Russian Cyber Attacks Targets and Purpose

Russian Cyber Attacks Targets and Purpose

Russian hackers are causing world wide problems.

Russian Cyber Attacks Targets and Purpose

By Joseph Wales and D. S. Mitchell


A Consistent Threat

Headlines linking Russia to a web of cyber attacks against a variety of sovereign nations has become daily bread for decision-makers and the public alike. Whether it’s the NotPetya attack, the recent shut down of the Colonial Pipeline, or meddling in foreign elections; Russia is a consistent and aggravating threat. Russia uses cyber operations alongside non-military and military methods to pursue its strategic goals. It views this as an ongoing information confrontation.

Back in Time

Russia began attacks on the United States in 1996 with the Moonlight Maze attack. The Moonlight Maze resulted in the theft of a massive amount of classified information from several U.S. government agencies. Those effected included NASA, the Department of Energy, the Defense Department, and numerous private sector entities and defense contractors. The attack caused a serious breach, compromising national security interests, strategies, and capabilities.

Ukraine Intimidation

Russian state-sponsored attacks are on the rise, most famously Russian cyber ninjas are behind the recent mischief in Ukraine. Several cyber events have  knocked out major government websites this month. This cyber-intrusion is aimed to intimidate society and destabilize the situation in the country, stopping the work in the public sector, and crushing citizens trust in the governing authorities.

What It Includes

Russia’s cyber warfare units employ hacker attacks, internet surveillance SORM technology, dissemination of  propaganda and misinformation, political trolling, and all means of social media manipulation. Most of these attacks, although not technically in house operations,  are still coordinated by the Russian FSB. The FSB replaced the notorious KGB, but a change in initials doesn’t change the mission.

How Many From Russia?

Over the past year, 58% of all cyber-attacks observed by Microsoft from nation-states came from Russia. Moreover, these attacks are increasingly effective, jumping from a 21% rate in 2020, to a 32% successful compromise rate in 2021. Russian nation-state attacks are increasingly targeting government agencies for intelligence gathering, which saw a hike from 3% to 53% in a year—these attacks target agencies involved in national security, defense, and foreign policy. The top three nations targeted by Russian cyber attacks were Ukraine, UK, and the United States.

Common Causes For Cyber Attacks

Most often, cyber-attacks occur because the attackers want something:

  • IT infrastructure
  • Clients’ lists
  • Customer database
  • Customers or staff’ email addresses and login details
  • Sensitive personal data
  • Customers’ financial details such as credit card data
  • Business’ financial details

Russian Motives

Putin’s motivation is different.  Putin life goal is to restore the territory lost with the collapse of the former Soviet Union. The Russian president views cyber-attacks as a natural extension for achieving his goals. For instance, how the Russian military hacked Olympic enemies for revenge, and how it hacked the Democratic National Committee to bolster Trump’s chances in the 2016 U.S. presidential election. Russians are mainly interested in influence operations without physical manipulation.

Classic Influence Operation

What we saw in the 2016 U. S. elections was a classic influence operation. This was also Putin’s aim when hacking Russia’s perceived Olympic enemies. Russia wanted information it could use against these enemies in social media campaigns. Manipulation of the news, creating new mind sets, instigating social rifts.

China, A Different Animal

On the other hand, China has also been actively involved in passive cyber-attacks. However, in the case of China, their main focus seems to center on economic, technology both military and civilian. They are going after intellectual property and stealing it to improve their advantage in world trade. For instance, they infiltrated and copied the plans of the fighter jets F-35 and F-22. The Chinese now have the largest navy in the world, thanks to learning many western secrets. The issues of Hong Kong and Taiwan are just below the surface.

Any Cut Back Coming?

Evelyn Farkas, a former defense official for Obama, argued that the Russian government would not be stopping state-sponsored cyber-attacks against America or any other nation, unless the consequences  were so painful that continuation of such behavior would be unthinkable. Despite President Biden’s meeting with Putin recently, the Russians seem immovable, denying responsibility for their ongoing computer attacks. During their meeting, Biden argued that some crucial infrastructures such as energy and water systems should be off-limits to any type of attack. Unfortunately, I don’t think there is enough mettle in the whole of the U.S. government to go after Putin and/or Xi Jinping with a cyber sledge hammer. Unless Putin and his cyber ninja forces are caused real pain, the attacks will continue.


Fears Of The Metaverse Are Justified

OPINION: Fears Of The Metaverse Are Justified

A metaverse is a network of 3 D virtual worlds focused on social connection.

OPINION: Fears Of The Metaverse Are Justified

Editor: The world of the future may be at hand. Like other new technologies the potential is great, the threat terrifying. The development of the metaverse should put us all on high alert for the nearly inevitable privacy abuses, misinformation campaigns,  and unprecedented targeting.

By Joseph Wales

A New Name

In late 2021, Mark Zuckerberg introduced Meta as the parent company to Instagram and Facebook. This move left many of us in the dark; not understanding what Meta is and the future direction of the company. Since the announcement it has emerged that the main idea behind Meta is developing a 100% virtual world with AI (Artificial Intelligence) and VR (Virtual Reality) enhancements. A world where our interactions will be more digital than physical. The technology growth rate is at an all-time high. Most believe that the tech gurus have more power than they deserve and legal restrictions are necessary. Before we go into the nitty-gritty details, let’s look at what metaverse is.

What Is The Metaverse?

As mentioned above, think of the metaverse as a virtual universe. The metaverse combines numerous technologies, including Augmented Reality (AR), Virtual Reality (VR), and eye-tracking. These technologies combine to create the ultimate virtual experience. Now might be a good time to read or watch “Ready Player One.” It is a story set in 2045, where all people turn to VR to escape the real world. The feature could help you get a rough idea of how a metaverse might look.

What Is Inside The Metaverse?

The metaverse is usually digital assets, 3D avatars, games, and businesses. Each metaverse can have their virtual economy. There are endless activities to engage in while in the metaverse. You could meet friends, join virtual events, host business meetings, monetize your creations, and so on. The metaverse closely resembles the real world. Most have their own economies and accept virtual currency. For instance, Cryptoxles, a metaverse, accepts ETH, while Decentraland uses their original currency, MANA. The only significant difference is that you can travel the world, go to the store, climb Mt. Everest, all from your home’s comfort. Access to the metaverse is via an VR headset.

Continue reading

Cryptocurrency: A Quick Guide

Cryptocurrency: A Quick Guide

'Crypto' is any form of digital or virtual currency that uses cryptography to secure transactions.

Cryptocurrency: A Quick Guide

Quite simply, cryptocurrency is digital money. It does not exist in the real world. There are no physical coins, or bills associated with it. It is not like stocks, real estate, jewelry, art, gold, and other valued metals. Cryptocurrency has no use or value other than the possession of it.  Cryptocurrencies are not associated to valuable assets — they are not tied to anything of value in the real world, and this often causes the ‘value’ to fluctuate erratically. 

By Mahinroop PM

‘Crypto’ Defined

Cryptocurrency or ‘crypto’ is any form of digital or virtual currency that uses cryptography to secure transactions and advanced coding to store and transmit cryptocurrency data between wallets and public ledgers. Cryptocurrencies do not have a central regulatory authority and they use a decentralized system to record transactions. Cryptocurrency is a digital payment system that does not rely on banks to verify transactions. Cryptocurrency is a peer-to-peer system which enables anyone to send and receive payments anywhere in the world.  The cryptocurrency payments exist as digital entries to an online database featuring specific transactions. The transactions are recorded in a public ledger when cryptocurrency funds are transferred and cryptocurrency is stored in digital wallets.

Bitcoin Emerges

The ultimate aim of cryptocurrency encryption is to provide privacy, security and safety. Bitcoin, was founded in 2009, and was the first cryptocurrency. Bitcoin is unquestionably the best known cryptocurrency and is traded like other entities for profit. Skyrocketing prices make cryptocurrency hugely popular among speculative and passionate investors. Other clever and passionate crypto investors use ‘mining’ to make money.

Continue reading

Reading The Fine Print Before You Sign

Reading The Fine Print Before You Sign


17 Phrases To Understand Before You Sign

By D. S. Mitchell

Red Flags

Most consumer contracts and service agreements contain a lot of legaleeze. Best selling author Bob Sullivan warns consumers to read the fine print. Red flags should go up when you see any of the following common phrases in a contract you are about to sign.

1.)Free”  We all know nothing is free. You have probably heard the expression, “if you aren’t paying for the product-then you are the product.” The meaning of course is that your personal information is probably being sold to advertisers. OR, maybe it is free now, but you may be committing to pay later. WHICH, takes us to:

2.) “Free Trial”  You often see phrases like this one, “Free 30 day trial.” (We won’t charge your card until the end of the trial period.) Do you really expect to remember to cancel on the 29th day?  Corporations have spent millions of dollars to learn that the average consumer will not cancel before the end of the 30 day period.  

3.) “Reduced Price for Six Months” This one falls in the same category as ‘introductory price offer’ and ‘free trial’ scam.  $59.00 a month for six months may sound great in January, but if it is going up to $150.00 in June is it actually a good deal? You are the only one that can decide that. And again, will you remember to cancel before July 1st if you decide that the high monthly price after the six month period isn’t worth it?

Continue reading

Care of Personal Information

Keeping private information private. Knowing when and what to shred.

Care Of Personal Information

D. S. Mitchell

Old Magazines

I was in my home office going through old magazines trying to decide what to send to the recycler and what to keep for later reference when I flipped through a February 2016 Reader’s Digest article that offered information on shredding. Most importantly they described when and what to shred.  It seems our greatest danger is through ‘mass hackings’ of our credit information. No matter how cautious we are our greatest danger is as victims of other people’s carelessness, or bad intent.  But, every bit of protection we can develop should help keep our private information private. Kelsey Kloss article suggested the following things, we as individuals can do to protect ourselves.

Take Special Precautions with:
  1. Receipts: If you aren’t saving the receipt for taxes or other purposes and you made your purchase with a credit or debit card shred it. The receipt shows the last 4 digits of the card number and possibly your signature. Those clever crooks can use receipts for fraudulent returns and benefit from your store credit.
  2. Prescription Labels: Sometimes they are stapled to the prescription bag or on the bottle. Labels frequently list your name, date of dispensing, name and strength of the drug and dispensing pharmacy.  Crooks can use the information to refill prescriptions or steal your identity.
  3. Pet Medical Documents: Keep records of major events for the pets health history, but shred the rest.  The paperwork will show your name, address, phone and the pet’s name, which according to many studies to be the most common computer password choices.
  4. Airline Boarding Passes: Shred after landing. The boarding pass will show your name, your itinerary, and a bar code that in some cases will show your frequent flier number, which would allow thieves to “log in to airline accounts to view upcoming travel plans, check in to flights, and even cancel trips.”
  5. Return Labels: Shred free return labels that come in the mail and any envelopes showing your name and address. When writing a return address on an envelope omit your name. Identity thieves will use that information to collect more information from social media and piece together your identity.

Remember, any little thing we can do to help keep our private information private should be considered important. Do it, you’ll be glad you did.