• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Cyber Security News

UK military used malware to disrupt extremist networks

You are here: Home / General Cyber Security News / UK military used malware to disrupt extremist networks

Military operative on a remote computer

Using malware as a deterrent, disrupting extremist networks and remotely disabling gadgets are just some of the techniques the UK is battling on the cyber entrance traces, the head of the country’s strategic command has uncovered. 

Common Sir Patrick Sanders discussed the UK’s cyber offensive capabilities on the Sky Information podcast Into The Grey Zone, which also showcased insight from Jeremy Fleming, the director of GCHQ.

✔ Approved Seller by TheCyberSecurity.News From Our Partners
Mcafee Total Protection 2021

Protect yourself against all threads using McAfee. Get McAfee Total Protection with 80% discount from our partner and an certified seller: SerialCart®.

➤ Activate Your Coupon Code


The important theme of the discussion was the Islamic Condition (Isis) with Sanders speaking in element about the cyber offensive strategies made use of in opposition to the organisation. Alongside with the US and other allies, visible armed service tech has been deployed versus Isis, these types of as warplanes and drones, but there has also been a far more covert use of on the web attacks.

The UK’s military services has previously advised the use of ‘cyber offensives’, but this is the initially time it has publicly reviewed it. 

“I assume it sends a genuinely solid signal that we and our allies were not going to depart cyberspace as an uncontested position,” Fleming reported to Sky News.

“We have to defend it. We have to make guaranteed it is really as protected as achievable. We have to make sure that it is nevertheless underpinning our commerce, our economic climate, our society and our communities. But similarly, when adversaries like Daesh (Islamic Condition) overstep the line, then they have to have to count on us to contest it, also.”

As component of its cyber marketing campaign, the UK military qualified cell telephones and laptops, devices that Isis extremists applied to talk with their contacts on the floor. The attacks were being believed to be productive by halting senior Isis officers from sending directions, altering the content material of the messages and bewildering floor troops. In some conditions, the attacks lead foot soldiers into the path of UK and allied troops. 

The UK also launched malware in opposition to laptop or computer servers in a variety of international locations close to the planet to shut down Isis accounts, delete and distort information and facts on their data files, and also to clear away online posts and films. It is assumed that US cyber operators were being also involved in these endeavours.

The ‘Friendly’ use of malware by the UK armed forces must come as no shock to everyone, according to Chris Sedgwick, director of security functions at Sy4 Security.  

“The data files Edward Snowden unveiled in 2013 emphasize the enormous functionality that GCHQ and other nations around the world within just Five Eyes have in relation to hacking private units and entry to our sensitive data,” Sedgwick advised IT Pro. “Given that then the UK Armed service has founded “77th Brigade” which aims to tackle on-line disinformation. On the other hand, the launching of true malware should adhere to pretty apparent lawful frameworks and justifications considerably the similar as a actual physical armed forces attack.”
Equally, malware attacks have the possible for serious collateral injury, according to Mike Beck, world CISO for Darktrace.
“We saw how malware can bleed from preliminary targets to induce widespread destruction with WannaCry, NotPetya, and Stuxnet” Beck discussed. “Cyber conflict is asymmetrical and it is a lot much easier to attack than to protect. The rules of common warfare do not implement to cyber and states need to try for fantastic defence, not just good offence.”


Some areas of this write-up are sourced from:
www.itpro.co.uk

Previous Post: «Detailed: Here's How Iran Spies On Dissidents With The Help Detailed: Here’s How Iran Spies on Dissidents with the Help of Hackers
Next Post: Europol Breaks $14m Card Fraud Ring Cyber Security News»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Recent Posts

  • NHS Staff Hit by Almost 140,000 Malicious Emails in 2020
  • Europol Breaks $14m Card Fraud Ring
  • UK military used malware to disrupt extremist networks
  • Detailed: Here’s How Iran Spies on Dissidents with the Help of Hackers
  • Tens of Thousands of Patient Files Leaked in US Hospital Attacks
  • Top 5 Bug Bounty Programs to Watch in 2021
  • Crypto Fund Founder Pleads Guilty to $100m Fraud Scheme
  • WARNING — Hugely Popular ‘The Great Suspender’ Chrome Extension Contains Malware
  • Cybercriminals Now Using Plex Media Servers to Amplify DDoS Attacks
  • Google Firebase hosts Microsoft Office phishing attack

Copyright © TheCyberSecurity.News, All Rights Reserved.