{"id":39928,"date":"2021-07-30T18:03:29","date_gmt":"2021-07-30T18:03:29","guid":{"rendered":"https:\/\/www.vmengine.net\/2021\/07\/30\/when-cyber-security-becomes-a-state-affair\/"},"modified":"2025-05-23T17:32:02","modified_gmt":"2025-05-23T17:32:02","slug":"when-cyber-security-becomes-a-state-affair","status":"publish","type":"post","link":"http:\/\/temp_new.vmenginelab.com\/en\/2021\/07\/30\/when-cyber-security-becomes-a-state-affair\/","title":{"rendered":"When cyber security becomes a &#8220;state affair&#8221;"},"content":{"rendered":"<div class=\"et_pb_section et_pb_section_311 et_section_regular\" >\n<div class=\"et_pb_row et_pb_row_409\">\n<div class=\"et_pb_column et_pb_column_4_4 et_pb_column_415  et_pb_css_mix_blend_mode_passthrough et-last-child\">\n<div class=\"et_pb_module et_pb_text et_pb_text_1182  et_pb_text_align_left et_pb_bg_layout_light\">\n<div class=\"et_pb_text_inner\">\n<p>Cyber security is a topic that is increasingly at the center of public debate. Even the world&#8217;s leaders have taken an interest in the issue. The President of the United States of America <strong>Joe Biden<\/strong> and Russian President <strong>Vladimir Putin<\/strong> were the protagonists of a long phone call, which lasted about an hour, during which they talked about<strong>cyber attacks<\/strong>.<\/p>\n<\/div><\/div>\n<div class=\"et_pb_module et_pb_text et_pb_text_1183  et_pb_text_align_left et_pb_bg_layout_light\">\n<div class=\"et_pb_text_inner\">\n<p>A cordial and relaxed conversation. &#8220;<em>I made it clear to them<\/em> ,&#8221; Biden explained <em>, &#8220;that when a <strong>ransomware<\/strong> operation is triggered from their soil, even if it is not sponsored by the country, we expect them to intervene, if we provide them with information about the perpetrators<\/em>.&#8221; Then the number one in the White House continued: &#8220;<em>The United States is ready for any action necessary to defend the people and crucial infrastructure<\/em>.&#8221;<\/p>\n<\/div><\/div>\n<div class=\"et_pb_module et_pb_cta_201 et_pb_promo  et_pb_text_align_center et_pb_bg_layout_light\">\n<div class=\"et_pb_promo_description et_multi_view_hidden\"><\/div>\n<div class=\"et_pb_button_wrapper\"><a class=\"et_pb_button et_pb_promo_button\" href=\"https:\/\/temp_new.vmenginelab.com\/en\/2019\/12\/16\/ransomware-and-smbs-how-much-does-downtime-cost\/\" target=\"_blank\">Ransomware attacks, how much do they cost SMEs?  <\/a><\/div>\n<\/p><\/div>\n<div class=\"et_pb_module et_pb_image et_pb_image_328 et_animated et-waypoint\">\n<p>\t\t\t\t<span class=\"et_pb_image_wrap \"><img decoding=\"async\" src=\"http:\/\/temp_new.vmenginelab.com\/wp-content\/uploads\/2021\/07\/ransomware-1.jpg\" alt=\"\" title=\"Ransomware\"  sizes=\"(max-width: 720px) 100vw, 720px\" class=\"wp-image-33835\" \/><\/span>\n\t\t\t<\/div>\n<div class=\"et_pb_module et_pb_cta_202 et_pb_promo  et_pb_text_align_center et_pb_bg_layout_light\">\n<div class=\"et_pb_promo_description et_multi_view_hidden\"><\/div>\n<div class=\"et_pb_button_wrapper\"><a class=\"et_pb_button et_pb_promo_button\" href=\"https:\/\/temp_new.vmenginelab.com\/en\/2021\/05\/24\/disaster-recovery-how-much-is-a-contingency-plan-worth\/\" target=\"_blank\">Learn more about the Disaster Recovery Plan<\/a><\/div>\n<\/p><\/div>\n<div class=\"et_pb_module et_pb_text et_pb_text_1184  et_pb_text_align_left et_pb_bg_layout_light\">\n<div class=\"et_pb_text_inner\">\n<p>But what is the crux of the matter? Just a few weeks ago, a <strong>hacker attack<\/strong> <strong>on the Florida software company Kaseya<\/strong> infected <strong>40,000 computers<\/strong> , affecting about 1,000 of their customers. Sweden&#8217;s largest supermarket chain was also among the victims, forced to close about 800 stores.<\/p>\n<\/div><\/div>\n<div class=\"et_pb_module et_pb_text et_pb_text_1185  et_pb_text_align_left et_pb_bg_layout_light\">\n<div class=\"et_pb_text_inner\">\n<p>According to the assumptions of some IT experts, the cyber attack would be caused by the group known as &#8220;<strong>REvil<\/strong>&#8220;, protagonist a month ago of a big hit, with the <strong>extortion of 11 million dollars<\/strong> from the meat producer<a href=\"https:\/\/jbs.com.br\/\"><strong> JBS SA.<\/strong><\/p>\n<p><\/a> A technique, the one used by hackers, very similar to extortion: <strong>Ransomware<\/strong>. It is a <strong>computer virus<\/strong> that makes the files of infected computers inaccessible and they demand a <strong>ransom<\/strong> payment to restore them.<\/p>\n<\/div><\/div>\n<div class=\"et_pb_module et_pb_text et_pb_text_1186  et_pb_text_align_left et_pb_bg_layout_light\">\n<div class=\"et_pb_text_inner\">\n<p><strong> Joe Biden<\/strong> immediately intervened, suspecting that &#8220;<em>it was the Russian government but without certainty<\/em>&#8220;. Then the American president explained that he had ordered <strong>intelligence<\/strong> to investigate and threatening to answer if Moscow&#8217;s guilt had been ascertained.<\/p>\n<\/div><\/div>\n<div class=\"et_pb_module et_pb_text et_pb_text_1187  et_pb_text_align_left et_pb_bg_layout_light\">\n<div class=\"et_pb_text_inner\">\n<p><strong> Moscow&#8217;s response<\/strong> was not long in coming: &#8220;<em>Given the scale and seriousness of the challenges in the field of cybersecurity, the interaction between Russia and the United States should be constant, professional and not politicized<\/em>.&#8221;<\/p>\n<\/div><\/div>\n<div class=\"et_pb_module et_pb_image et_pb_image_329 et_animated et-waypoint\">\n<p>\t\t\t\t<span class=\"et_pb_image_wrap \"><img decoding=\"async\" src=\"http:\/\/temp_new.vmenginelab.com\/wp-content\/uploads\/2021\/07\/usa-vs-russia-8-1.jpg\" alt=\"\" title=\"USA-vs-Russia 8\"  sizes=\"(max-width: 740px) 100vw, 740px\" class=\"wp-image-33837\" \/><\/span>\n\t\t\t<\/div>\n<div class=\"et_pb_module et_pb_cta_203 et_pb_promo  et_pb_text_align_center et_pb_bg_layout_light\">\n<div class=\"et_pb_promo_description et_multi_view_hidden\"><\/div>\n<div class=\"et_pb_button_wrapper\"><a class=\"et_pb_button et_pb_promo_button\" href=\"https:\/\/temp_new.vmenginelab.com\/en\/2018\/08\/31\/how-to-defend-against-ddos-attacks-and-bot-traffic-with-automation\/\" target=\"_blank\">How to defend yourself from a hacker attack<\/a><\/div>\n<\/p><\/div>\n<div class=\"et_pb_module et_pb_text et_pb_text_1188  et_pb_text_align_left et_pb_bg_layout_light\">\n<div class=\"et_pb_text_inner\">\n<p>And the <strong>US-Russia &#8220;duel&#8221;<\/strong> on <strong>cyber security<\/strong> is not the only one on the international scene. A few days ago the news of a <strong>hacker attack on<\/strong> <a href=\"https:\/\/www.microsoft.com\/it-it\"><strong>the Microsoft<\/strong> <\/a> email system that violated the system of thousands of companies, government and military accounts. &#8220;<em>The US administration has every right to take action against anyone who attacks the United States, including China<\/em>.&#8221; White House spokeswoman <strong>Jen Psaki<\/strong> made this clarification, according to whom &#8220;<em>there will be no differences in attitude with respect to the case involving Russia<\/em>. <em>We will not stand still<\/em> \u2013 he concluded \u2013 <em>we will not allow economic reasons or other considerations to prevent us from reacting<\/em>&#8220;.<\/p>\n<\/div><\/div>\n<div class=\"et_pb_module et_pb_text et_pb_text_1189  et_pb_text_align_left et_pb_bg_layout_light\">\n<div class=\"et_pb_text_inner\">Words that sound just like an outcry. Cyber attacks look like cannonballs. Yes, cannonades 2.0.<\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Cyber security is a topic that is increasingly at the center of public debate. Even the world&#8217;s leaders have taken an interest in the issue. The President of the United States of America Joe Biden and Russian President Vladimir Putin were the protagonists of a long phone call, which lasted about an hour, during which [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":41627,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[97,3574,1374],"tags":[4154,4650,4651,4652,4653,4654],"class_list":["post-39928","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog-en","category-in-evidence","category-the-analysis","tag-hacker-attack","tag-hacker-attacks","tag-malware-attack","tag-ransomware-en","tag-russia-en","tag-usa-en"],"aioseo_notices":[],"jetpack_featured_media_url":"http:\/\/temp_new.vmenginelab.com\/wp-content\/uploads\/2021\/07\/giphy.gif","amp_enabled":true,"_links":{"self":[{"href":"http:\/\/temp_new.vmenginelab.com\/en\/wp-json\/wp\/v2\/posts\/39928","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/temp_new.vmenginelab.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/temp_new.vmenginelab.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/temp_new.vmenginelab.com\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"http:\/\/temp_new.vmenginelab.com\/en\/wp-json\/wp\/v2\/comments?post=39928"}],"version-history":[{"count":1,"href":"http:\/\/temp_new.vmenginelab.com\/en\/wp-json\/wp\/v2\/posts\/39928\/revisions"}],"predecessor-version":[{"id":41631,"href":"http:\/\/temp_new.vmenginelab.com\/en\/wp-json\/wp\/v2\/posts\/39928\/revisions\/41631"}],"wp:featuredmedia":[{"embeddable":true,"href":"http:\/\/temp_new.vmenginelab.com\/en\/wp-json\/wp\/v2\/media\/41627"}],"wp:attachment":[{"href":"http:\/\/temp_new.vmenginelab.com\/en\/wp-json\/wp\/v2\/media?parent=39928"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/temp_new.vmenginelab.com\/en\/wp-json\/wp\/v2\/categories?post=39928"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/temp_new.vmenginelab.com\/en\/wp-json\/wp\/v2\/tags?post=39928"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}