Uncovering the Complexity and Potential Future Trends of Cyber Threats Faced by the U.S.
America’s critical infrastructure, the Federal government, and commercial institutions are undoubtedly under attack. The sophisticated cyber threats facing the country emanate from various parts of the world. A wide selection of state actors and hacker groups are working tirelessly to paralyze critical infrastructure, steal sensitive information, and conduct cyber warfare.
These threats are also directed at individuals. Cybercriminals hack into computers, smartphones, and databases to steal social security numbers, credit card details, and login credentials.
In recent months, the U.S. has experienced a spate of ransomware attacks aimed at critical infrastructure, government agencies, and prominent companies. The targets include the Colonial Pipeline, municipal servers, and a meat-producing company, JBS. According to reports, attackers netted ransom money worth approximately $350 million in 2020 alone. Victims paid the ransom using digital currencies – mainly Bitcoin.
Ransomware attacks also affected healthcare centers, police departments, educational institutions, and the state government in 2020.
The United States witnessed a sharp rise in ransomware attacks following the Colonial Pipeline hacking. Cities and ferries took hits as bad actors intensified their illegal activities.
According to recent reports, hacker groups have been targeting federal networks for many years. More than three billion attacks occur in the United States annually. On the other hand, the cost of hardening the security of networks is significantly high. A Bloomberg study revealed that government agencies could block up to 95 percent of attacks by increasing cybersecurity budgets sevenfold.
Sources of Attacks
A report presented to Congress in 2011 showed that China and Russia employ hacking to steal sensitive technology and economic information. The report stated that these two countries adopted the strategy as part of their national policies. Information stolen from the United States helps Russia and China gain a competitive advantage. Both countries view the U.S. as a strategic competitor.
China boasts the most advanced cyber espionage and warfare capabilities. It leverages its extensive resources to launch aggressive cyberattacks on the United States and other countries. The Asian country hosts countless hacker groups and cyber warfare military units. These groups and units work tirelessly to deploy logic bombs in strategic U.S. targets.
Meanwhile, Russia takes advantage of its technological prowess to launch sophisticated attacks against specific targets. The country allegedly launched attacks against Estonia and Georgia’s government and banking websites.
The Colonial Pipeline incident triggered serious concerns about cybersecurity in the oil industry. It forced President Joe Biden to sign an executive order to harden cyber defenses of the nation’s businesses, government agencies, and critical infrastructure.
Congress approved a bill to invest $500 billion in local and state cybersecurity. However, various stakeholders still need to implement more changes before the crisis comes under control. Some experts recommend enforcing strict cybersecurity guidelines for privately owned critical infrastructure.
Approximately 85 percent of critical infrastructure in the United States is in private hands. The companies operate water systems, electric grids, and pipelines. A significant portion of the critical infrastructure is vulnerable to ransomware attacks and other cyber threats.
On the other hand, experts consider the ransomware problem as far from over. As such, private companies and the government need to invest heavily in robust measures to thwart future threats.
Law enforcement agencies face considerable challenges when it comes to stopping the spate of cyberattacks. Hacking groups and state actors employ highly sophisticated tactics from multiple locations worldwide. In some cases, governments help protect criminals from prosecution or extradition.
Limited consequences to cybercrime contribute to the rising cases. As a result, American law enforcers explore legal and diplomatic channels to arrest the bad actors. The attackers’ capabilities also present another challenge to intervention efforts by local authorities.
Criminals prefer ransom payments in cryptocurrencies due to anonymity benefits. Colonial Pipeline paid $4.4 million in Bitcoin to recover its systems. Although the FBI confiscated some of the Bitcoin, bad actors claimed some degree of success.
Many cyber criminals use hacking tool kits sold on the dark web. It is also ironic that the National Security Agency (NSA) developed some tools employed by hackers. The tools ended up in the wrong hands after a hacking group known as Shadow Brokers allegedly infiltrated another group run by the NSA.
Shadow Brokers released the tool that helped other cybercriminals unleash the WannaCry ransomware attack. More than 45,000 targets in 99 countries took hits in the attack. United Kingdom’s National Health Service (NHS) was one of the most prominent targets.
My passion is to make my mark on the world in a positive and lasting way. I want to set an example for my son that his father can compete with integrity in today’s world, be very successful, and leave the world a better place for him.
Combining my technical/business-based education with a long career steadily progressing up the corporate ladder, I decided to build a company that held true to my values. So, I founded and designed the next generation of IT support firm: CTECH Consulting Group Inc. We are a completely automated, cloud-based IT company designed to compete against any other IT firm without the overhead. We promote a lifestyle to all our staff where they can work anywhere, at any time, access any information on any device that is relevant to their job, and collaborate with anyone they want to.