Monday, March 3, 2025
HomeCyber Security NewsU.S. Suspends Cyberattacks Against Russia

U.S. Suspends Cyberattacks Against Russia

Published on

SIEM as a Service

Follow Us on Google News

The United States has suspended offensive cyber operations against Russia under an order issued by Defense Secretary Pete Hegseth, according to multiple confirmed reports.

The directive, first revealed by The Record and corroborated by The New York Times and The Washington Post, marks a notable shift in the Pentagon’s cyber strategy amid escalating global tensions.

While U.S. Cyber Command—tasked with both defending national infrastructure and conducting offensive cyber campaigns—has paused its operations targeting Moscow, the Cybersecurity and Infrastructure Security Agency (CISA) emphasized that its defensive posture remains unchanged.

CISA swiftly addressed speculation about its involvement, stating on social media: “CISA’s mission is to defend against all cyber threats to U.S. Critical Infrastructure, including from Russia. There has been no change in our posture”.

Rationale Behind the Cyber Stand-Down

Sources within the Trump administration frame the pause as a diplomatic overture to encourage negotiations over Russia’s invasion of Ukraine.

However, critics highlight the asymmetry of the move: while the U.S. halts offensive actions, Russian-linked groups like Midnight Blizzard and Sandworm continue targeting American entities through ransomware, phishing, and supply-chain attacks.

Historical precedents—including the SolarWinds breach and NotPetya malware—underscore Moscow’s relentless cyber aggression, raising questions about the efficacy of unilateral de-escalation.

Former officials argue the administration aims to free resources to counter China, which has intensified cyberespionage against U.S. infrastructure. 

The Register notes this strategic recalibration aligns with recent warnings from CISA Director Jen Easterly about China’s “existential” threat to U.S. critical systems.

Yet, experts warn that easing pressure on Russia could embolden Kremlin-backed hackers, who have historically exploited geopolitical lulls to launch disruptive campaigns.

Broader Cybersecurity Developments

Dutch Police Net Phishing Suspects With Sting Operation

In the Netherlands, police arrested individuals allegedly involved in a phishing ring after staging fake meetings to deliver ransom payments.

Suspects attempted to disguise their activities by carrying fishing gear, a ruse authorities dismissed as “creative but unconvincing”. The operation highlights law enforcement’s growing use of proactive tactics to combat cybercrime.

Medusa Ransomware Gang’s Geographical Blunder

The Medusa ransomware group faced embarrassment after mistakenly claiming a breach of Aurora, Colorado (population: 400,000), when their actual target was Aurora, Nebraska (population: <5,000).

The error, exposing data from the smaller municipality, underscores the challenges rural communities face in responding to cyberattacks due to limited resources.

Apple’s Find My Network Exploited for Cross-Platform Tracking

Researchers at George Mason University revealed a vulnerability in Apple’s Find My service, dubbed “nRootTag,” enabling surveillance of non-Apple devices via Bluetooth.

By brute-forcing encryption keys, attackers could track Windows, Android, and Linux systems at minimal cost, raising alarms about consumer privacy.

The exploit, set to be detailed at the USENIX 2025 conference, highlights risks in widely trusted location-tracking ecosystems.

Cellebrite’s Spyware Targets Serbian Activists

Amnesty International uncovered Israeli firm Cellebrite exploiting unpatched Android vulnerabilities to spy on Serbian student activists.

Despite Cellebrite’s claims of working solely with governments on legitimate investigations, the breaches involved flaws in Linux kernel USB drivers (CVE-2024-53104, CVE-2024-53197, CVE-2024-50302), two of which remain unpatched in Android as of March 2025.

The company has since suspended sales to Serbian authorities.

Chinese Hackers Infiltrate Belgian Security Services

Belgian officials disclosed a two-year cyberespionage campaign attributed to China, exfiltrating emails from the State Security Service and Belgian Pipeline Organisation.

While no classified data was compromised, the breach, executed via a compromised Barracuda Networks email gateway, exposed personal details of nearly half the agency’s personnel.

The incident underscores persistent vulnerabilities in governmental communication infrastructure.

The U.S. cyber pause against Russia reflects a complex interplay of diplomacy and strategy, balancing deterrence with resource allocation for emerging threats.

Yet, as global adversaries exploit digital frontiers, the efficacy of such gambits remains uncertain.

Meanwhile, innovative cyber policing and escalating spyware risks highlight the evolving battlefield—one where vigilance and adaptability are paramount.

Are you from SOC/DFIR Teams? – Analyse Malware Incidents & get live Access with ANY.RUN -> Start Now for Free.

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

Google Launches Shielded Email to Keep Your Address Hidden from Apps

Google is rolling out a new privacy-focused feature called Shielded Email, designed to prevent apps...

Hackers Using PowerShell and Microsoft Legitimate Apps to Deploy Malware

Cybersecurity experts are warning of an increasing trend in fileless attacks, where hackers leverage...

JavaGhost: Exploiting Amazon IAM Permissions for Phishing Attacks

Unit 42 researchers have observed a threat actor group known as JavaGhost exploiting misconfigurations...

New Poco RAT Via Weaponized PDF Attacking Users to Capture Sensitive Data

A new variant of malware, dubbed "Poco RAT," has emerged as a potent espionage...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Google Launches Shielded Email to Keep Your Address Hidden from Apps

Google is rolling out a new privacy-focused feature called Shielded Email, designed to prevent apps...

Hackers Using PowerShell and Microsoft Legitimate Apps to Deploy Malware

Cybersecurity experts are warning of an increasing trend in fileless attacks, where hackers leverage...

JavaGhost: Exploiting Amazon IAM Permissions for Phishing Attacks

Unit 42 researchers have observed a threat actor group known as JavaGhost exploiting misconfigurations...