[ad_1]
![]()
President Bidenspeak out against cyber attacks Russia Cybersecurity experts say it hasn’t stopped ransomware and hackers from hitting the US.
Mr. Biden He said US critical infrastructure is prohibited for Russia-based attackers and has repeatedly warned Russian President Vladimir Putin to take action against cyber-attackers. The efforts did not provide an observable deterrent, he said. Michael Ellis, a former senior attorney at the National Security Agency appointed by the President embers.
“I think it was just a little naive to think about it. Biden Scolding Putin actually leads to everything by itself,” he said. Ellis I said. “An error Biden the administration’s policy so far: Their approach again seems to be reminiscent of the Obama administration – that meeting to discuss an issue but without a decision. And when you don’t make a decision, it somehow means a decision, which has bad consequences.”
Mr. Biden Set her Red lines with Mr Putin at the June summit in Geneva. Mr. Biden declared 16 critical infrastructure sectors, including communications, defense industry base, energy, financial services, health, transportation, food and agriculture, to be deported for cyber attacks.
“As a result, I told President Putin that we need to have some ground rules,” he said. Biden said right after the summit. “This is the way we can all fit in.”
According to the California and Israel-based cybersecurity firm Check Point, the number of weekly attacks against many of the deport critical infrastructure sectors has continued to rise in previous years.
Check Point observed an average of 406 attacks per week against the financial services industry, 790 attacks per week against the healthcare industry, and an average of 976 attacks per week against the communications industry in June and July.
The average number of attacks per week in each of these sectors is more than double the rate at this time last year, Check Point reported. The communications industry is experiencing more than four times the number of attacks.
Check Point spokesperson Ekram Ahmed said his firm will not reveal the identity of certain assets under attack due to strict confidentiality agreements it has to abide by.
Determining which cyberattacks crossed Mr. Biden’s red lines is difficult to detect, even if the victim is known and appears to fall under the full list of 16 borderless critical infrastructure sectors posted on the Cybersecurity and Infrastructure Security Agency’s website.
The REvil cyber gang launched defense contractor HX5 last week, Mr. BidenUltimatums to Mr Putin. The defense contractor’s clients include the Army, Navy, and Air Force, and arguably put the HX5 on its ban list as part of its defense industry base.
Whether the REvil attackers who shot the HX5 were aimed at Russia, or even Russia unknown. The REvil gang’s online presence has dwindled over the past week as the group either went into hiding, was taken offline, or faced the usual technical difficulties.
The number of REvil’s victims is huge and has recently been endured by a ransomware attack on the software company. Kaseya During the Fourth of July weekend. Although Kaseya stated that the attack affected less than 1,500 businesses out of 60 customers using the following. Kaseya victims were in 17 different countries.
Among the victims Kaseya The attack was in the town of North Beach, Maryland, which proactively shut down the local government’s network server and workstations. North Beach became the first municipality to disclose the ransomware attack. Kaseya, but Brett Callow, a threat analyst at software company Emsisoft, said it was the 41st local government organization in the US to be affected by ransomware this year.
On Thursday, the State Department began awarding up to $10 million for information leading to the identification of foreign government-led cyberattackers that hit US critical infrastructure.
In an interview before REvil’s digital fingerprints disappeared, Reuven Aronashvili, who formerly served in the Israel Defense Forces and founded cybersecurity firm CYE, said he did not see a change in the behavior of cyber attackers, but was hopeful that such changes could happen.
“Change takes time and all new requirements and all [that] Coming from the president Biden“These are good, I think good steps forward, but the impact of these is still not there,” Aronashvili said. “Let’s say you need to revolutionize the industry of some sort to rise above the loud noise we see today. These attacks are unfortunately still too easy.”
Policymakers are increasingly putting pressure on the Biden administration to take more aggressive action. Jim Langevin, a Rhode Island Democrat and chair of the Armed Services Committee’s cyber subcommittee, said last week that Mr. Biden enacting adapted sanctions Russia during ransomware attacks.
Mr. Langevin told the Council on Foreign Relations that, rather than launching offensive actions, the Biden team should impose better-targeted sanctions. Russia more than those implemented by the administration in response to the Russian government hack of SolarWinds computer network management software, which affected nine federal agencies.
“In fact, responding in cyberspace would go against our ultimate goal of promoting a space regulated by strong norms and a well-understood standard of behavior,” Langevin said. “Trade shots in cyberspace perpetuate the idea that space is the Wild West and directly undermine our goal of stability.”
Other lawmakers want the government to consider expanding the cyberwarfare arena to include private organizations. Late last month, Sens. Sheldon Whitehouse, Rhode Island Democrat, and Montana Republican Steve Daines introduced a bill that would direct the Department of Homeland Security to examine the benefits and risks of authorizing private entities to take offensive actions.
On Thursday, the White House announced a ransomware task force, and the National Security and Justice departments created StopRansomware.gov, a digital hub for information on ransomware.
In comparison, Mr. BidenApproach to Mr. embers‘ record Mr. Ellis He noted that the former president allowed a more streamlined procedure for offensive cyber operations, and some of that was used against the attack. Russia.
Mr. Ellis, a visiting friend for law and technology at the conservative Heritage Foundation, Mr. embers they were on duty. Even so, he is thought the attackers’ account would be different.
“I don’t think they’re going to disappear all at once. embers I was still president, but I think Russia or other countries that condone this activity, if they paid a price for it – and I think that would be great, if they would have been much more likely to pay a price. embers they were still presidents – they were going to take some steps to start cracking down on these actors,” he said. Ellis I said.
[ad_2]
Source link
