• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Republica Press

Your Business & Political News Source

REPUBLICA PRESS
Your Business & Political News Source

  • Home
  • BUSINESS
  • MONEY
  • POLITICS
  • REAL ESTATE
  • SCIENCE/TECH
  • US
  • WORLD
  • VIDEOS

After Biden Meets Putin, U.S. Exposes Details of Russian Hacking Campaign

by

WASHINGTON — Two weeks after President Biden met President Vladimir V. Putin of Russia and demanded that he rein in the constant cyberattacks directed at American targets, American and British intelligence agencies on Thursday exposed the details of what they called a global effort by Russia’s military intelligence organization to break into government organizations, defense contractors, universities and media companies.

The operation, described as crude but broad, is “almost certainly ongoing,” the National Security Agency and its British counterpart, known as GCHQ, said in a statement. They identified the Russian intelligence agency, or G.R.U., as the same group that hacked into the Democratic National Committee and released emails in an effort to influence the 2016 presidential election in favor of Donald J. Trump.

Thursday’s revelation is an attempt to expose Russian hacking techniques, rather than any specific new attacks, and it includes pages of technical detail to enable potential targets to identify that a breach is underway. Many of the actions by the G.R.U. — including an effort to get into data stored in Microsoft’s Azure cloud services — have already been documented by private cybersecurity firms.

But the political significance of the statement is larger: It is a first challenge to Mr. Putin since the summit in Geneva, where Mr. Biden handed him a list of 16 areas of “critical infrastructure” in the United States and said that it would not tolerate continued Russian cyberattacks.

a criminal gang operating from Russia.

In recent years, the National Security Agency has more aggressively attributed cyberattacks to specific countries, particularly those by adversarial intelligence agencies. But in December, it was caught unaware by the most sophisticated attack on the United States in years, the SolarWinds hacking, which affected federal agencies and many of the nation’s largest companies. That attack, which the the National Security Agency later said was conducted by the S.V.R., a competing Russian intelligence agency that was an offshoot of the K.G.B., successfully altered the code in popular network-management software, and thus into the computer networks of 18,000 companies and government agencies.

There is nothing particularly unusual about the methods the United States says the Russian intelligence unit used. There is no bespoke malware or unknown exploits by the G.R.U. unit. Instead, the group uses common malware and the most basic techniques, like brute-force password spraying, which uses passwords that have been stolen or leaked to gain access to accounts.

The government did not identify the targets of the G.R.U.’s recent attacks but said that it included government agencies, political consultants, political party organizations, universities, defense contractors, energy companies, think tanks and media companies.

The attacks appear to mostly be about gathering intelligence and information. The National Security Agency did not identify any ways that the Russian hackers damaged systems.

The recent wave of G.R.U. attacks has gone on for a relatively long time, beginning in 2019 and continuing through this year.

Once inside, the G.R.U. hackers would gain access to protected data and email — as well as to cloud services used by the organization.

The group of G.R.U. hackers were responsible for the primary hacking of the Democratic National Committee in 2016 which resulted in the theft, and release, of documents meant to damage the campaign of Hillary Clinton.

On Thursday, the National Security Agency released a list of evasion and exfiltration techniques used by the G.R.U. to help information technology managers identify — and stop — attacks by the group.

That lack of sophistication means fairly basic measures, like multifactor authentication, timeout locks and temporary disabling of accounts after incorrect passwords are entered, can effectively block brute force attacks.

View Source

>>> Don’t Miss Today’s BEST Amazon Deals! <<<<

Filed Under: US

Primary Sidebar

More to See

Western Window Systems launches new streamlined website

PHOENIX--(BUSINESS WIRE)--Western Window Systems, part of PGT Innovations’ (NYSE: PGTI) family of brands, launched a new website this week. The new … [Read More...] about Western Window Systems launches new streamlined website

Homebuilders say U.S. is in a ‘housing recession’ as sentiment turns negative

A worker drills plywood on a single family home under construction in Lehi, Utah, on Friday, Jan. 7, 2022.George Frey | Bloomberg | Getty … [Read More...] about Homebuilders say U.S. is in a ‘housing recession’ as sentiment turns negative

Double Vision: $54M Mirror-Image Mansions Are This Week’s Most Popular Listing

You were seeing double this week: A spectacular $54 million compound featuring two equally luxurious mansions separated by a private lake in Southwest … [Read More...] about Double Vision: $54M Mirror-Image Mansions Are This Week’s Most Popular Listing

Copyright © 2022 · Republica Press · Log in · As an Amazon Associate we earn from qualifying purchases.

Terms and Conditions - Privacy Policy