Nato will treat future cyber-attacks like ‘conventional military assaults’

Nato will treat future cyber-attacks like ‘conventional military assaults’

Nato has warned that any future cyber-attack will trigger the group's mutual defence clause.

Nato has warned that any future cyber-attack against any member state will trigger the group's mutual defence clause.

Nato's warning follows last week's 'Petya' malware attacks that shut down the central bank and many government offices in Ukraine.

Days after the FBI, Europol, and the UK's National Crime Agency announced a joint investigation into Petya malware attacks that crippled institutions in Ukraine and elsewhere, Nato has announced that any future cyber-attack against any member state will trigger the group's Article 5 [mutual defence clause].

FBI, NCA and Europol join Ukrainian investigation on Petya malware attacks

Nato will treat future cyber-attacks against member states as conventional military assaults and will respond accordingly, said the group's secretary-general Jens Stoltenberg.

"The attack in May and this week just underlines the importance of strengthening our cyber defences and that is what we are doing. We exercise more, we share best practices and technology, and we also work more and more closely with allies," he said.

“Nato helps Ukraine with cyber defence and has established a trust fund to finance programs to help Ukraine improve its cyber defences. We will continue to do this and it is an important part of our cooperation,” he added.

Ukrainian authorities had confirmed last week that while they had initiated an investigation into the cyber-attack, they were reasonably convinced that the attack was sponsored by Russia. Despite being assisted by Cisco, the authorities have not been able to pinpoint the source of Petya cyber-attacks so far.

The rise and rise of infrastructure-focussed malware

The Petya cyber-attack had destabilised operations in banks, media organisations, communication facilities, transport, telecommunications, and energy departments. Among the hardest hit were Ukr telecom, Dniproenergo, Ukrzaliznytsia, Kiev -Boryspil Airport, and the Cabinet of Ministers of Ukraine. Popular aircraft manufacturer Antonov was also reportedly hit.

In other news, DLA Piper, a law firm whose email account was knocked out following the Petya cyber-attack, has confirmed that it has regained control of its email and that other systems were being restored.

"Following the widely reported malware incident that occurred on Tuesday 27 June, we have brought our email safely back online, and continue to bring other systems online in a secure manner. The firm took immediate steps to contain the threat, and we have seen no evidence that client data was taken or that there was a breach of confidentiality of that data," said the firm in a statement to the media.

Copyright Lyonsdown Limited 2021

Top Articles

Exposure of financial services to phishing rose by 125% in 2020

There was a 125% surge in the number of phishing attacks that financial services and insurance organisations experienced between 2019 and 2020.

Millions of Brits using old and unsecured routers, finds Which? ISPs differ

Which? has warned that millions of Brits are using old Wi-Fi routers, vulnerabilities in which could be exploited by hackers.

Scripps Health suffers a ransomware attack, suspends critical operations

Scripps Health recently suffered a ransomware attack that forced it to suspend user access to its online portal and applications and divert patient care operations.

Related Articles