Advertisement

Justice Department launches review of cyber policies after ransomware, supply chain scourges

It's an acknowledgement that, despite indictments and arrests, cyberthreats to U.S. organizations are unrelenting.
Justice Department
U.S. Attorney General Merrick Garland (center) speaks at the Justice Department this month, alongside Deputy Attorney General Lisa Monaco (right). (Photo by Mandel Ngan-Pool/Getty Images)

The Justice Department is undertaking a four-month review of its approach to combatting a range of malicious cyber activity from foreign governments and criminals amid a spate of ransomware attacks and supply chain compromises.

“We need to rethink … and really assess are we using the most effective strategies” against such hacking, Deputy Attorney General Lisa Monaco said Friday at the Munich Cyber Security Conference.

The review of Justice Department policies, which began this week, will cover the cryptocurrencies that cybercriminals use to cash in on ransomware, along with the “blended threat of nation-states and criminal enterprises, sometimes working together, to exploit our own infrastructure against us,” Monaco said.

The policy review is an acknowledgement that, despite the Justice Department and FBI investing heavily in efforts to indict and arrest criminals and take down hacking forums, cyberthreats to U.S. businesses and government agencies remain unrelenting.

Advertisement

The 120-day Justice Department review comes after alleged Russian and Chinese hacking operations that have exploited software made by the U.S. federal contractor SolarWinds and Microsoft, respectively. The former hacking campaign breached at least nine federal agencies, while vulnerabilities used in the latter campaign exposed tens of thousands of U.S. businesses and state and local organizations to opportunistic criminal attacks.

With those clean-up operations hardly complete, the U.S. government is now dealing with another suspected Chinese hacking operation exploiting the Pulse Connect Secure virtual private networking software that has compromised at least five agencies.

Russia and China have denied involvement in the activity.

The Justice Department also in April set up a task force on ransomware that will identify links between criminals and foreign governments, the Wall Street Journal reported.

Against the steady tide of threats, the FBI has embraced a more aggressive cybersecurity strategy that involves working closely with U.S. intelligence agencies and allies to take down hacking infrastructure.

Advertisement

Earlier this month, the FBI used a court order to remove malicious code from hundreds of U.S. computers running the Microsoft Exchange Server email program. Monaco said U.S. law enforcement officials would “absolutely” use that tactic more in the future.

“We have got to get innovative and aggressive and we have to work collaboratively and cooperatively with our partners and with the private sector if we are going to keep pace with what the malicious actors are doing,” Monaco said.

Sean Lyngaas

Written by Sean Lyngaas

Sean Lyngaas is CyberScoop’s Senior Reporter covering the Department of Homeland Security and Congress. He was previously a freelance journalist in West Africa, where he covered everything from a presidential election in Ghana to military mutinies in Ivory Coast for The New York Times. Lyngaas’ reporting also has appeared in The Washington Post, The Economist and the BBC, among other outlets. His investigation of cybersecurity issues in the nuclear sector, backed by a grant from the Pulitzer Center on Crisis Reporting, won plaudits from industrial security experts. He was previously a reporter with Federal Computer Week and, before that, with Smart Grid Today. Sean earned a B.A. in public policy from Duke University and an M.A. in International Relations from The Fletcher School of Law and Diplomacy at Tufts University.

Latest Podcasts