Enough is enough. Here’s what we should do to defend against the next Russian cyberattacks.

The details are still trickling in, but it seems possible that the latest Russian cyberattacks against the Departments of Homeland Security, Treasury and State; the National Institutes of Health; and possibly dozens of companies and departments will turn out to be one of the most important hacking campaigns in history.

The current reporting suggests that the Russian Foreign Intelligence Service (SVR), long considered Russia’s most advanced intelligence agency in cyber operations, managed to compromise the servers of an important vendor of information technology software and implant a back door. This company, SolarWinds, services tens of thousands of corporate and government clients, and its products naturally have access to critical systems. Since March, we’ve now learned, the SVR has been able to use this toehold to jump into the networks of a variety of highly sensitive organizations. I expect the true impact of the overall campaign won’t be known for months or years as thousands of companies scramble to determine whether they were breached and what was stolen.

To continue reading this article by Alex Stamos, director of the Stanford Internet Observatory and the former chief information security officer of Yahoo and Facebook, go to:

Also see:

Russian hack was ‘classic espionage’ with stealthy, targeted tactics
Some kinds of online aggression are “noisy,” almost certain to draw attention, as the multifaceted Russian attack on the 2016 presidential election was. And some are “quiet,” more reminiscent of the subtle spy-vs.-spy operations fictionalized in the novels by the great John le Carré, who died Dec. 12.

DHS Among Those Hit in Sophisticated Cyberattack by Foreign Adversaries – Report
The U.S. Department of Homeland Security (DHS), plus the Treasury and Commerce departments, have been hacked in an attack related to the FireEye compromise last week, according to reports. In addition, defense contractors and enterprises were caught up in the attack, FireEye said, which was carried out using a supply-chain attack targeting a SolarWinds network-management platform.

Leave a Reply

Your email address will not be published. Required fields are marked *