8.5 C
Saturday, April 13, 2024

The United States claims to have secretly removed malware from computers throughout the world, therefore preventing Russian cyberattacks

The United States said on Wednesday that it has discreetly removed malware from computer networks throughout the globe in recent weeks, a measure intended to thwart Russian assaults and send a message to Russian President Vladimir V. Putin, who is now in office.

Officials in the United States have warned that Russia may attempt to strike American critical infrastructure, including financial institutions, pipelines, and the electric grid, in response to the crippling sanctions imposed on Moscow as a result of the conflict in Ukraine. The Attorney General, Merrick B. Garland, announced the action on Monday.

As a result of the virus, the Russians were able to establish “botnets,” which are networks of private computers that have been infected with malicious software and are controlled by the GRU, the Russian military’s intelligence arm. However, it is unclear what the virus was meant to achieve, given that it has the potential to be used for everything from surveillance to malicious assaults.

On Wednesday, a senior American official said that the United States did not want to wait to find out the answer. In reliance on secret court orders in the United States and the assistance of countries all over the globe, the Justice Department and the Federal Bureau of Investigation (FBI) were able to cut off the networks’ connection to the Soviet Union’s own controllers.

The court rulings authorised the Federal Bureau of Investigation to enter domestic business networks and remove malware, often without the knowledge of the organisation.

President Biden has said on several occasions that he would not put the United States military in direct battle with the Russian military, a circumstance that he believes might result in World War III. He declined to employ the U.S. Air Force to establish a no-fly zone over Ukraine or to allow the transfer of fighter planes from NATO air facilities to Ukraine as a result of his opposition to both.

His hesitance, on the other hand, does not seem to extend to online. A desire to disarm the major intelligence unit of the Russian military from computer networks located in the United States and throughout the globe was shown on Wednesday by the operation that was made public on that day. In addition, it is the latest attempt by the Biden administration to thwart Russian measures by making them public before Moscow can respond.

Even as the United States strives to avoid Russian strikes, some American officials are concerned that Mr. Putin is putting off the initiation of a massive cyberoperation that could have a devastating impact on the United States’ economic infrastructure.

Despite the fact that investigations into some of the assaults are still underway, security experts believe that Russia is responsible for additional cyberattacks that have happened since the conflict started, including those targeting Ukrainian communications systems, which have occurred since the war began.

As United States officials prepared to meet with their Russian counterparts in a bid to prevent a military clash in Ukraine, Russian hackers were already putting the final touches on a new piece of damaging malware, according to reports.

The malware was created with the intention of deleting data and rendering computer systems useless. After it was removed, the virus left a letter for victims, teasing them about the loss of their information. Before the representatives of the United States and Russia gathered for a last try at negotiation, hackers had already began using the virus to target Ukraine’s key infrastructure, which included government organisations responsible for food safety, finance, and law enforcement, among other things.

Adam Meyers, senior vice president for intelligence at CrowdStrike, who studied the malware used in the January assaults and determined that the organisation was related to Russia, said that the group’s goal was to create harm while also assisting Russian military interests.

Another assault took place on February 24, the same day that Russia invaded Ukraine, in which hackers took down Viasat’s satellite service. Viasat stated in a statement that the assault inundated modems with malicious data and caused internet services to be suspended for several thousand users in Ukraine and tens of thousands of other subscribers throughout Europe. The assault also spread to Germany, where it caused the functioning of wind turbines to be disrupted as a result.

Viasat said that the breach was still under investigation by law enforcement, U.S. and foreign government authorities, and Mandiant, a cybersecurity firm that the company engaged to look into the problem, and that the assault was not linked to Russia or any other state-sponsored organisation.

Mr. Fletcher said that he was prepared, but that smaller water businesses, such as his own, sometimes struggled to keep up with cybersecurity requirements and requirements. In order to pump and clean water, many of them depend on antiquated technology, which might make them tempting hacking targets, according to him.

It was predicted that Community Electric Cooperative, a Virginia-based utility company that serves around 12,000 consumers, would need $50,000 to enhance its cybersecurity systems. Representatives from the utility said the cooperative has previously educated its employees on how to identify cyberattacks and tested its systems, but they expressed optimism that the cooperative might do even more in preparation for a possible onslaught from Russia.

Jonathan James
Jonathan James
I serve as a Senior Executive Journalist of The National Era
Latest news
Related news


Please enter your comment!
Please enter your name here