• North Korea Targeted Cybersecurity Researchers Using a Blend of Hacking and Espionage

    North Korean hackers have staged an audacious attack targeting cybersecurity researchers, many of whom work to counter hackers from places like North Korea, Russia, China and Iran. The attack involved sophisticated efforts to deceive specific people, which raises the level of social engineering, or phishing attacks, and enters the realm of spy tradecraft.

  • Espionage Attempts Like the SolarWinds Hack Are Inevitable, So It’s Safer to Focus on Defense – Not Retaliation

    Since taking office, President Joe Biden has ordered a thorough intelligence review of Russian aggression around the world, which includes hacking, election interference, poisoning political opponents and posting bounties for killing U.S. soldiers. His administration faces pressure from members of Congress in both parties and former government officials to respond forcefully to the SolarWinds breach. But the U.S. government may not be able to stop future intrusions into American computer systems. Scholarship describes how difficult it can be to effectively deter cyberattacks or punish those responsible, and suggests that retaliation – in whatever form it might take – will almost certainly invite counterhacks from Russia, worsening tensions between the countries and potentially escalating into the offline world.

  • The SolarWinds Hack Can Directly Affect Control Systems

    Much of the initial discussion around the SolarWinds cyberattack focused on its impact on the affected information technology (IT) systems. Joe Weiss and Bob Hunter write that this overlooks an equally destructive yet unexamined operational technology (OT) portion of the attack, and much of the OT impact may not be seen for months or longer. Weiss and Hunter note that researchers have long warned about the dangers posed by OT attacks, and that Russian hackers have become extremely adept at control system cyberattacks.

  • The Internet of Things Brings a Web of Promises and Perils to the Smart Grid

    Scientists and engineers research energy and security issues, so they are well aware that Internet of Things (IoT) combined with technologies such as 5G telecommunications and artificial intelligence (AI) are ushering in an era of fine-grained insight and control over infrastructure from smart microwaves to the entire electric power grid. On the flip sidethe growing number of connected devices increases the attack surface from a cybersecurity perspective.

  • Hackers “Manipulated” Stolen COVID Vaccine Papers, Says EU Agency

    Documents and emails about the BioNTech-Pfizer and Moderna jabs were taken in a cyberattack late last year. The EU’s drug regulator thinks hackers are trying to damage public trust in the COVID vaccines.

  • The Sunburst Hack Was Massive and Devastating – 5 Observations from a Cybersecurity Expert

    So much remains unknown about what is now being called the Sunburst hack, the cyberattack against U.S. government agencies and corporations. U.S. officials widely believe that Russian state-sponsored hackers are responsible. The attack gave the perpetrators access to numerous key American business and government organizations. The immediate effects will be difficult to judge, and a complete accounting of the damage is unlikely. However, the nature of the affected organizations alone makes it clear that this is perhaps the most consequential cyberattack against the U.S. to date.

  • Revelations of Cyberattacks on U.S. Likely Just “Tip of the Iceberg”

    Russian government hackers have infiltrated the computer networks of some of the nation’s biggest corporations, leading defense contractors, and top U.S. government agencies, including those in national security branches, in what security analysts believe is a “very significant” breach. The Russian espionage campaign was “sustained, targeted, far-reaching,” analysts say.

  • Election security It’s Official: The Election Was Secure

    Election officials and election security experts have long been clear: voter fraud is extraordinarily rare and the U.S. system has strong checks in place to protect the integrity of our voting process. “These are the facts,” says the Brennan Center for Justice. “But the facts have not stopped bad actors from trotting out baseless claims of ‘systemic voter fraud’ to suppress votes and undermine trust in our democracy for political gain.” Government officials, judges, and elected leaders, overwhelmingly Republican —and, in the executive branch and the judiciary, mostly Trump appointees — have publicly acknowledged confidence in the November election.

  • Online Users Manipulated into Sharing Private Information Online

    Online users are more likely to reveal private information based on how website forms are structured to elicit data, BGU researchers have determined.

  • The Strategic Implications of SolarWinds

    Recent reports of a broad Russian cyber infiltration across U.S. government networks are a sign of how great-power competition will play out in the twenty-first century. Benjamin Jensen, Brandon Valeriano, and Mark Montgomery write that the SolarWinds operation demonstrates that U.S. Cyber Command’s vision of persistent engagement, which calls for preventively imposing costs as adversaries to shape competition in cyberspace, appears not to have worked as expected. “In the future, what is required is a deeper focus on denial-based approaches: How can the U.S. limit the attack surfaces available to the opposition and harden targets to ensure resilience?” they write.

  • Memory Card May Be Used to Steal Data

    Researchers have published new research detailing a technique to convert a RAM card [a memory module that is plugged into a computer’s motherboard that stores the data being used by the computer] into an impromptu wireless emitter and transmit sensitive data from inside a non-networked air-gapped computer that has no Wi-Fi card.

  • Scope, Damage of Massive Russian Hack Still Uncertain

    Cyberexperts inside and outside the U.S. government are scrambling to determine the dimensions of the massive hack by Russian government hackers of dozens of government agencies and private organizations. “While the Russians did not have the time to gain complete control over every network they hacked, they most certainly did gain it over hundreds of them. It will take years to know for certain which networks the Russians control and which ones they just occupy,” said Thomas Bossert, Trump’s former cybersecurity adviser. Senator Richard Blumenthal (D-Connecticut), after closed-door meeting of the Senate Intelligence Committee, in which members were briefed by the intelligence community, said he was “deeply alarmed, and even downright frightened.”

  • U.S. National Security Officials Investigating Hacker Intrusions

    The Trump administration acknowledged Sunday that several U.S. institutions were hacked on behalf of a foreign government. Cybersecurity experts believe Russia is likely behind the attack on the U.S. Treasury and Commerce departments in what U.S. media is calling one of the most sophisticated attacks on U.S. government systems in years.

  • Quick Thoughts on the Russia Hack

    David Sanger, building on a Reuters story, reports in the New York Times that some country, probably Russia, “broke into a range of key government networks, including in the Treasury and Commerce Departments, and had free access to their email systems.” The breach appears to be much broader. Jack Goldsmith writes that The U.S. approach to preventing these breaches appears to involve five elements, but that, on the whole, these elements have failed to stop, prevent or deter high-level breaches.

  • A Better Kind of Cybersecurity Strategy

    During the opening ceremonies of the 2018 Winter Olympics, held in PyeongChang, South Korea, Russian hackers launched a cyberattack that disrupted television and internet systems at the games. The incident was resolved quickly, but because Russia used North Korean IP addresses for the attack, the source of the disruption was unclear in the event’s immediate aftermath. There is a lesson in that attack, and others like it, at a time when hostilities between countries increasingly occur online. In contrast to conventional national security thinking, such skirmishes call for a new strategic outlook, according to one expert.