Russia denies ‘feeble’ U.S., U.K. charges of internet tampering
Russia denied accusations from the United States and Britain that its agents have planted malware on key components of the internet to spy on rivals, steal trade and potentially launch cyberattacks.
A Kremlin spokesman on Tuesday called the claim unfounded and “feeble.’’
In a joint statement Monday, the U.S. Department of Homeland Security, the FBI and the U.K.’s National Cyber Security Centre said the main targets in the alleged tampering of routers and other networking equipment include “government and private-sector organizations,’’ as well as providers of “critical infrastructure’’ and internet service providers.
“Victims were identified through a co-ordinated series of actions between U.S. and international partners,’’ according to a companion technical alert issued by the U.S. Computer Emergency Response Team (U.S.-CERT). Both nations have “high confidence’’ in the finding of Russian-sponsored cyber-meddling, which the alert said has been reported by multiple sources since 2015.
Australia also admonished Russia and accused Kremlin-backed hackers of cyberattacks on hundreds of Australian companies last year.
Respected U.S. cybersecurity researcher Jake Williams said it was difficult for him to understand the motivation for Monday’s alert given that “the activity has been ongoing for some time.’’
“Calling the Russians out on this hardly makes much sense unless there’s some other agenda (most likely political),’’ Williams, the president of Rendition Infosec, said via text message.
In Moscow, Kremlin spokesman Dmitry Peskov called the accusations groundless.
“We don’t know what these accusations are based on,’’ he told reporters. “Such accusations are typically thrown into the air and no one even bothers to offer any arguments (proof) anymore.’’
“We think such feeble accusations have lost all meaning,’’ Peskov added
Routers direct data traffic across the internet. U.S.-CERT said the compromised routers can be exploited for “man-inthe-middle’’ spoofing attacks, in which communications are intercepted by a seemingly trusted device that has actually been infiltrated by an attacker.