You Are Here: Home » Industry News » Cybercriminals used in State-Sponsored Attacks, says U.S. Cyber Command

Cybercriminals used in State-Sponsored Attacks, says U.S. Cyber Command

Hackers are believed to be working with foreign governments to take down U.S. infrastructure or break into U.S. computer systems, according to a Cyber Command statement to the members of Congress.

Cybercriminals used in State-Sponsored Attacks, says U.S. Cyber Command

Adm. Michael S. Rogers, head of U.S. Cyber command, believes criminals groups are being used to conduct cybercriminal activities against the United States on behalf of foreign governments, allowing state-sponsors to plead plausible deniability when confronted. While the Admiral did not point to specific countries, he did say Russian government hacking endeavors bear resemblance to cybercriminal practices.

“Russia has very capable cyber operators who can and do work with speed, precision and stealth,” said Adm. Michael S. Rogers. “Russia is also home to a substantial segment of the world’s most sophisticated cybercriminals, who have found victims all over the world.”

Amongst prime suspects, the U.S. Government has often mentioned China, Iran and North Korea as foreign governments that have been related to cybercriminal activities aimed at either at government institutions or U.S. citizens.

These statements were made before the House Armed Services Committee when requesting a new budget for the Cyber Command to fight against cybercriminal actions by Islamic cyberterrorists. With a budget of over $500 million approved for 2016, USCYBERCOM is expected to reach operational peak by fall 2018.

“USCYBERCOM is executing orders to make it more difficult for ISIL to plan or conduct attacks against the U.S. or our allies from their bases in Iraq and Syria to keep our service men and women safer,” the Admiral said. “We at USCYBERCOM are thinking more strategically about shifting our response planning from fighting a war to also providing decision makers with options to deter and forestall a conflict before it begins.”

About The Author

Security Researcher

Liviu Arsene is the proud owner of the secret to the fountain of never-ending energy. That’s what’s been helping him work his everything off as a passionate tech news editor for the past couple of years. He is the youngest and most restless member of the Bitdefender writer team and he covers mobile malware and security topics with fervor and a twist. His passions revolve around gadgets and technology, and he’s always ready to write about what’s hot and trendy out there in geek universe.

Number of Entries : 226

Comments (1)

  • Angel Healy

    While Big Data and IoT is getting bigger and taking a widespread reach, these attacks would surely be at arm’s length at all times. I’ve read about the plans of the government for cyber security this 2016, and part of it is to create a universal IoT security blanket. USCYBERCOM is only a bit of the whole plan. I wish everything well for this to push through.

    Reply

Leave a Comment

© 2012 Powered By Bitdefender

Scroll to top