Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Tracking & Law Enforcement

General Says Attacks by Foreign Hackers Are ‘Clarion Call’

The U.S. Cyber Command conducted more than two dozen operations aimed at thwarting interference in last November’s presidential election, the general who leads the Pentagon’s cyber force said Thursday.

The U.S. Cyber Command conducted more than two dozen operations aimed at thwarting interference in last November’s presidential election, the general who leads the Pentagon’s cyber force said Thursday.

Gen. Paul Nakasone did not describe the nature of the operations in testimony to the Senate Armed Services Committee but said they were designed “to get ahead of foreign threats before they interfered with or influenced our elections in 2020.”

A U.S. intelligence assessment released last week said that neither Russia nor any other nation manipulated votes or conducted cyberattacks that affected the outcome of the vote.

Nakasone’s appearance before the committee came as the U.S. deals with major cyber intrusions, including a breach by elite Russian hackers that exploited supply chain vulnerabilities to break into the networks of federal government agencies and private companies.

Nakasone said in his prepared remarks that Cyber Command and the National Security Agency are helping plan the Biden administration’s response to the SolarWinds intrusion and that “policymakers are considering a range of options, including costs that might be imposed by other elements of our government.”

Separately, the U.S. is working with the private sector to respond to a separate hack that exposed tens of thousands of servers running Microsoft’s Exchange email program to intrusion.

Asked by the committee chairman, Sen. Jack Reed, D-R.I., whether the intrusions represented a “new terrain,” Nakasone said both the SolarWinds and Microsoft hacks revealed “a scope, a scale, a level of sophistication that we hadn’t seen previously.”

“It is the clarion call for us to look at this differently — how do we ensure we have as a nation both the resiliency and the ability to act against these type of adversaries,” he said.

Advertisement. Scroll to continue reading.

Nakasone said one challenge is that foreign state hackers have taken advantage of legal constraints that prevent U.S. intelligence agencies such as the NSA, whose surveillance is focused abroad, from monitoring domestic infrastructure for cyber threats. Hackers are increasingly using U.S.-based virtual private networks, or VPNs, to evade detection by the U.S. government.

As a result, he said, the problem is not that intelligence agencies can’t connect all the dots but rather “we can’t see all of the dots.”

“We have an inability to see everything,” he added. “We as U.S. Cyber Command or the National Security Agency may see what is occurring outside of the United States, but when it comes into the United States, our adversaries are moving very quickly. They understand the laws and the policies that we have within our nation, and so they’re utilizing our own infrastructure, our own internet service providers, to create these intrusions.”

A senior Biden administration official told reporters earlier this month that the administration was not currently seeking additional authorities to monitor U.S.-based networks. Rather, the U.S. is working to encourage better information-sharing from the private sector about cyber threats.

Private companies are typically reluctant to share information on hacks and attempted hacks with the FBI and other government agencies, mostly out of fear of the negative business fallout if it were to become public. In many cases, companies don’t even report the incidents to the government.

On Wednesday, Sen. Mark Warner, D-Va., lamented in a webinar about being unable to get support in Congress for legislation to make it mandatory for companies to disclose cyber breaches. The chairman of the Senate Intelligence Committee singled out the telecommunications sector — a big target in the SolarWinds hack — as being especially resistant.

Written By

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

Expert Insights

Related Content

Cybercrime

Daniel Kelley was just 18 years old when he was arrested and charged on thirty counts – most infamously for the 2015 hack of...

Cybercrime

No one combatting cybercrime knows everything, but everyone in the battle has some intelligence to contribute to the larger knowledge base.

Cybercrime

The FBI dismantled the network of the prolific Hive ransomware gang and seized infrastructure in Los Angeles that was used for the operation.

Ransomware

The Hive ransomware website has been seized as part of an operation that involved law enforcement in 10 countries.

Privacy

Employees of Chinese tech giant ByteDance improperly accessed data from social media platform TikTok to track journalists in a bid to identify the source...

CISO Strategy

The SEC filed charges against SolarWinds and its CISO over misleading investors about its cybersecurity practices and known risks.

Cybercrime

A global cyber espionage campaign has resulted in the networks of many organizations around the world becoming compromised after the attackers managed to breach...

Ransomware

US government reminds the public that a reward of up to $10 million is offered for information on cybercriminals, including members of the Hive...