State Looks to Better Assess Vendor Security – Route Fifty
State Looks to Better Assess Vendor Security Route Fifty
State Looks to Better Assess Vendor Security Route Fifty
Cyberattack ransoms and cryptocurrency mining are unlikely to generate enough revenue to replace regular business activity in sanctioned nations, digital money experts and former law-enforcement officials told a U.S. Senate hearing Thursday.
The amount of cash needed to operate a major economy far outstrips the ability of crypto markets to handle such volumes, witnesses said in testimony to the Senate’s Committee on Banking, Housing and Urban Affairs.
“You can’t flip a switch overnight and run a G-20 economy on cryptocurrency, there just isn’t enough liquidity,” said
Michael Mosier,
former acting director of the Financial Crimes Enforcement Network, an arm of the U.S. Treasury Department.
The hearing was held as fears grow that Russia may turn to cyberattacks and cryptocurrency to prop up its economy, which has been battered by an array of economic sanctions during its continuing invasion of Ukraine.
On March 11, ratings agency
Moody’s Corp.’s
Investors Service unit warned that banks, crypto platforms and intellectual property could become targets for Russian state-sponsored hackers.
Cybersecurity news, analysis and insights from WSJ’s global team of reporters and editors.
“There is a growing risk that Russian government and nongovernment cyber actors will try to perpetrate cyberattacks on entities across sectors and regions as an illicit means of raising money,” Moody’s said.
At Thursday’s hearing, Sen.
Elizabeth Warren
(D., Mass.) said she was introducing a bill immediately that would authorize the White House and Treasury Department to sanction cryptocurrency firms that do business with already-sanctioned Russian entities. The aim is to close…
People are growingly reliant on the Internet for work, school and daily activities. The impact to people’s life will be unthinkable should the Internet suddenly stop working. Border Gateway Protocol …
internet security – read more
Inherent insecurity in the routing protocol that links networks on the Internet poses a direct threat to the infrastructure that secures communications between users and websites.
The Border Gateway Protocol (BGP), which is used by computer network operators to exchange information about which Internet Protocol (IP) addresses they own and how they should be routed, was designed at a time when the Internet was small and operators trusted each other implicitly, without any form of validation.
If one operator, or autonomous system (AS), advertises routes for a block of IP addresses that it doesn’t own and its upstream provider passes on the information to others, the traffic intended for those addresses might get sent to the rogue operator.
To read this article in full or to leave a comment, please click here