20 minutes ago...

Biden orders probe of latest ransomware attack | Reuters

CENTRAL LAKE, Mich., July 3 (Reuters) - President Joe Biden said on Saturday he has directed U.S. intelligence agencies to investigate who was behind a sophisticated ransomware attack that hit hundreds of American businesses and led to suspicions of Russian gang involvement.

Security firm Huntress Labs said on Friday it believed the Russia-linked REvil ransomware gang was to blame for the latest ransomware outbreak. Last month, the FBI blamed the same group for paralyzing meat packer JBS SA .

Biden, on a visit to Michigan to promote his vaccination program, was asked about the hack while shopping for pies at a cherry orchard market.

Biden said "we're not certain" who is behind the attack. "The initial thinking was it was not the Russian government but we're not sure yet," he said.

Biden said he had directed U.S. intelligence agencies to investigate, and the United States will respond if they determine Russia is to blame.

During a summit in Geneva on June 16, Biden urged Russian President Vladimir Putin to crack down on cyber hackers emanating from Russia, and warned of consequences if such ransomware attacks continued to proliferate.

Biden said he would receive a briefing about the latest attack on Sunday.

"If it is either with the knowledge of and/or a consequence of Russia then I told Putin we will respond," Biden said, referring to what he told Putin in Geneva.

The hackers who struck on Friday hijacked widely used technology management software from a Miami-based supplier called Kaseya. They changed a Kaseya tool called VSA, used by companies that manage technology at smaller businesses. They then encrypted the files of those providers' customers simultaneously.

Huntress said it was tracking eight managed service providers that had been used to infect some 200 clients.

Kaseya said on its own website on Friday that it was investigating a "potential attack" on VSA, which is used by IT professionals to manage servers, desktops, network devices and printers.

"This is a colossal and devastating supply chain attack," Huntress senior security researcher John Hammond said in an email, referring to an increasingly high profile hacker technique of hijacking one piece of software to compromise hundreds or thousands of users at a time.

In a statement on Friday, the U.S. Cybersecurity and Infrastructure Security Agency said it was "taking action to understand and address the recent supply-chain ransomware attack" against Kaseya's VSA product.

Supply chain attacks have crept to the top of the cybersecurity agenda after the United States accused hackers of operating at the Russian government's direction and tampering with a network monitoring tool built by Texas software firm SolarWinds.

On Thursday, U.S. and British authorities said Russian spies accused of interfering in the 2016 U.S. presidential election have spent much of the past two years abusing virtual private networks (VPNs) to target hundreds of organizations worldwide.

On Friday, Russia's embassy in Washington denied that charge.

  • 01100011101001111100 [she/her]
    ·
    3 years ago

    All you have to do is pay your IT department decently, upgrade your equipment, and train any staff on common phishing etc. attacks. That's it.

    BuT WHaT abOUt mY pROfITS? Well, what about em? You making more money after a bunch of ransomware attacks?

    These business owners desperately want to offload cyber security to the federal government. Good luck, the feds cut budgets too - everybody everywhere is on a skeletal crew with no budget and ancient equipment. Maybe dip into your profit line. Or dont, I actually prefer you morons to keep getting owned by hackers.