Government Tries to Play Catch-Up Against Fast-Moving Cyberattacks
WASHINGTON — Congress took a stab Thursday at improving the nation’s cybersecurity as the federal government mobilizes more resources against ransomware and hackers.
Both President Joe Biden and members of a House Homeland Security subcommittee described threats to U.S. computer systems as a potentially devastating economic risk.
“The number of high-profile cyber incidents over the past year has emphasized just how essential cybersecurity has become,” said Yvette Clarke, D-N.Y., chairwoman of the cybersecurity, infrastructure protection and innovation subcommittee.
Her subcommittee held its hearing on recruiting more cybersecurity personnel one day after Biden signed a national security memorandum that seeks to protect critical infrastructure.
It orders the Departments of Homeland Security and Commerce to develop “cybersecurity performance goals for critical infrastructure.” It also establishes an industrial cybersecurity control system.
Even as the president announced the initiatives, Biden administration officials acknowledged they were voluntary, potentially leaving security gaps that could be exploited by hackers.
A recent report by the cybersecurity firm Sonicwall found that ransomware attacks in North America increased 158% between 2019 and 2020.
Another recent report by the computer security firm Comparitech said cyberattacks against U.S. government organizations affected 71 million Americans and cost more than $18 billion in downtime and recovery.
Examples discussed at the congressional hearing included the SolarWinds and Colonial Pipeline cyberattacks.
SolarWinds was a Russian cyber spying attack against 18,000 computer networks operated by the U.S. and foreign governments as well as public policy foundations.* It exposed sensitive information that government officials are still trying to track down.
The Colonial Pipeline attack was a ransomware demand in May by Russian-based thieves against an oil pipeline system that originates in Houston and carries gasoline and jet fuel mainly to the Southeastern United States. It shut down computerized equipment managing the pipeline for six days until company officials paid a $4.4 million ransom in Bitcoin.
Clarke cited a report saying the United States fell short of its need for a skilled cybersecurity workforce to counter the attacks by about 460,000 personnel.
“We will need a multi-pronged approach that focuses on training the cybersecurity workforce of the future in schools and universities, re-skilling existing workers for the jobs that are currently available and making sure we have the right training in place” for a variety of challenges, she said.
Several bills are proposed in Congress that would increase federal funding for cybersecurity education and training.
“Quite simply, we will continue shouting into the wind until we fix these issues,” said Rep. Andrew Garbarino, R-N.Y.
Much of the discussion among witnesses at the congressional hearing was directed at the best strategy for achieving the workforce lawmakers want.
Tony Coulson, a professor of cybersecurity for California State University at San Bernardino, suggested wider use of apprenticeships by government agencies.
“I think the apprenticeship model has been incredibly underused,” he said.
The training would not require four-year college degrees but shorter, more-targeted educational programs like the ones offered at community colleges.
“I think community colleges in general are really an economic engine,” he said.
Max Stier, president of government workforce development organization Partnership for Public Service, said increased federal spending would be vital.
“We need to get more young people in government” handling cybersecurity, he said.
He recommended the U.S. government act promptly amid increasing threats of cyberattacks.
“By the time you get where you think you need to be, you’re already behind the curve,” he said.
Another breach of cybersecurity was revealed Thursday by Comparitech.
“A mysterious marketing database containing the personal details of an estimated 35 million people was exposed on the web without a password,” the security firm said on its website. “The database included names, contact information, home addresses, ethnicities and a wealth of demographic information ranging from hobbies and interests to shopping habits and media consumption.”
* According to the Cybersecurity and Infrastructure Security Agency, of the 18,000 customers that downloaded an affected version of the SolarWinds Orion software "a much smaller number have been compromised by follow-on activity on their systems."
In The News
WASHINGTON — The U.S. is at risk of creating a two-silo cybersecurity strategy impeding its ability to adequately address ever-evolving... Read More
WASHINGTON — The U.S. is at risk of creating a two-silo cybersecurity strategy impeding its ability to adequately address ever-evolving cyber threats from bad actors overseas, a former assistant secretary of defense said Friday. Speaking at an American Enterprise Institute event, Paul Stockton, who is now... Read More
GEORGETOWN, Del. — Shareholders are suing software provider SolarWinds Corp. in the Delaware Court of Chancery claiming the company directors... Read More
GEORGETOWN, Del. — Shareholders are suing software provider SolarWinds Corp. in the Delaware Court of Chancery claiming the company directors should have known of, and yet did nothing to mitigate, the risk of the massive data breach that took place in 2020. The plaintiffs, led by... Read More
WASHINGTON — While toy makers warn Christmas shoppers to beware counterfeit or stolen toys in online purchases, a Senate panel... Read More
WASHINGTON — While toy makers warn Christmas shoppers to beware counterfeit or stolen toys in online purchases, a Senate panel on Tuesday examined options for stopping them. The Senate Judiciary Committee also heard about how knockoff online sales are moving from small-time illegal enterprises to organized... Read More
WASHINGTON — Large-scale cyberattacks continued this week in the United States and abroad as computer security experts told a congressional... Read More
WASHINGTON — Large-scale cyberattacks continued this week in the United States and abroad as computer security experts told a congressional panel Tuesday that more government intervention is needed. On Monday, Microsoft announced that Russia-backed hackers were trying to steal information technology to disrupt the global supply... Read More
WASHINGTON — Microsoft announced Monday that the same hackers who tapped into U.S. government computers in the 2020 SolarWinds cyberattack... Read More
WASHINGTON — Microsoft announced Monday that the same hackers who tapped into U.S. government computers in the 2020 SolarWinds cyberattack continue to attack the global supply chain but with a slightly revamped strategy. This time, the Russia-backed group Microsoft calls Nobelium is piggybacking onto the software... Read More
WASHINGTON — The Department of Commerce’s Bureau of Industry and Security announced on Wednesday it would institute new export controls... Read More
WASHINGTON — The Department of Commerce’s Bureau of Industry and Security announced on Wednesday it would institute new export controls over cybersecurity items such as cyber intrusion software that can be used maliciously. The department’s new policy also creates a new license exception for authorized cybersecurity... Read More