USA & Europe Undergoing A Wave Of Cyber Attacks

It is now clear that Russia is delivering a wave of cyber attacks against a number of European and numerous US federal agencies and organisations. Many US operations have recently been hacked, among them is the Department of Energy, which manages US nuclear infrastructure and it controls America’s nuclear policy.

The new campaign has not only been directed at the US government - a large numbers of businesses, universities and other organisations have also been affected with their data hacked and help to ransom.

The US Cybersecurity & Infrastructure Security Agency (CISA) has attributed these recent cyber attacks to a Russian ransomware group CLOP, rather than the Russian state, however this is a rather pointless distinction as to whether a Russian government employee, or a hired gun that does the actual hacking. CISA’s response comes as Progress Software, the US firm that makes the software exploited by hackers, said it had discovered a second vulnerability in the code that the company was working to fix.

CLOP, the ransomware gang allegedly responsible, is known to demand multimillion-dollar ransoms, but no ransom demands have been made of federal agencies, according to a senior US official.

Russian intelligence often hires professional cyber criminals to execute high-profile cyber operations, especially those targeting US high-value targets, to ensure that they have plausible deniability. Indeed, Russia currently has some of the most sophisticated and destructive arsenal of cyber weapons of any country.

Russia views cyber as a potent non-kinetic tool capable of disrupting an opponent’s society, by targeting his military, economy, and vital support structures such as hospitals, or even plunging an entire country into darkness, when war is going to happen.

Johns Hopkins University in Baltimore and the university’s renowned health system said in a statement this week that “sensitive personal and financial information,” including health billing records may have been stolen in the hack.

NCSC:    Symantec:     Fox:    CNN:   Trustwave:   JSTOR:    Image: iStock 

You Might Also Read: 

Reshaping The Future Of War With Malware:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Don't Use ChatGPT At Work
Only Half Of Citizens Are Happy With Digital Public Services »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

DriveLock

DriveLock

Our security solution is designed to prevent external attacks, which are evermore sophisticated as well as monitor, document and even prevent internal incidents.

AV Test

AV Test

The AV-TEST Institute is a leading international and independent service provider in the fields of anti-virus research and IT security.

MAY Cyber Technology

MAY Cyber Technology

MAY Cyber Technology is a Security Management solutions provider located in Turkey & Germany.

Trustlook

Trustlook

Trustlook's SECUREai engine delivers the performance and scalability needed to provide total threat protection against malware and other forms of attack.

SKOUT Secure Intelligence

SKOUT Secure Intelligence

SkOUT Secure Intelligence (formerly Oxford Solutions) provides cyber security monitoring services to organizations around the globe.

QA

QA

QA is a leading IT training provider in the UK with over 1,500 courses covering all areas of IT including Cyber Security.

LaoCERT

LaoCERT

LaoCERT is the national Computer Incident Response Team for Laos.

Hub One

Hub One

Hub One is a leading player in digital transformation with expertise in broadband connectivity, business solutions for traceability and mobility, IOT in industrial environments and cybersecurity.

Strike Security

Strike Security

Strike Security offers a continuous penetration testing platform that combines automation with ethical hackers.

Emtec

Emtec

Emtec’s cyber security team provides advisory, assessment, & managed security services that help you build the cyber security policies, toolsets & best practices to elevate your cyber security posture

OryxLabs

OryxLabs

OryxLabs provide advanced enterprise digital risk protection solutions. Learn more about how 24x7 continuous assessment, monitoring, and improvement can secure your network.

Anchor Technologies Inc (ATI)

Anchor Technologies Inc (ATI)

Anchor provides a full spectrum of cybersecurity services assisting our clients with all aspects of cybersecurity risk planning, identification, management, and monitoring.

Exiger

Exiger

Exiger is revolutionizing the way corporations, government agencies and banks navigate risk and compliance in their third-parties, supply chains and customers.

Miggo Security

Miggo Security

Miggo is the first Application Detection and Response (ADR) platform on a mission to stop application breaches.

ViCyber

ViCyber

ViCyber is an Australian based company whose mission is to simplify and strengthen cybersecurity for all businesses, irrespective of size.

Layer 8 Security

Layer 8 Security

Layer 8 Security is a cybersecurity advisory, consulting, and technical services firm that arms businesses with practical compliance, risk management, and security program strategies.