In light of recent claims by the US government, Russia has moved to rebuke claims of their involvement in a cyber attack that compromised federal agencies in the country. The attack which occurred recently was announced by the Cybersecurity and Infrastructure Security Agency (CISA).
The agency stated that the attack involved an update for software developed by Solarwinds Orion had been compromised due to a trojan being identified. Used on computer networks in federal agencies and even the US military, this IT software is used to monitor and manage computer networks.
CISA immediately issued an emergency directive to all federal agencies currently using the software. They were directed to review their computer networks and disable any software developed by Solarwinds Orion.
The attack was considered highly sophisticated and many investigators were quick to point the finger at Russia. In fact, Mike Pompeo, the Secretary of State, went public with his allegations that Russia was behind the cyber attack. A spokesman for the Kremlin also went public by claiming the allegations as baseless and that Russia does not employ such tactics anywhere, including that of the US.
Software Supply Chain Attacks
The attack on the networks of the US federal agencies was classed as a software supply chain attack. Cybercriminals gain access to legitimate software and install malicious code so that when computers and networks download the software or updates for the software, they become compromised.
This is just one form of cyber attack but there are others too. Phishing attacks, cloud hacking, mobile device attacks, ransomware attacks, DOS attacks are also common tactics used by cybercriminals. The sole purpose is to steal data, damage networks, or in this case, spy.
What Can Be Done to Prevent Cyber Attacks?
The key is to not only remain vigilant but to always have high level security software and systems in place. End-to-end cyber security architecture, regular audits and scans, and data breach response plans should be used in conjunction with firewalls, antivirus software, and VPNs to ensure the best protection.
Enterprises looking for more information regarding the best security software can check authoritative resources such as LesmeilleursVPN. VPN software is widely regarded as one of the best safeguards against cyber attacks. When a user connects to a network, it is done via a secure and encrypted tunnel which protects the data sent and received.
This attack has already fueled the continued deterioration of relations between the US and Russia. With both sides standing firm with their statements, it might not bode well for the future. Either way, what this has shown is that even the world’s most powerful country is susceptible to cyber attacks. It should serve as a wake up call to the country and for enterprises worldwide.