Dominic Raab warns countries launching cyber attacks on UK
And Bill Harris has said the attack, which he blamed on the Russian hacking collective Cozy Bear, said rather than bullets and tanks, future wars would be fought with high-speed computers. The Cybersecurity and Infrastructure Security Agency (CISA) said on Wednesday the sprawling cyber espionage campaign made public earlier this month is affecting state and local governments, although it released few additional details.
However, the country’s National Nuclear Security Administration identified suspicious activity in the networks of the Federal Energy Regulatory Commission (FERC), Sandia and Los Alamos national laboratories in New Mexico and Washington, as well as the Office of Secure Transportation and the Richland Field Office of the Department of Energy.
Mr Harris, chief operating officer with defence consultants Radiant Blue, told Express.co.uk: “The recent Cyber Attacks by Cozy Bear on SolarWinds should be another wake-up call to the United States and her allies.
“These continued state-sponsored cyber attacks lead to our nations most treasured secrets being compromised – including intellectual property, defence secrets, and our critical infrastructure.
We will use your email address only for sending you newsletters. Please see our Privacy Notice for details of your data protection rights.
“This wake-up call must re-invigorate our Government, the Department of Defense, and leading US-based Technology providers to take action and harden our cyber defences to protect our national assets and critical infrastructure.
“Additionally, every American should be concerned. This is a purposeful and direct attack on who we are as a nation, our way of life, and the freedoms we have earned and enjoy.”
Mr Harris warned: “Gone are the days of wars on the battlefield with guns, tanks, and bullets.
The new wars of the future will be fought with high-speed computers and ones and zeros
“The new wars of the future will be fought with high-speed computers and ones and zeros.”
The hackers, who used US tech company SolarWinds as a means of penetrating federal government networks, had “impacted enterprise networks across federal, state, and local governments, as well as critical infrastructure entities and other private sector organizations,” CISA said in a statement on its website.
The CISA previously confirmed US government agencies, critical infrastructure entities, and private groups were among those affected, although it did not specifically mention state or local bodies.
Andrew Neil says Boris MUST secure deal with EU [LATEST]
Salisbury Poisonings: ‘Man who made Novichok’ revealed by BBC [UPDATE]
Trump’s furious call with May over Skripal attack ‘doubts’ exposed [INSIGHT]
So far only a handful of federal government agencies have officially confirmed having been affected, including the US Treasury Department, the Commerce Department, and the Department of Energy, which includes the NNSA.
Senior US officials and lawmakers including Secretary of State Mike Pompeo and Republican Senator Mitt Romney have alleged that Russia is to blame for the hacking spree, a charge the Kremlin denies.
Tweeting last week, Mr Romney said: “I think the White House needs to say something aggressive about what happened.
“This is almost as if you had a Russian bomber flying undetected over the country, including over the nation’s capital, and not to respond in a setting like that is really stunning.”
Democrat Senator Dick Durbin described the attack as “virtually a declaration of war by Russia on the United States and we should take that seriously”.
However, US President Donald Trump has since suggested China was actually to blame.
Meanwhile, UK security officials are still assessing the extent of the impact on this country.
Paul Chichester, director of operations at the National Cyber Security Centre said: “This is a complex, global cyber incident, and we are working with international partners to fully understand its scale and any UK impact.
“The NCSC is working to mitigate any potential risk, and actionable guidance has been published to our website.
“We urge organisations to take immediate steps to protect their networks – and will continue to update as we learn more.”
Source: Read Full Article