. Military Space News .
CYBER WARS
Pompeo blames Russia for massive US cyberattack
By Rob Lever
Washington (AFP) Dec 19, 2020

European Commission 'analysing situation' after US cyberattack
Brussels (AFP) Dec 19, 2020 - The European Commission said Saturday it had not found any computer system intrusion following revelations of a massive cyberattack on US government and other networks, but was "analysing the situation".

The EU executive "is aware of the global software supply chain cyber threat" via hacked software supplied by US tech company SolarWinds but " we have not detected any impact on our systems," a spokesman said.

An EU official told AFP that the Commission has "only one instance" of SolarWinds' software in its systems and "it was not impacted by the incident".

Microsoft said Thursday that its anti-virus defences found dozens of networked systems running the software had been compromised, most of them in the US but also in seven other countries including Belgium, home to the European Commission.

The US has blamed Russia for the cyberattack, but Moscow denies involvement.

NATO, which is also headquartered in Belgium, said it, too, was checking its systems, some of which use SolarWinds software, but had found "no evidence of compromise" so far.

SolarWinds said up to 18,000 customers, including government agencies and Fortune 500 companies, had downloaded compromised software updates, allowing hackers to spy on email exchanges.

NATO checking systems after US cyberattack
Brussels (AFP) Dec 19, 2020 - NATO said Saturday it was checking its computer systems after a massive cyberattack on US government agencies and others that Washington blamed on Moscow.

"At this time, no evidence of compromise has been found on any NATO networks. Our experts continue to assess the situation, with a view to identifying and mitigating any potential risks to our networks," a NATO official told AFP.

Microsoft said Thursday its anti-virus software detected intrusions in dozens of networked systems, most of them in the United States, via software supplied by US tech company SolarWinds.

The NATO official said the Belgium-headquartered organisation used SolarWinds software in some of its systems.

"NATO also has cyber rapid reaction teams on standby to assist Allies 24 hours a day, and our Cyberspace Operations Centre is operational," said the official, who was not identified in line with NATO's policy.

Microsoft president Brad Smith in a blog post on Thursday said the hack was the most concerning of several "nation-state attacks" seen this year.

He added that, outside the US, networks in seven other countries were affected -- in Belgium, Britain, Canada, Israel, Mexico, Spain and the United Arab Emirates -- and "it's certain that the number and location of victims will keep growing".

US Secretary of State Mike Pompeo on Friday said "we can say pretty clearly that it was the Russians that engaged in this activity".

Russia denied involvement.

SolarWinds said up to 18,000 customers, including government agencies and Fortune 500 companies, had downloaded compromised software updates, allowing hackers to spy on email exchanges.

Russia was "pretty clearly" behind a devastating cyberattack on several US government agencies that also hit targets worldwide, Secretary of State Mike Pompeo said.

Microsoft said late Thursday that it had notified more than 40 customers hit by the malware, which security experts say could allow attackers unfettered network access to key government systems and electric power grids and other utilities.

"There was a significant effort to use a piece of third-party software to essentially embed code inside of US government systems," Pompeo told The Mark Levin Show on Friday.

"This was a very significant effort, and I think it's the case that now we can say pretty clearly that it was the Russians that engaged in this activity."

Roughly 80 percent of the affected customers are located in the United States, Microsoft president Brad Smith said in a blog post, with victims also found in Belgium, Britain, Canada, Israel, Mexico, Spain and the United Arab Emirates.

"It's certain that the number and location of victims will keep growing," Smith said, echoing concerns voiced this week by US officials on the serious threat from the attack.

"This is not 'espionage as usual,' even in the digital age," Smith said.

"Instead, it represents an act of recklessness that created a serious technological vulnerability for the United States and the world."

John Dickson of the security firm Denim Group said many private sector companies which could be vulnerable were scrambling to shore up security, even to the point of considering rebuilding servers and other equipment.

"Everyone is in damage assessment now because it's so big," Dickson said. "It's a severe body blow to confidence both in government and critical infrastructure."

The threat comes from a long-running attack which is believed to have injected malware into computer networks using enterprise management network software made by the Texas-based IT company SolarWinds, with the hallmarks of a nation-state attack.

James Lewis, vice president at the Center for Strategic and International Studies, said the attack may end up being the worst to hit the United States, eclipsing the 2014 hack of US government personnel records in a suspected Chinese infiltration.

"The scale is daunting. We don't know what has been taken so that is one of the tasks for forensics," Lewis said.

"We also don't know what's been left behind. The normal practice is to leave something behind so they can get back in, in the future."

- NSA warning -

The National Security Agency called for increased vigilance to prevent unauthorized access to key military and civilian systems.

Analysts have said the attacks pose threats to national security by infiltrating key government systems, while also creating risks for controls of key infrastructure systems such as electric power grids and other utilities.

The US Cybersecurity and Infrastructure Security Agency (CISA) said government agencies, critical infrastructure entities, and private sector organizations had been targeted by what it called an "advanced persistent threat actor."

CISA did not identify who was behind the malware attack, but private security companies pointed a finger at hackers linked to the Russian government.

Pompeo had also suggested Moscow's involvement on Monday, saying the Russian government had made repeated attempts to breach US government networks.

President-elect Joe Biden expressed "great concern" over the computer breach while Republican Senator Mitt Romney blamed Russia and slammed what he called "inexcusable silence" from the White House.

Romney likened the cyberattack to a situation in which "Russian bombers have been repeatedly flying undetected over our entire country."

CISA said the computer intrusions began at least as early as March this year, and the actor behind them had "demonstrated patience, operational security and complex tradecraft."

"This threat poses a grave risk," CISA said Thursday, adding that it "expects that removing this threat actor from compromised environments will be highly complex and challenging for organizations."

Hackers reportedly installed malware on software used by the US Treasury Department and the Commerce Department, allowing them to view internal email traffic.

The Department of Energy, which manages the country's nuclear arsenal, confirmed it had also been hit by the malware but had disconnected affected systems from its network.

"At this point, the investigation has found that the malware has been isolated to business networks only, and has not impacted the mission essential national security functions of the department, including the National Nuclear Security Administration," said agency spokeswoman Shaylyn Hynes.

SolarWinds said up to 18,000 customers, including government agencies and Fortune 500 companies, had downloaded compromised software updates, allowing hackers to spy on email exchanges.

Russia has denied involvement.

bur-rl/cl/rma/mtp

MICROSOFT


Related Links
Cyberwar - Internet Security News - Systems and Policy Issues


Thanks for being here;
We need your help. The SpaceDaily news network continues to grow but revenues have never been harder to maintain.

With the rise of Ad Blockers, and Facebook - our traditional revenue sources via quality network advertising continues to decline. And unlike so many other news sites, we don't have a paywall - with those annoying usernames and passwords.

Our news coverage takes time and effort to publish 365 days a year.

If you find our news sites informative and useful then please consider becoming a regular supporter or for now make a one off contribution.
SpaceDaily Contributor
$5 Billed Once


credit card or paypal
SpaceDaily Monthly Supporter
$5 Billed Monthly


paypal only


CYBER WARS
Massive cyberattack grows beyond US, heightening fears
Washington (AFP) Dec 18, 2020
A devastating cyberattack on US government agencies has also hit targets worldwide, with the list of victims still growing, according to researchers, heightening fears over computer security and espionage. Microsoft said late Thursday that it had notified more than 40 customers hit by the malware, which security experts say came from hackers linked to the Russian government and which could allow attackers unfettered network access. "While roughly 80 percent of these customers are located in the ... read more

Comment using your Disqus, Facebook, Google or Twitter login.



Share this article via these popular social media networks
del.icio.usdel.icio.us DiggDigg RedditReddit GoogleGoogle

CYBER WARS
Congress adds $1.3B to Missile Defense Agency's budget in spending bill

IMDO and MDA complete intercept test of the David's Sling Weapon System

Most Advanced SBIRS Missile Warning Satellite Ready For 2021 Launch

Russian military successfully tests new anti-ballistic missile

CYBER WARS
AFRL demonstrates critical new warhead technologies for high speed weapons

Projectile concept shows potential to extend munition range to more than 100km

U.S., Australia agree to partner on hypersonic missile development

Tigray forces fire rockets at Ethiopian regional capital

CYBER WARS
Funding for MQ-9 Reaper drone back in federal budget

Northrop Grumman completes first flight of Global Hawk Ground Station Modernization Program

Air Force launches drone-based security system at Travis AFB

Army looks to improve quadrotor drone performance

CYBER WARS
L3Harris to build Next Generation jammers in $496 million contract

NATO checking systems after US cyberattack

DARPA successfully demonstrates, transitions advanced RF networking program

Altamira announces new space mission data processing award worth $8.5 Million

CYBER WARS
Army hits target from 43 miles away with artillery system in works

Army talent management program a success, director says

GM Defense begins renovating N.C. facility to build ISVs

General Dynamics to build upgraded Abrams tanks in $4.62B contract

CYBER WARS
Japan cabinet approves record budget, higher defence spending

Trump vetoes sweeping US defense bill

US makes good on threats of Turkey sanctions over Russia arms

US Congress passes defense bill despite Trump veto threat

CYBER WARS
U.S. Navy: China did not 'expel' USS John S. McCain from South China Sea

Biden team warns of security risk after Pentagon halts briefings

Pompeo seeks to soothe Turkey after US sanctions

U.S. maritime forces to focus on China, Russia, new strategy doc says

CYBER WARS
Making 3D nanosuperconductors with DNA

Researchers share design for affordable single-molecule microscope

Scientists explain the paradox of quantum forces in nanodevices

Rice rolls out next-gen nanocars









The content herein, unless otherwise known to be public domain, are Copyright 1995-2024 - Space Media Network. All websites are published in Australia and are solely subject to Australian law and governed by Fair Use principals for news reporting and research purposes. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA news reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. All articles labeled "by Staff Writers" include reports supplied to Space Media Network by industry news wires, PR agencies, corporate press officers and the like. Such articles are individually curated and edited by Space Media Network staff on the basis of the report's information value to our industry and professional readership. Advertising does not imply endorsement, agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. General Data Protection Regulation (GDPR) Statement Our advertisers use various cookies and the like to deliver the best ad banner available at one time. All network advertising suppliers have GDPR policies (Legitimate Interest) that conform with EU regulations for data collection. By using our websites you consent to cookie based advertising. If you do not agree with this then you must stop using the websites from May 25, 2018. Privacy Statement. Additional information can be found here at About Us.