The Times Real Estate


.

  • Written by Scott Jasper, Senior Lecturer in National Security Affairs, Naval Postgraduate School
How the Biden administration is making gains in an uphill battle against Russian hackers

On Jan. 14, 2022, the FSB, Russia’s domestic intelligence service, announced that it had broken up the notorious Russia-based REvil[1] ransomware criminal organization. The FSB said the actions were taken in response to a request from U.S. authorities[2]. The move marks a dramatic shift in Russia’s response[3] to criminal cyberattacks launched against U.S. targets from within Russia, and comes at a time of heightened tensions between the two countries.

U.S. policy and actions in response to cyberattacks connected to Russia have changed distinctly since the Biden administration took office. President Joe Biden has openly confronted Russian President Vladimir Putin on his responsibility regarding international cyberattacks[4], and the Biden administration has taken unprecedented steps to impose costs[5] on Russian cyber criminals and frustrate their efforts.

Upon taking office, Biden immediately faced difficult challenges from Russian intelligence operatives and criminals in headline-grabbing cyberattacks on private companies and critical infrastructure. As a scholar of Russian cyber operations[6], I see that the administration has made significant progress in responding to Russian cyber aggression, but I also have clear expectations about what national cyber defense can and can’t do.

Software supply chain compromise

The SolarWinds hack[7] carried out in 2020 was a successful attack on the global software supply chain[8]. The hackers used the access they gained to thousands of computers to spy on nine U.S. federal agencies and about 100 private-sector companies. U.S. security agencies said that a sophisticated hacking group, “likely Russian in origin[9],” was responsible for the intelligence-gathering effort.

The SolarWinds hack explained.

On Feb. 4, 2021, Biden addressed Putin in a statement delivered at the State Department. Biden said that the days of the U.S. rolling over in the face of Russian cyberattacks and interference in U.S. elections “are over[10].”

Biden vowed to “not hesitate to raise the cost on Russia[11].” The U.S. government had not previously issued indictments or imposed sanctions for cyber espionage[12], in part out of concerns that they could result in reciprocal actions by Moscow against NSA and CIA hackers. Nevertheless, the U.S. Treasury Department issued sanctions[13] against the Russian Foreign Intelligence Service, the SVR, on April 15, 2021.

Biden also signed an executive order[14] to modernize federal government cybersecurity. He directed agencies to deploy systems that detect cyber incursions, like the one that spotted SolarWinds activity at Palo Alto Networks[15]. In parallel, his security agencies published tools and techniques[16] used by the SVR and ransomware gangs to help organizations defend against them.

Economic sanctions and technical barriers, however, did not slow SVR efforts to gather intelligence on U.S. foreign policy. In May 2021, Microsoft revealed that hackers associated with Russia exploited the mass-mailing service Constant Contact[17]. By masquerading as the U.S. Agency for International Development, they sent authentic-looking emails[18] with links to more than 150 organizations, which, when clicked, inserted a malicious file that allowed computer access.

Ransomware attacks

Also in May, the shutdown of the Colonial Pipeline by a ransomware attack by the Russian cyber gang DarkSide[19] halted the flow of nearly half the gas and jet fuel[20] to the Eastern Seaboard. Panicked drivers[21] rushed to fill up tanks while prices soared[22]. A month later, consumers scrambled to find meat alternatives[23] after REvil infected beef and pork processer JBS USA[24] with ransomware.

Ransomware attacks explained.

Biden said Russia has “some responsibility[25] to deal with this.” At a summit in Geneva in June, he handed Putin a list of off-limits critical infrastructure[26] that would merit a U.S. response if attacked. It is likely that Russian intelligence services and law enforcement have a tacit understanding[27] with cybercriminals and can shut down their resources.

Though not counting on Putin to exert influence, the White House formed a ransomware task force[28] to go on the offense against the gangs. The first step was using a counterterrorism program to offer rewards[29] of up to US$10 million for information on hackers behind state-sanctioned breaches of critical infrastructure.

In close collaboration with international partners, the Justice Department announced the arrest[30] of a Ukrainian national in Poland, charged with the REvil ransomware attack against Kaseya[31], an information technology software supplier. The Justice Department also seized $6.1 million[32] in cryptocurrency from another REvil operator. Romanian authorities arrested two others involved in REvil attacks.

U.S. law enforcement seized $2.3 million paid in ransom[33] to DarkSide by Colonial Pipeline by using a private key to unlock bitcoin. And the Treasury Department disrupted the virtual currency exchanges SUEX[34] and Chatex[35] for laundering the proceeds of ransomware. Treasury Department sanctions blocked all of their property in the U.S. and prohibited U.S. citizens from conducting transactions with them.

a man with salt-and-pepper hair wearing a dark blue military uniform
Gen. Paul Nakasone, Director of the National Security Agency, testifying before the House Intelligence Committee on April 15, 2021. Al Drago/Pool via AP[36]

Additionally, the top U.S. cyberwarrior, Gen. Paul Nakasone, acknowledged for the first time in public that the U.S. military had taken offensive action[37] against ransomware groups. In October, U.S. Cyber Command blocked the REvil website[38] by redirecting traffic, which prevented the group from extorting victims. After REvil realized its server was compromised, it ceased operations[39].

Limits of US responses

Russia conducts or condones cyberattacks[40] by state and criminal groups that take advantage of gaps in international law and avoid crossing national security lines. In October, the SVR stepped up attempts to break into technology companies[41] to steal sensitive information. U.S. officials considered the operation to be routine spying[42]. The reality that international law does not prohibit espionage per se prevents U.S. responses that could serve as strong deterrents.

Similarly, after cyber gang BlackMatter carried out a ransomwware attack[43] on an Iowa farm cooperative in September, the gang claimed that the cooperative did not count[44] as critical infrastructure. The gang’s claim refers to cyberattack targets that would prompt a national response from the U.S. government.

Despite this ambiguity, the administration has unleashed the military to frustrate the efforts of ransomware groups, while law enforcement agencies have gone after their leaders and their money, and organizations in the U.S. have shored up their information systems defenses.

Though government-controlled hackers might persist, and criminal groups might disappear, rebuild and rebrand, in my view the high costs imposed by the Biden administration could hinder their success. Nevertheless, it’s important to bear in mind that national cyber defense is an extremely challenging problem[45] and it’s unlikely that the U.S. will be able to eliminate the threat.

[Get The Conversation’s most important politics headlines, in our Politics Weekly newsletter[46].]

References

  1. ^ broken up the notorious Russia-based REvil (www.reuters.com)
  2. ^ a request from U.S. authorities (www.fsb.ru)
  3. ^ dramatic shift in Russia’s response (www.wired.com)
  4. ^ responsibility regarding international cyberattacks (www.cnn.com)
  5. ^ unprecedented steps to impose costs (www.whitehouse.gov)
  6. ^ scholar of Russian cyber operations (scholar.google.com)
  7. ^ SolarWinds hack (theconversation.com)
  8. ^ software supply chain (www.hackread.com)
  9. ^ likely Russian in origin (www.washingtonpost.com)
  10. ^ are over (www.whitehouse.gov)
  11. ^ not hesitate to raise the cost on Russia (thehill.com)
  12. ^ cyber espionage (www.wsj.com)
  13. ^ issued sanctions (home.treasury.gov)
  14. ^ executive order (www.whitehouse.gov)
  15. ^ SolarWinds activity at Palo Alto Networks (www.paloaltonetworks.com)
  16. ^ published tools and techniques (www.cisa.gov)
  17. ^ exploited the mass-mailing service Constant Contact (www.microsoft.com)
  18. ^ authentic-looking emails (www.cnn.com)
  19. ^ DarkSide (www.washingtonexaminer.com)
  20. ^ nearly half the gas and jet fuel (www.nytimes.com)
  21. ^ Panicked drivers (www.dw.com)
  22. ^ prices soared (www.wsj.com)
  23. ^ meat alternatives (www.wsj.com)
  24. ^ REvil infected beef and pork processer JBS USA (www.foxbusiness.com)
  25. ^ some responsibility (www.nbcnews.com)
  26. ^ off-limits critical infrastructure (www.nytimes.com)
  27. ^ tacit understanding (www.recordedfuture.com)
  28. ^ ransomware task force (www.politico.com)
  29. ^ offer rewards (www.darkreading.com)
  30. ^ the arrest (www.wsj.com)
  31. ^ Kaseya (www.toolbox.com)
  32. ^ seized $6.1 million (www.justice.gov)
  33. ^ paid in ransom (www.justice.gov)
  34. ^ disrupted the virtual currency exchanges SUEX (home.treasury.gov)
  35. ^ and Chatex (home.treasury.gov)
  36. ^ Al Drago/Pool via AP (newsroom.ap.org)
  37. ^ offensive action (www.cnet.com)
  38. ^ blocked the REvil website (www.washingtonpost.com)
  39. ^ ceased operations (www.toolbox.com)
  40. ^ conducts or condones cyberattacks (www.wsj.com)
  41. ^ break into technology companies (www.wsj.com)
  42. ^ routine spying (www.nytimes.com)
  43. ^ carried out a ransomwware attack (abcnews.go.com)
  44. ^ claimed that the cooperative did not count (arstechnica.com)
  45. ^ national cyber defense is an extremely challenging problem (theconversation.com)
  46. ^ Get The Conversation’s most important politics headlines, in our Politics Weekly newsletter (memberservices.theconversation.com)

Authors: Scott Jasper, Senior Lecturer in National Security Affairs, Naval Postgraduate School

Read more https://theconversation.com/how-the-biden-administration-is-making-gains-in-an-uphill-battle-against-russian-hackers-174199

Metropolitan republishes selected articles from The Conversation USA with permission

Visit The Conversation to see more