A year ago, a DDoS attack caused internet outages around the US by targeting the internet-infrastructure company Dyn, which provides Domain Name System services to look up web servers. Monday saw a nationwide series of outages as well, but with a more pedestrian cause: a misconfiguration at Level 3, an internet backbone company—and enterprise ISP—that underpins other big networks. Network analysts say that the misconfiguration was a routing issue that created a ripple effect, causing problems for companies like Comcast, Spectrum, Verizon, Cox, and RCN across the country.
Many know the name Kaspersky well. Others may only dimly recognize the brand name. Its anti-virus and Internet security software has been around for years in computer stores and OEM’d with computer systems. More than a year ago, I became concerned about what I was learning about Kaspersky Lab and its headquarters in Moscow, I began asking myself hypothetical rhetorical questions. What if Kaspersky was quietly working with the Russian FSB? What if Kaspersky had installed a sleeping Trojan Horse in millions of copies of its consumer computer security software? I was a user of Kaspersky Lab cybersecurity software myself. I knew that it was rated very highly by the tech journals. I liked its elegance and simplicity compared with other competitor products from U.S. based companies like Symantec and McAffee. Nevertheless, as the Russian hacking of the 2016 election became an ever-larger issue, I decided to pull the plug on Kaspersky because of my fears, though there was no direct evidence of collusion between Kaspersky and the Kremlin at that time, wiped my system clean, and installed another competitor product.
the New York Times published a Breaking News Alert on a story written by three of the best NYT investigative journalists. The four page detailed article, “Chinese Army Unit Is Seen as Tied to Hacking Against U.S.,” provides extraordinary detailed evidence. The breadth and depth of the cyber attacks on the United States go back as far as 2006, and the article describes attacks on numerous industries and hundreds of U.S. companies. Most concerning, there is now compelling evidence of near-miss attacks seeking means to disable our critical infrastructure. There has been much talk about our vulnerability, but until this NYT article nothing has so explicitly exposed our risk to cyber attack from the Chinese military. For me, one of the more interesting details was that the source of the attacks was a PLA building in Shanghai.