Russia Accused Of Hacking Hundreds Of Companies Worldwide

Russia Accused Of Hacking Hundreds Of Companies Worldwide

Russia Accused Of Hacking Hundreds Of Companies Worldwide

US Cyber Security firm CrowdStrike has accused Russia of hacking hundreds of companies worldwide. This is the first time Russia has been brought up in the hacking debate, sparking a new possible enemy in the espionage war. China has been well documented as one of the most prolific governments for hacking and espionage, after reports in 2013 pointed to a series of attacks on Google and several other cloud computing infrastructure companies working with the US.

It looks like Russia is taking some of China’s national pride and has started to hack and obtain information on various European, North American and Asian companies. The attacks seem to be an offensive to make sure their own national companies continue to gain market share worldwide.

Industry leaders in areas like manufacturing, construction, energy, defense and technology were targeted. Before CrowdStrike, no other company had come out and identified Russia as a threat, but the cyber-security firm is confident in its claims.

CrowdStrike has followed the movements of the Russian government for some time now, building their case named “Energetic Bear” for two years. Interestingly, CrowdStrike has declined to go into detail about the victims of the attacks, stating it would break confidentiality agreements.

As cyber security goes this is a really big opener, not only has China been active in the online battle, but Russia may have also been hacking and maliciously attacking hundreds of companies, to try and give their own the competitive advantage.

CrowdStrike works with partners to stop malicious attacks and sells software capable of blocking or at least fending off attacks. The company offers threat detection and activity monitoring services, making sure they spot attacks and can find out who is sending them.

We are still curious to see what the United States and other governments will say about these claims, especially if proven true. Russia has obviously been a big face for the past century, but in the last thirty years they have toned down their voice and consolidated the loss of Communism.

In the new digital age, we may see both China and Russia actively try and beat out other companies, to make sure their own succeed. Russia’s attacks do seem more nationally motivated, while China’s looked to be more about finding weak spots in the U.S. economy.

By Walter Bailey

(Image Source: Shutterstock)

Sorry, comments are closed for this post.

Using Private Cloud Architecture For Multi-Tier Applications

Using Private Cloud Architecture For Multi-Tier Applications

Cloud Architecture These days, Multi-Tier Applications are the norm. From SharePoint’s front-end/back-end configuration, to LAMP-based websites using multiple servers to handle different functions, a multitude of apps require public and private-facing components to work in tandem. Placing these apps in entirely public-facing platforms and networks simplifies the process, but at the cost of security vulnerabilities. Locating everything…

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

The 80-20 Rule For Security Practitioners  Everyday we learn about yet another egregious data security breach, exposure of customer data or misuse of data. It begs the question why in this 21st century, as a security industry we cannot seem to secure our most valuable data assets when technology has surpassed our expectations in other regards.…

Moving Your Email To The Cloud? Beware Of Unintentional Data Spoliation!

Moving Your Email To The Cloud? Beware Of Unintentional Data Spoliation!

Cloud Email Migration In today’s litigious society, preserving your company’s data is a must if you (and your legal team) want to avoid hefty fines for data spoliation. But what about when you move to the cloud? Of course, you’ve probably thought of this already. You’ll have a migration strategy in place and you’ll carefully…

The Fully Aware, Hybrid-Cloud Approach

The Fully Aware, Hybrid-Cloud Approach

Hybrid-Cloud Approach For over 20 years, organizations have been attempting to secure their networks and protect their data. However, have any of their efforts really improved security? Today we hear journalists and industry experts talk about the erosion of the perimeter. Some say it’s squishy, others say it’s spongy, and yet another claims it crunchy.…

Beacons Flopped, But They’re About to Flourish in the Future

Beacons Flopped, But They’re About to Flourish in the Future

Cloud Beacons Flying High When Apple debuted cloud beacons in 2013, analysts predicted 250 million devices capable of serving as iBeacons would be found in the wild within weeks. A few months later, estimates put the figure at just 64,000, with 15 percent confined to Apple stores. Beacons didn’t proliferate as expected, but a few…

What the Dyn DDoS Attacks Taught Us About Cloud-Only EFSS

What the Dyn DDoS Attacks Taught Us About Cloud-Only EFSS

DDoS Attacks October 21st, 2016 went into the annals of Internet history for the large scale Distributed Denial of Service (DDoS) attacks that made popular Internet properties like Twitter, SoundCloud, Spotify and Box inaccessible to many users in the US. The DDoS attack happened in three waves targeting DNS service provider Dyn, resulting in a total of about…

Don’t Be Intimidated By Data Governance

Don’t Be Intimidated By Data Governance

Data Governance Data governance, the understanding of the raw data of an organization is an area IT departments have historically viewed as a lose-lose proposition. Not doing anything means organizations run the risk of data loss, data breaches and data anarchy – no control, no oversight – the Wild West with IT is just hoping…

The Cancer Moonshot: Collaboration Is Key

The Cancer Moonshot: Collaboration Is Key

Cancer Moonshot In his final State of the Union address in January 2016, President Obama announced a new American “moonshot” effort: finding a cure for cancer. The term “moonshot” comes from one of America’s greatest achievements, the moon landing. If the scientific community can achieve that kind of feat, then surely it can rally around…

Cloud Security Risks: The Top 8 According To ENISA

Cloud Security Risks: The Top 8 According To ENISA

Cloud Security Risks Does cloud security risks ever bother you? It would be weird if it didn’t. Cloud computing has a lot of benefits, but also a lot of risks if done in the wrong way. So what are the most important risks? The European Network Information Security Agency did extensive research on that, and…