Search
Contactez-nous Suivez-nous sur Twitter En francais English Language
 

De la Théorie à la pratique











Freely subscribe to our NEWSLETTER

Newsletter FR

Newsletter EN

Vulnérabilités

Unsubscribe

Comments on Russia being held accountable for SolarWinds

April 2021 by Experts

Following the White House announcement which has held Russia accountable for the SolarWinds breach – below are some comments from security experts on the topic:

Joseph Carson, chief security scientist at Thycotic:

“For me this is not a surprise though lack of clear attribution is always vague in such news, so I believe the more we learn about the attribution the more concrete accountability and action can be taken. The good news in the statement fact sheet is the part where the US government support a Global Cybersecurity Approach - no single country alone can win against cybercrime and cyberattacks.

A collaborative approach is the only way to tackle cybercrime where countries work together with transparency, holding those countries whom provide safe havens for cyber terrorism accountable with strong actions will be the only way to reduce future cyberattacks.”

Tony Cole, CTO at Attivo Networks:

"The new US Administration took action on Russia today via a White House (WH) Executive Order (EO) punishing them for their nefarious actions in cyberspace and their occupation of Crimea. Sanctions were put in place on specific entities and individuals along with expelling a number of Russian diplomats in Washington DC. One of the more interesting notes from the EO was the specific calling out of the Russian Foreign Intelligence Service as the perpetrator of the SolarWinds supply chain breach with a high confidence level. That level of confidence in attribution from the WH is notable since it hasn’t happened as frequently as the cyber defender community would like to see. In relation to the same EO, the US FBI today also released actions for defenders to take to protect themselves from ongoing Russian activity in cyberspace impacting vulnerabilities in a number of products.

The impact from all the actions taken by the US government? It’s undetermined at this point in time. Although the actions today are badly needed by the US and its allies to hopefully counter Russian aggression, many past efforts, sanctions, and plans, have had little impact. Actions by Russian and Chinese state based actors or their proxies (and other nations) have been taking place for many years and efforts in the past to counter them have stuttered, stalled, or just completely failed. A close-knit global effort is required to have an impact on these government actors and entities to stop their IP theft, meddling in elections, and compromising critical infrastructure.

It’s readily apparent that many nations simply do not have the stomach to stand up to these attacking nations for a number of reasons including their own reliance on them for fossil fuels, technology, and other resources. Unless we are willing to make them an island via isolation, these types of actions will likely continue. The effort from the US government should be applauded for calling them out, however the impact may end up being minimal.”




See previous articles

    

See next articles