- Senator calls Facebook’s current election disinformation efforts ‘inadequate’ in letter 6 Years Ago
- The Phillie Phanatic mascot unveils a slimmer makeover 6 Years Ago
- YouTuber threatened with arrest after rapping about being a girl from Mecca 6 Years Ago
- Video shows flat-Earther ‘daredevil’ crashing to death after homemade rocket fails 6 Years Ago
- Cardi B defends Dwyane Wade’s daughter during Instagram Live 6 Years Ago
- YouTube briefly shuts down beloved ‘lofi hip hop radio’ channel, launching a new meme 6 Years Ago
- Neil deGrasse Tyson points out that Elsa from ‘Frozen’ has ‘horse-sized eyeballs’ Today 10:58 AM
- Republicans as Sanders rises: Watch out, we may vote for Trump Today 10:54 AM
- Amazon series ‘Hunters’ criticized by Auschwitz Memorial over fictionalized scene Today 10:45 AM
- Netflix’s ‘Gentefied’ is actually made for people of color Today 9:28 AM
- Drug dealer loses $60 million after misplacing his Bitcoin code Today 9:18 AM
- TSA bans employees from using TikTok Today 9:09 AM
- PewDiePie rips Jake Paul, calls his money-making venture ‘complete bullsh*t’ Today 9:05 AM
- Can a lawsuit in Illinois stop a dangerous new facial recognition app? Today 6:30 AM
- Fan uncovers ‘Westworld’ trailers hidden on fictional company’s website Sunday 8:18 PM
U.S. government hit by up to 200 cyberattacks every day
Don’t worry, they have a system to handle it.
Between 150 to 200 cyberattacks hit U.S. government agencies and departments using .gov every single day, Larry Zelvin, director of Homeland Security‘s cybersecurity division, told the House subcommittees on cybersecurity and counterterrorism Wednesday.
The numbers follow this week’s indictment against a group of alleged Chinese hackers charged with cyber-espionage against American companies. However, state-sponsored attackers are far from the only adversaries the American government is wary of. Politically motivated hackers and profit-motivated hackers routinely target .gov networks and have catalyzed immense inter-agency cooperation to fend off future attacks.
The intrusions are detected by the EINSTEIN program, a monitoring system designed to find unauthorized traffic on American government networks. EINSTEIN was designed by the U.S. Computer Emergency Readiness Team (US-CERT) in 2004 and has since received two major updates, to version 3 where it stands today.
When an incident occurs, the attacks are ranked from low to high. High threshold attacks occur when hackers enter database systems, access sensitive identifiable information, or otherwise cause a disruption or destruction event.
For high-level events, Homeland Security reaches out to victimized agencies and offers investigative assistance in partnership with the FBI. US-CERT then spreads news of the attacks across the government.
“Adversaries are going after any vulnerability they can find,” Zelvin told the panel. “It doesn’t matter what state you’re in, what critical infrastructure you’re in. If there’s an opening, there’s an adversary that’s going to see where they can go and what information they can steal.”
Screenshot via C-SPAN
Patrick Howell O'Neill is a notable cybersecurity reporter whose work has focused on the dark net, national security, and law enforcement. A former senior writer at the Daily Dot, O'Neill joined CyberScoop in October 2016. I am a cybersecurity journalist at CyberScoop. I cover the security industry, national security and law enforcement.