Normal view

There are new articles available, click to refresh the page.
Before yesterdayMain stream

Putin warns US against deploying long-range missiles in Germany

28 July 2024 at 05:27

Russian leader says Washington risks triggering cold war-style missile crisis and promises to respond in kind

Vladimir Putin has warned the US that if Washington deploys long-range missiles in Germany from 2026, Russia will station similar missiles within striking distance of the west.

The US would start deploying long-range fire capabilities in Germany in 2026 in an effort to demonstrate its commitment to Nato and European defence, Washington and Germany said earlier this month.

Continue reading...

💾

© Photograph: Vyacheslav Prokofiev/SPUTNIK/KREMLIN POOL/EPA

💾

© Photograph: Vyacheslav Prokofiev/SPUTNIK/KREMLIN POOL/EPA

Should Ukraine join Nato?

27 July 2024 at 06:18

We don’t agree that Nato membership for Ukraine would provoke a conflict with Russia

On 8 July, the eve of Nato’s 75th anniversary summit, a Russian missile struck Ukraine’s largest children’s hospital, destroying, among other sections, its cancer center, hematology lab and surgical transplant unit. Russia launched 40 missiles at cities across Ukraine that day, killing more than 40 people, wounding numerous others, and demonstrating yet again that there are no legal, political or moral lines it won’t cross in its determination to conquer Ukraine.

As Ukrainian doctors, rescue workers and volunteers evacuated child patients, many of them still in hospital gowns and attached to IVs, from the bombed-out hospital, heads of state from Nato’s 32 member countries arrived in Washington DC to discuss Russia’s war in Ukraine and how to strengthen Ukraine’s defense. Although they affirmed that “Ukraine’s future is in Nato”, and that the country’s path to the alliance is “irreversible”, Ukraine’s potential membership was once again deferred: the Washington summit declaration stated that an invitation for Ukraine to join Nato would come “when Allies agree, and conditions are met”.

Continue reading...

💾

© Photograph: Yves Herman/Reuters

💾

© Photograph: Yves Herman/Reuters

Fresh from his international lap of honour, Starmer’s next role was Biden mourner-in-chief | John Crace

22 July 2024 at 13:49

If things don’t work out for the PM in No 10, he has a glorious alternative career ahead of him delivering heartfelt eulogies

Think of it as more a lap of honour. We’d all seen the pictures. A grateful world receives Keir Starmer at the Nato summit in Washington. A saviour in their midst. A week later European leaders bask in the summer heat at Blenheim. An early evening tryst with Emmanuel Macron on a bed of rose petals. All was for the best in the best of all possible worlds. More or less.

But needs must. Call it a formality. Call it a courtesy. Either way on Monday afternoon the prime minister was in the House of Commons to tell MPs all about how brilliant he had been at Nato and the European Political Community. How it had been very heaven to be alive in that moment. Cometh the hour, cometh the man. It was days like these that made the job all worthwhile. Shooting the breeze with the great and the good.

Continue reading...

💾

© Photograph: Stefan Rousseau/Reuters

💾

© Photograph: Stefan Rousseau/Reuters

Ignoring Russia’s fears about Nato expansion was a mistake | Letters

22 July 2024 at 11:43

Jonathan Gorse believes the Russian position is understandable, while Karen Miller says placating Putin will not work. Plus a letter from Dr Wolfgang Heinemann

Simon Jenkins, describing his horror at our new prime minister considering whether to allow Ukraine to use British missiles for strikes deep into Russia, is a rare voice of reason in a chorus of relentless escalation (It’s worrying to see the prime minister cheerleading for war. Will Ukraine turn into Starmer’s Iraq?, 15 July). Western leaders across the board seem to have forgotten the promises made to Mikhail Gorbachev more than 30 years ago, assuring him of our commitment to not extend the borders of Nato into the old Soviet bloc.

Since then, we have seen numerous former Soviet states join Nato, leaving Russia encircled to the west, with hostile missiles, troops, tanks and planes now pointing in its direction from its own backyard. Russian discomfort at this situation over the past 20 years has been ignored, and it is my belief that the invasion of Ukraine was entirely due to the fear that Ukraine too would be accepted into the Nato alliance.

Continue reading...

💾

© Photograph: Anadolu/Getty Images

💾

© Photograph: Anadolu/Getty Images

Spanish Police Arrests Three Suspects Linked to NoName057(16) Attacks

Spain NoName Arrest

Spanish Police arrested three individuals on July 20, 2024, who are suspected of participating in a series of cyberattacks targeting critical infrastructure and government institutions in Spain and other NATO countries. The detainees are believed to be affiliated with the hacktivist group NoName057(16), known for its pro-Russian ideology and launching DDoS attacks against entities supporting Ukraine in the ongoing conflict. The arrests come amidst heightened concerns about cyberwarfare as tensions escalate between Russia and the West. An article in Reuters quoted a statement by the Spanish Civil Guard which said that the attacks orchestrated by NoName057(16) specifically targeted public institutions and companies in strategic sectors within NATO countries that have offered aid to Ukraine.

Details of NoName Hackers’ Arrest

The operation, led by the Spanish Civil Guard, apprehended the suspects in Mallorca, Huelva, and Seville. Searches conducted at their residences yielded computer equipment and documents potentially linked to the cyberattacks. Notably, Spanish police released a video on its social media platform X of a raid at the home of one of the suspects in which a Soviet-era hammer and sickle flag was mounted on a wall, further hinting at their alleged pro-Russian affiliation. [caption id="attachment_82995" align="alignnone" width="762"]Spanish Police NoName Source: X[/caption] Investigations suggest that NoName057(16) primarily employs Distributed Denial-of-Service (DDoS) attacks. DDoS attacks aim to overwhelm websites or online services with a flood of junk traffic, rendering them inaccessible to legitimate users. While the specific impact of these attacks remains under investigation, they likely caused disruptions to targeted institutions and potentially hampered their operations. The group's manifesto, referenced by Spanish authorities, reportedly outlines their objective of retaliating against "hostile and openly anti-Russian actions by Western Russophobes."

Inglorious Past of NoName057(16)

NoName057(16) emerged shortly after Russia's invasion of Ukraine and has since been linked to cyberattacks against various NATO members, including Poland. In January 2024, NoName057(16) claimed responsibility for a wave of DDoS attacks targeting Swiss government websites on the eve of a summit aimed at facilitating peace talks between Russia and Ukraine. The targeted websites included those belonging to the federal government and organizations involved in the peace process. [caption id="attachment_82997" align="aligncenter" width="529"]Spain Arrest NoName One of the organizations targeted by NoName in Spain. (Source: X)[/caption] Polish cybersecurity firms have also documented a surge in cyberattacks originating from suspected pro-Russian actors. A recent report by Check Point Software Technologies revealed that Polish entities face an average of nearly 1,430 cyberattacks per week. The study further identified NoName057(16) as the most prolific pro-Russian group targeting Polish infrastructure, with past attacks directed at Polish Radio, Gdynia Port, and government websites. The arrests in Spain mark a significant development in efforts to counter cyberattacks potentially linked to the ongoing conflict in Ukraine. The investigation into the activities of NoName057(16) is ongoing, with Spanish authorities collaborating with a specialized prosecutor's office to uncover the full extent of the group's operations and identify additional individuals involved. The full extent of the damage caused by NoName057(16) remains under investigation. However, the disruption of essential services, even for a short period, can have significant consequences. Hospitals, power grids, and communication networks rely heavily on functioning IT infrastructure. DDoS attacks can disrupt healthcare services, hinder emergency response efforts, and cause economic losses. The use of a homemade DDoS program called DDoSia by NoName057(16) raises concerns about the potential for these attacks to become more accessible to non-state actors. Cybersecurity experts urge governments and businesses to invest in robust cybersecurity measures to defend against such threats. The Spanish authorities' crackdown on NoName057(16) is a positive development in the fight against cyberwarfare. However, it also serves as a stark reminder of the evolving nature of cyber threats and the need for continued vigilance in the face of a constantly adapting digital landscape. Media Disclaimer: This report is based on internal and external research obtained through various means. The information provided is for reference purposes only, and users bear full responsibility for their reliance on it. The Cyber Express assumes no liability for the accuracy or consequences of using this information.

​The cable hadn't malfunctioned; it had disappeared

By: chavenet
20 July 2024 at 03:42
The modern world turns out to rely greatly on unprotected bits of equipment in remote places. "We are talking about thousands and thousands of kilometers of infrastructure between Europe and the United States and Asia," says Katarzyna Zysk, a professor of international relations and contemporary history at the Norwegian Institute for Defence Studies in Oslo. "This is a network that is extremely hard to surveil, to monitor and to protect. This is infrastructure that is highly vulnerable to sabotage." from A Subsea Cable Went Missing. Was Russia to Blame? [Bloomberg; ungated]       

Undersea shenanigans, Previously

NATO to Bolster Cybersecurity Measures to Combat Threats for Alliance Countries

NATO-cybersecurity

NATO, the North Atlantic Treaty Organization, has identified that it faces a complex and ever evolving cyberthreat landscape. While its history is rooted in deterring conventional military attacks, cyberspace has emerged as its new battleground. The alliance organization says that malicious actors are constantly probing NATO's defenses, employing cyberattacks to disrupt operations, steal sensitive information, and sow discord. In response, NATO has undertaken a significant effort to bolster its cyber defenses, safeguarding its networks and the security of its member states.

NATO Identifies Russia, China as Source of Cyber Threats

NATO has identified Russia, China, and other malicious actors as major threats, employing a range of cyber tactics. These include infiltrating networks to steal classified data, launching denial-of-service attacks to cripple critical infrastructure, and manipulating information to undermine public trust. According to a news release by NATO, “Russia's war of aggression against Ukraine has highlighted the extent to which cyber activities are a feature of modern conflict.”

NATO's Comprehensive Approach to Cyber Defense

Recognizing the gravity of the situation, NATO has adopted a multi-pronged approach to cyber defense. This strategy integrates political, military, and technical measures to achieve a holistic defense posture.
  • Policy and Strategy: At the 2021 Summit, NATO introduced a Comprehensive Cyber Defence Policy. It emphasizes deterring, defending against, and countering cyber threats across all domains – peacetime, crisis, and conflict. The policy acknowledges that under specific circumstances, a large-scale cyberattack could be considered an armed attack, potentially triggering a collective response from member states under Article 5 of the NATO treaty.
  • Network Protection and Situational Awareness: The NATO Cyber Security Centre (NCSC) serves as the central hub for safeguarding NATO's own networks. It provides 24x7 protection and works tirelessly to keep pace with the ever-changing threat landscape. Additionally, the Cyberspace Operations Centre, established in Mons, Belgium in 2018, enhances situational awareness by monitoring cyber threats and coordinating NATO's operational activities in cyberspace. This center plays a critical role in ensuring that NATO commanders have a clear understanding of the cyber landscape and can make informed decisions to protect the Alliance. Now, in the 2024 NATO Summit in Washington, D.C., allies have agreed to establish the NATO Integrated Cyber Defence Centre to enhance network protection, situational awareness and the implementation of cyberspace as an operational domain.
  • Education, Training, and Exercises: NATO feels that building a skilled workforce is paramount. For this the organization conducts regular exercises like the annual Cyber Coalition Exercise to test and refine cyber defense capabilities. The Alliance also emphasizes education and training through initiatives like the NATO Cyber Range, fostering expertise among member states.
  • International Cooperation: The member organizations say that it actively engages with partner countries, international organizations, industry leaders, and academia. “Collaboration fosters information sharing, facilitates joint exercises, and promotes best practices for cyber defense. A key partnership is with the European Union, with both organizations working together to counter hybrid threats and bolster cyber resilience,” NATO said. [caption id="attachment_82456" align="alignnone" width="774"]Nato Cybersecurity Source: NATO Website[/caption]

Strengthening National Defenses: A Shared Responsibility

While NATO provides a collective framework, it emphasized that the primary responsibility for robust cyber defenses lies with individual member states. The NATO Defence Planning Process sets timely targets for national cyber defense capabilities, ensuring a standardized approach across the Alliance. NATO also facilitates information sharing, best practice exchanges, and offers assistance to Allies seeking to bolster their national defenses. Additionally, the newly established Virtual Cyber Incident Support Capability (VCISC) provides support to member states facing large-scale cyberattacks.

The Road Ahead: Continuous Improvement

The cyber threat landscape is constantly evolving, demanding continuous adaptation from NATO and its member states. Looking ahead, the organization has identified several critical key areas:
  • Enhancing Cyber Resilience: Critical infrastructure, such as power grids and communication networks, needs robust defenses against cyberattacks. This requires collaboration between governments, industry leaders, and the public to identify vulnerabilities and implement preventative measures.
  • Developing New Technologies: Staying ahead of the curve necessitates ongoing investment in research and development. NATO is actively exploring new technologies to enhance cyber detection, prevention, and response capabilities.
  • Promoting International Norms: Establishing clear international norms for responsible state behavior in cyberspace is crucial. This would help to deter malicious activities and foster a more stable digital environment.
By adopting a comprehensive approach that combines strong policy frameworks, cutting-edge technologies, and international cooperation, NATO is working to safeguard its member states from the ever-present threat of cyberattacks. As the digital age continues to evolve, so too will NATO's cyber defense capabilities, ensuring a secure and stable future for the Alliance.

NATO allies pledge $1 billion to promote sharing of space-based intel

12 July 2024 at 20:25
Heads of state pose for a group photo at an event Tuesday celebrating the 75th anniversary of NATO.

Enlarge / Heads of state pose for a group photo at an event Tuesday celebrating the 75th anniversary of NATO. (credit: Kevin Dietsch/Getty Images)

During their summit in Washington, DC, this week, NATO member states committed more than $1 billion to improve the sharing of intelligence from national and commercial reconnaissance satellites.

The agreement is a further step toward integrating space assets into NATO military commands. It follows the bloc's adoption of an official space policy in 2019, which recognized space as a fifth war-fighting domain alongside air, land, maritime, and cyberspace. The next step was the formation of the NATO Space Operations Center in 2020 to oversee space support for NATO military operations.

On June 25, NATO announced the establishment of a "space branch" in its Allied Command Transformation, which identifies trends and incorporates emerging capabilities into the alliance's security strategy.

Read 9 remaining paragraphs | Comments

Hacktivist Groups Target NATO Summit Amid Rising Tensions

Cyberattacks on the NATO

Hacktivist groups have intensified their efforts to launch cyberattacks on the NATO 75th Anniversary Summit in Washington, DC, taking place from July 9 to July 11, 2024. This international conference brings together leaders, military experts, and representatives from 32 member countries to address pressing geopolitical challenges and strengthen global security alliances. These hacktivist groups, known for their anti-NATO sentiments, have orchestrated a series of coordinated cyberattacks aimed at undermining NATO’s initiatives, particularly in relation to Ukraine. Their tactics include Distributed Denial of Service (DDoS) attacks on NATO websites, designed to disrupt operations and shape public opinion against Ukraine’s NATO integration.

Hacktivist Groups Launch Cyberattacks on the NATO 75th Anniversary Summit

The heightened cyber activity coincides with critical geopolitical maneuvers involving NATO member states. For instance, the Czech Republic and Denmark recently experienced cyber intrusions following announcements of increased military cooperation with Ukraine. According to the Cyble Research and Intelligence Labs (CRIL) report, leading the charge are prominent hacktivist collectives like People’s Cyber Army (APT44), NoName057(16), UserSec, and others, operating with a shared goal of challenging NATO’s influence and disrupting its operational capabilities. These groups have formed alliances across international borders, amplifying their collective impact and demonstrating a sophisticated approach to cyber warfare. In addition to DDoS attacks, recent weeks have seen a surge in data leaks targeting NATO’s sensitive information. Documents containing budget details, operational procedures, and member state information have been illicitly obtained and disseminated online, exposing NATO’s vulnerabilities to espionage and cyber espionage.

Mitigation and Prepares for Upcoming NATO Cyberattacks

The tactics of hacktivist groups, supported by international collaborations, highlight a growing cyber threat that NATO must mitigate with heightened vigilance. The alliance’s ability to fortify its cyber defenses and safeguard critical infrastructure will be crucial in mitigating future attacks and preserving global security. As the NATO Summit progresses amid these cyber challenges, cybersecurity experts stress the importance of proactive measures and collaborative efforts to defend against persistent threats. The ongoing conflict in Ukraine, coupled with geopolitical tensions with Russia and other adversaries, highlights the urgency for NATO to enhance its cybersecurity posture and protect its strategic interests. The alliance’s response to these cyber threats will not only shape its ability to maintain operational integrity but also serve as a demonstration of its commitment to collective defense and international security cooperation. In an era defined by technological advancements and geopolitical complexities, NATO’s resilience in the face of cyber warfare remains pivotal to its mission and global stability. The coordinated efforts of hacktivist groups targeting NATO highlight the need for continuous adaptation and innovation in cybersecurity strategies. By upgrading defenses and fostering greater international cooperation, NATO can effectively confront and mitigate cyber threats, safeguarding its mission and members against risks associated with hacktivist groups this year. 

NATO Faces Escalating Cyberthreats: From Espionage to Disinformation

NATO

As NATO leaders convene in Washington, D.C. for the organization's 75th Anniversary summit, a hidden war rages on – a relentless campaign of cyberattacks targeting the Alliance and its members.

This threat landscape is not merely a static backdrop, but a dynamic battlefield where adversaries employ a growing arsenal of tactics, from stealthy espionage to disruptive cyberattacks and disinformation campaigns, a report from Google-owned cybersecurity firm Mandiant said.

Espionage Actors Set Their Sights on Alliance Secrets

Nation-state actors like APT29 (ICECAP), attributed to Russia's SVR intelligence service, are notorious for targeting NATO members. These actors excel at compromising networks, often through social engineering or exploiting zero-day vulnerabilities, to steal sensitive political, diplomatic, and military intelligence. Their ability to operate undetected within compromised environments makes them particularly troublesome adversaries, Mandiant said.

China's cyber espionage efforts have also become more sophisticated, transitioning from loud operations to stealthier techniques. These actors exploit network edges and leverage complex infrastructure like operational relay box networks to mask their activities and hinder detection. Additionally, they increasingly rely on "living off the land" techniques, using legitimate system tools for malicious purposes, further complicating defenders' ability to identify intrusions.

Beyond Espionage: Disruptive and Destructive Attacks

Disruptive and destructive cyberattacks pose a direct threat to NATO's operational capabilities. Iranian and Russian actors have demonstrated a willingness to launch such attacks, often masking their involvement behind hacktivist groups. For instance, the destructive 2022 attack on Albania, initially attributed to "HomeLand Justice" hacktivists, was later linked to Iranian state actors. These incidents highlight the growing risk of attacks targeting critical infrastructure that could cripple essential services for NATO members.

Hacktivists and criminal actors further complicate the threat landscape. The global resurgence of hacktivism, fueled by geopolitical flashpoints like the Ukraine war, has resulted in a surge of attacks against NATO members. While these operations often lack sophistication and lasting impact, they can garner significant media attention and sow discord. Additionally, some hacktivist groups, like the pro-Russian Cyber Army Russia Reborn (CARR), are experimenting with more disruptive tactics, targeting critical infrastructure such as water supplies.

Financially motivated cybercrime, particularly ransomware attacks, pose a significant threat to critical infrastructure across NATO states. Healthcare institutions have become prime targets, disrupting patient care and highlighting the potential for widespread societal consequences. The ability of cybercriminals to operate with impunity from lax jurisdictions and the lucrative nature of ransomware attacks suggest this threat will only escalate.

Disinformation: A Weapon to Sow Discord

Information operations, encompassing social media manipulation and complex network intrusions, have become a hallmark of modern cyberwarfare. Russian and Belarusian actors have heavily targeted NATO with disinformation campaigns aimed at undermining Alliance unity and objectives. These efforts range from social media manipulation by "troll farms" to the coordinated leaking of stolen information.

In fact, on the same day as Mandiant released this report, the U.S. Department of Justice disrupted a Russia-run AI-enabled Twitter disinformation bot farm. Almost 1,000 accounts were seized. These bots masqueraded as Americans and promoted Russian government narratives.

Countering such campaigns requires collaboration between governments and the private sector, with tech giants like Google actively removing malicious content and disrupting information operations.

A Collective Defense is Paramount

A senior NATO official on Tuesday during the NATO Summit said Russia can sustain its war economy for 3-4 more years. "Ultimately, we all have to be prepared to continue to support Ukraine well beyond 2025. This is certainly something that we all understand very well," the official added.

The cyber threat landscape facing NATO is vast and ever-evolving. Unlike traditional warfare, cyberattacks can persist irrespective of broader geopolitical tensions. The war in Ukraine has undoubtedly emboldened reckless cyber activity against NATO allies, highlighting the need for a collective defense strategy. To effectively counter these threats, NATO must leverage the technological expertise of the private sector and foster strong partnerships with its member states. Only through a united front can the Alliance seize the initiative in cyberspace and secure its future.

❌
❌