
Recent Russian cyber-attacks on public and private U.S. sectors have put cyber security into the forefront of American thought and public concern. While cyber-attacks are aimed hourly at countries, companies, and individuals, accusations of cyber-attacks between the United States and Russia have created a digital Cold War in a race to see who can exploit the most vulnerabilities in the infrastructure and supply chains of the opposing power.
While the United States government has consistently understood the harm cyber-attacks can present, the public is once again remembering how potent they can be. In just the span of a few months, massive hacking campaigns from various Russian or Russian speaking groups have resulted in strategic U.S. organizations and businesses being compromised. Such examples include the recent and infamous ransomware attack on the Colonial Pipeline by the group DarkSide
By seeing that a well-placed attack can cripple our essential national infrastructure, other foreign threat actors have been emboldened in increasing their attempts to exploit U.S. vulnerabilities. A recent Russian hacker group by the name APT28 has been using widespread and anonymous brute force attacks similar to the ones performed on Colonial Pipeline and JBS
Due to these and earlier attacks, the Biden administration has put cyberwarfare as a top priority given the national security concern it poses. The topic even overtook nuclear armaments as the U.S.’s primary concern the U.S. had
Although awareness is increasing, the United States finds itself in a difficult position in responding to these attacks. Unlike nuclear arsenals which are operated and maintained by states, cyber-attacks can come from a wide array of sources, including terrorist organizations, political activists, and criminal groups. This results in a lack of transparency between nations in cyberwarfare, where governments can easily place the blame of a crippling attack at the feet of any rogue cyber organization. President Putin did just that during his meeting with President Biden in Geneva, claiming there was no evidence
In addition to any external policy enacted against Russia, the United States could consider implementing a focus on a defensive strategy at a domestic level through improved standardization of cyber protection protocols for strategic U.S. businesses. Coming out of the wake of COVID, many employers and employees still work from home via computer yet are not familiar with digital communication safety etiquette. With more workers online, this could mean a bigger chance of an illicit actor, Russian or otherwise, intercepting sensitive data belonging to a vital U.S. business. It was, after all, assumed that an employee at Colonial Pipeline carelessly clicked on a phishing email which resulted in the attack.
The preference for mass text message among older employees presents the problem of SMS phishing, which is often harder for both receivers and security software to detect than phishing emails. A study by PhishLabs
The recent Russian hacking groups have shown that exploiting a simple backdoor or an employee’s careless click can result in widespread and disastrous consequences. By potentially working closer with critical U.S. businesses to ensure proper safety precautions are enacted, the Biden administration could decrease the chance of another shortage and avoid the panic and mayhem that would ensue. The United States can and should try to enact a wide variety of international legislation with Russia to prevent future cyber-attacks. Yet if the problem is not fixed at the domestic level, then the United States is leaving itself vulnerable for other foreign threat actors to cause mass devastation.