Now on Demand Ransomware Resilience & Recovery Summit - All Sessions Available
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cyberwarfare

White House Says Secure Systems Not Hacked

White House

White House

US officials insisted Tuesday that a cyber attack last year did not compromise White House classified systems, but refused to confirm reports Russia was behind the breach.

“There was an event last year, we have classified systems that are secure,” said deputy national security advisor Ben Rhodes.

“We don’t talk about where cyber intrusions originate from.”

CNN earlier reported that Russia was behind an October attack that was initially thought to be limited to the State Department, but was later confirmed to have hit the White House too.

National Security Council Spokesperson Mark Stroh told AFP the report was “speculating” on who was behind an attack that affected the unclassified “Executive Office of the President” network.

The Executive Office is made up of President Barack Obama’s closest advisors, including the National Security Council and Council of Economic Advisors, as well as the Vice President’s staff.

While separate from classified systems, that network is used to exchange sensitive information about White House activities, such as detailed breakdowns of the president’s movements.

“Any such activity is something we take very seriously,” Stroh said. “We took immediate measures to evaluate and mitigate the activity.”

Advertisement. Scroll to continue reading.

Obama recently ordered a new sanctions program that could block assets of US and foreign hackers and of companies that seek to profit from cyber attacks.

Obama said the threat from cyber attacks was a “national emergency.”

“Starting today, we’re giving notice to those who pose significant threats to our security or economy,” he said.

China, Russia and Iran are seen as most active in the cyber warfare arena.

Written By

AFP 2023

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Bill Dunnion has joined telecommunications giant Mitel as Chief Information Security Officer.

MSSP Dataprise has appointed Nima Khamooshi as Vice President of Cybersecurity.

Backup and recovery firm Keepit has hired Kim Larsen as CISO.

More People On The Move

Expert Insights

Related Content

Cyberwarfare

WASHINGTON - Cyberattacks are the most serious threat facing the United States, even more so than terrorism, according to American defense experts. Almost half...

Cybercrime

Patch Tuesday: Microsoft calls attention to a series of zero-day remote code execution attacks hitting its Office productivity suite.

Cyberwarfare

Russian espionage group Nomadic Octopus infiltrated a Tajikistani telecoms provider to spy on 18 entities, including government officials and public service infrastructures.

Cyberwarfare

Several hacker groups have joined in on the Israel-Hamas war that started over the weekend after the militant group launched a major attack.

Cyberwarfare

An engineer recruited by intelligence services reportedly used a water pump to deliver Stuxnet, which reportedly cost $1-2 billion to develop.

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...

Application Security

Fortinet on Monday issued an emergency patch to cover a severe vulnerability in its FortiOS SSL-VPN product, warning that hackers have already exploited the...

Cyberwarfare

The war in Ukraine is the first major conflagration between two technologically advanced powers in the age of cyber. It prompts us to question...