US Warns Of Ongoing Cyber Attacks Targeting Critical Infrastructure

A new release which includes analysis from the Department of Homeland Security and the FBI has revealed details on “advanced persistent threat actions” which are targeting agencies in the “energy, nuclear, water, aviation, and critical manufacturing sectors.”

Pand P Studio /

The United States Computer Emergency Readiness Team (US-CERT) issued the alert, which claims that these government entities have not only been targeted — in some cases, hackers “have leveraged their capabilities to compromise victims’ networks.”

The US-CERT alert is meant to “educate network defenders and enable them to identify and reduce exposure to malicious activity.” Downloadable copies of IOC packages — indicators of compromise — and associated files are available on the site.

Concerns And Targeting Techniques

While the alert may seem vague and broad, there are obvious concerns with threats on critical infrastructure. As US-CERT points out, not only are there are issues of espionage at play, but hackers may also be able to “to disrupt energy systems in the event of a hostile conflict.”

Hackers are continually targeting these infrastructure entities with a number of techniques, including spear-phishing emails and “ongoing credential gathering.” Further technical details are included on the site.

An Endless Battle

It’s clear that this is going to be a long-term battle between the government and these malicious threat actors — and at this point, it appears to be an endless battle.

While the government confronts its cyber enemies, private companies continue to deal with their own hacking threats. It’s been a rough year — and new breaches seem to be announced every week — but 2017 hasn’t been the start of these issues. Not by a long shot.

Our new article Not Just Equifax: Six Of The Biggest Data Breaches In The Modern Tech Era highlights a number of large companies that have dealt with major data breaches in the past 10 years. Read on to learn about some of the biggest breaches we’ve seen.

Phil Dzikiy

Phil Dzikiy

Phil Dzikiy is the former editor in chief of Security Baron. Before, he has worked as a freelance writer and editor at websites like and along with publications like the Lockport Union Sun & Journal and the Greater Niagara Newspapers. With digital and print experience under his belt, Phil has a passion for all things technology including home security, cyber security, and the smart home. His bachelor's degree in Journalism from the University of Maryland College Park initially landed Phil his first job at the Beaver County Times, which has lead to over 15 years of experience as a journalist.

Trending News

Follow Us