The United States has said that 1 billion was hacked by Russian cyber companies for Moscow

The public side of positivity is similar to that of many cyber security organizations: employees keep an eye on high-tech security, publish research on new threats, and even say, “Stay positive!” There are also signs of the CT office to read! Hanging over their desks. The agency is open about some of its connections to the Russian government, and boasts an 18-year track record of defensive cybersecurity expertise, including a two-decade relationship with the Russian Defense Ministry. But according to a previously unexpected U.S. intelligence assessment, it also develops and sells exploitative software to the Russian government.

One area that stood out was the work of SS on’s firm, a technology that has been criticized for its global telephone networks. In public demonstrations for this Forbes, Positively showed how it can bypass the encryption using the vulnerabilities of SS7. Personally, the United States has come to the conclusion that not only did it detect and propagate flaws in the positive system, but also created the ability for aggressive hacking to exploit the security holes used by Russian intelligence agencies in cyber propaganda.

Positive for the Russian government’s hacking campaign is something that American security contractors do like U.S. agencies. But there is a big difference. A former U.S. intelligence official, speaking on condition of anonymity because he is not authorized to discuss classified material, described the agency as “complex” and even “objectionable.” Wages are relatively low, demands are one-sided, energy is dynamic, and the underlying threat to non-cooperation can be large.

Tough work relationships

American intelligence agencies have long decided that positive real hacking operations run on their own, as long as they are in Russia’s national interest a large group can run their own cyber propaganda. Such practices are illegal in the Western world: American private military contractors working for the agency at the time of the cyber deal are under their direct and daily management.

U.S. intelligence concludes that the positives not only discovered and propagated the flaws, but also created the ability for aggressive hacking to exploit security breaches.

Former U.S. officials say Russia’s intelligence agency, the FSB, has a strong working relationship with the United States, which includes the exploitation of inventions, the development of malware, and even the reverse engineering of cyber powers by Western countries such as the United States.

The recent U.S. ban described the company’s marquee annual event, Positive Hack Days, as a “recruitment event for the FSB and GRU.” The show has seemed a bit unfocused in recent episodes Often By Russian agents

Do not respond to a request for positive comment.


Thursday’s announcement is not the first time Russian security agencies have come under investigation.

Kaspersky, Russia’s largest cybersecurity firm, has been on fire for years because of its ties to the Russian government – eventually being banned from US government networks. Kaspersky has always denied a special relationship with the Russian government.

But at least one of the reasons Kaspersky is isolated in the eyes of American intelligence officials is that Kaspersky sells antivirus software to Western companies and governments. Antivirus, software that is designed to look at everything that happened on a computer and has control over the machines it occupies, has a few more good intelligence gathering tools. U.S. officials Faith Russian hackers have used Kaspersky software to spy on Americans, but not the equivalent of Positive – a small company selling a variety of products and services.

Recent sanctions are Tate’s latest move to increase cyber operations, including Russian-sponsored ones, between Moscow and Washington. Solarwinds attack Against the United States, which led to the hacking of nine federal agencies over a long period of time. Earlier this year, the acting head of the U.S. cybersecurity agency said it could take the United States at least 18 months to recover from the attack.

Source link

Leave a Reply

Your email address will not be published. Required fields are marked *