0 $
2,500 $
5,000 $
500 $
AUGUST 2025 يوم متبقٍ

Washington Starts Playing “Cyber Trump Card” Against Russia

Support SouthFront

Washington Starts Playing "Cyber Trump Card" Against Russia

Illustrative Image

While the global hysteria on the alleged Russian invasion of Ukraine is proving unsustainable and resulted in a harsh mistrust to the U.S. government and the MSM claims, Washington still keeps a trick up its sleeve, reminding that Russian hackers are on their guard, threatening the U.S. and global security.

On February 16th, the FBI, the U.S. National Security Agency and the Cybersecurity and Infrastructure Security Agency issued a joint cybersecurity advisory, claiming that from at least January 2020, through February 2022, Russian state-sponsored cyber actors have targeted U.S. cleared defense contractors (CDCs) on a regular basis.

Russian hackers got information that provides “significant insight” into weapons development, communications infrastructure and IT. However, no detailed information was provided and exact cases were not included in the document.

For example, “during one notable transgression in 2021”, Russians allegedly exfiltrated hundreds of documents related to the company’s products, relationships with other countries, and internal personnel and legal matters.

The bulletin only included the description of some well-known tactics of cyber-attacks.

Washington continues to discredit all its efforts in cybersecurity, claiming that “historically, Russian state-sponsored cyber actors have used common but effective tactics to gain access to target networks”. With the same old tactics the hackers manage to compromise such entities as “CDCs supporting the U.S. Army, U.S. Air Force, U.S. Navy, U.S. Space Force, and DoD and Intelligence programs”.

“Historically, Russian state-sponsored cyber actors have used common but effective tactics to gain access to target networks, including spearphishing, credential harvesting, brute force/password spray techniques, and known vulnerability exploitation against accounts and networks with weak security. These actors take advantage of simple passwords, unpatched systems, and unsuspecting employees to gain initial access before moving laterally through the network to establish persistence and exfiltrate data.”

The bulletin is only one in a series of the recent accusations against Russia on the alleged cyberattacks.

On February 16th, Rob Joyce, the director of cybersecurity for the National Security Agency, claimed that Russian state-sponsored “cyber actors” have been “persistent in targeting U.S. cleared defense contractors to get at sensitive information.” And the onslaught is expected to continue.

Washington Starts Playing "Cyber Trump Card" Against Russia

Click to see full-size image

On February 15th, another cyberattack allegedly hit the websites of Ukrainian government agencies and major banks. According to Ukrainian authorities, at least 10 Ukrainian websites stopped working due to DDOS attacks, including those of the Defense Ministry, Foreign Ministry, Culture Ministry and Ukraine’s two largest state banks.

Assuring that there were no threat to depositors’ funds, Kiev suggested Russia could be behind the incident. Of course, no evidence or details were provided.

The accusations were supported by the U.S.

“While there are not currently any specific credible threats to the U.S. homeland, we are mindful of the potential for the Russian government to consider escalating its destabilizing actions in ways that may impact others outside of Ukraine,” said CISA, part of the Department of Homeland Security.

New wave of alleged cyberattacks comes a month after official websites of the ministries and government bodies of Ukraine were allegedly hacked. At that time, the MSM were less busy with spreading the Moscow’s plans to invade Ukraine, that’s why the attack on January 14th hit the headlines of the media worldwide. The incident was largely determined to be a false flag attack.

A part of Euro-Atlantic elites initially hoped that they would provoke an escalation in Eastern Europe through diplomatic and information hysteria. As this is not enough, they are apparently supposed to use accusations of another type of aggression as a backup option. Another false flag cyberattack is the best option.

MORE ON THE TOPIC:

Support SouthFront

SouthFront

Subscribe
Notify of
guest
9 Comments
Oldest
Newest Most Voted
Inline Feedbacks
View all comments
9
0
Would love your thoughts, please comment.x
()
x