cases.

CyberOwl

CyberOwl

CyberOwl's early warning system uses a probabilistic framework to systematically aggregate uncertain and disparate security events to provide real-time visibility of threats to every asset.

Hitachi Systems Security

Hitachi Systems Security

Hitachi Systems Security provides customized services for monitoring and protecting the most critical and sensitive IT assets in our clients’ infrastructures 24/7.

Padlock

Padlock

Padlock is a trusted platform with an intimate knowledge of the cybersecurity industry that connects businesses with freelance professionals

NetSPI

NetSPI

NetSPI is an information security penetration testing and vulnerability assessment management advisory firm.

Penten

Penten

Penten is an Australian-based cyber security company focused on innovation in secure mobility and applied AI (artificial intelligence).

IntelliGenesis

IntelliGenesis

IntelliGenesis provide comprehensive cyber, data science, analysis, and software development services that provide tailored, secure solutions for your critical data and intelligence needs.

Intellias

Intellias

Intellias is a trusted technology partner to top-tier organizations and digital natives helping them accelerate their pace of sustainable digitalization.

Cardonet

Cardonet

Cardonet is an IT Support and IT Services business offering end-to-end IT services, 24x7 IT Support to IT Consultancy, Managed IT and Cyber Security.

Panther Labs

Panther Labs

Panther’s mission is to make security monitoring fast, flexible and scalable for all security teams.