Skip to content
Home » After Ukraine, Russian Cyberattacks Could Come To US: How To Defend Yourself

After Ukraine, Russian Cyberattacks Could Come To US: How To Defend Yourself

[ad_1]

NewYou can listen to the Gadget Clock article now!

In the wake of Russia’s invasion of Ukraine and ongoing cyberattacks, experts are warning of malicious cyber activity in the United States, and some American security professionals have spoken to Gadget Clock about how to protect against technological attacks.

Russia is unlikely to impose President Biden’s new sanctions and has proven to be highly skilled in cyber warfare, which has become part of active “kinetic” warfare in the 21st century.

“This is not something to be taken lightly – cyber attacks know no borders,” said Senator Mark R. Warner, chairman of the Senate Intelligence Committee. a tweet.

“I am particularly concerned about reports of cyberattacks…there are historic precedents that could be devastating to individuals, businesses and the country as a whole,” Warner said. Another tweet.

Ukrainian troops visit a site following a Russian airstrike in Kiev, Ukraine, Saturday, February 26, 2022.

Ukrainian troops visit a site following a Russian airstrike in Kiev, Ukraine, Saturday, February 26, 2022.
(AP Photo/Vadim Ghirda)

Russia invades Ukraine: live update

Russia already appears to be in the midst of a series of cyberattacks targeting Ukraine. Last week, cyberattacks affected the websites of various Ukrainian government agencies, including the Defense Ministry, according to Ukrainian officials. It follows cyberattacks on Ukrainian government sites and banks, which have been blamed on the Russian military intelligence agency GRU.

How to protect yourself from the “spillovers” of Russian cyberwar

As Sen Warner suggested, cyberattacks know no borders. As a result, the cyber spillover campaign could reach the United States

“With the Ukrainian conflict now at the center and poised to escalate, we expect a wave of cybersecurity attacks from Russian state-sponsored agencies,” Dan Ives of Wedbush Securities told Gadget Clock. in a written statement.

Here’s what to look for and tactics to make it easier.

Ransomware : InfoSec locks down critical data for professionals, ransomware attack companies, and individuals. The attackers then demanded large sums of money. “Businesses across the United States must be prepared for a variety of cybersecurity attacks, including ransomware,” said John Dixon, vice president of Colfire, a Westminster-based cybersecurity consulting service provider, Colorado.

“Ensure that all critical and internet-facing systems are fully patched to mitigate ransomware and data destruction,” Lou Steinberg, cyber expert and founder of CTM Insights, told Gadget Clock. “Use multi-factor authentication to log in to critical systems…and to prevent unauthorized changes (such as shutting off power or opening a valve on a dam),” Steinberg said.

Denial of service attack: Denial of service, which renders critical IT services unavailable, and ransomware attacks are often “outsourced,” according to Steinberg. “Instead of the government executing them directly, they are executed by groups who believe they are showing patriotism while protecting Russia’s interests. [that] It is in the interest of the government to allow them to do so. You can’t look back at the Kremlin,” Steinberg explained.

According to Steinberg, these outsourced actors may be “less capable” so companies can protect themselves if they take careful cybersecurity measures.

On Saturday, February 26, 2022, two vehicles caught fire on a road in Kiev, Ukraine, and Ukrainian troops took up position in front of a military installation.

On Saturday, February 26, 2022, two vehicles caught fire on a road in Kiev, Ukraine, and Ukrainian troops took up position in front of a military installation.
(AP Photo/Emilio Morenatti)

Ukraine-Russia war: Ukraine will receive an additional 350,350 million in US defense aid: Blinken

social engineer Countryside: Hank Schles, senior director, Security Solutions, Lookout, a California-based cloud endpoint security company based in San Francisco, says the attacks manipulate human behavior and “piggyback outside the news cycle.”

“Be especially careful about where you share data, who has access to it, and who you interact with online,” Schles said.

Password: Consumers should always use multi-factor authentication and avoid reusing the same password for all accounts/services, said Alex Ondrick, director of security operations at Georgia-based incident response agency Augusta, Breachquest, to Gadget Clock.

Ondrick said consumers can use sites like Habibenpod to see if they’ve been affected by security breaches. “Change passwords regularly, especially for email/social media accounts and for Wi-Fi and home routers,” says Ondrick.

Banking apps: “Consumers should be on the lookout for phishing and malware attacks, especially when accessing banking apps,” said Dan Ives of Wadebush Securities. Consumers should use anti-virus products as well as software that protects their identity, Ives added.

Software update: For individuals, it is important to follow cybersecurity best practices. This includes “installing recommended software and application updates, backing up their data, and being careful when clicking on links in emails, social media posts, and online articles,” said Jonathan K., a corporate attorney at Florida-based Gunster Law. said Osborne. Gadget clock.

FBI: The FBI has a Cyber ​​Threats website with advice and precautions for everything from messaging apps to phishing and ransomware.



[ad_2]

Leave a Reply

Your email address will not be published.