Nato will treat future cyber-attacks like ‘conventional military assaults’

Nato will treat future cyber-attacks like ‘conventional military assaults’

Nato has warned that any future cyber-attack will trigger the group's mutual defence clause.

Nato has warned that any future cyber-attack against any member state will trigger the group's mutual defence clause.

Nato's warning follows last week's 'Petya' malware attacks that shut down the central bank and many government offices in Ukraine.

Days after the FBI, Europol, and the UK's National Crime Agency announced a joint investigation into Petya malware attacks that crippled institutions in Ukraine and elsewhere, Nato has announced that any future cyber-attack against any member state will trigger the group's Article 5 [mutual defence clause].

FBI, NCA and Europol join Ukrainian investigation on Petya malware attacks

Nato will treat future cyber-attacks against member states as conventional military assaults and will respond accordingly, said the group's secretary-general Jens Stoltenberg.

"The attack in May and this week just underlines the importance of strengthening our cyber defences and that is what we are doing. We exercise more, we share best practices and technology, and we also work more and more closely with allies," he said.

“Nato helps Ukraine with cyber defence and has established a trust fund to finance programs to help Ukraine improve its cyber defences. We will continue to do this and it is an important part of our cooperation,” he added.

Ukrainian authorities had confirmed last week that while they had initiated an investigation into the cyber-attack, they were reasonably convinced that the attack was sponsored by Russia. Despite being assisted by Cisco, the authorities have not been able to pinpoint the source of Petya cyber-attacks so far.

The rise and rise of infrastructure-focussed malware

The Petya cyber-attack had destabilised operations in banks, media organisations, communication facilities, transport, telecommunications, and energy departments. Among the hardest hit were Ukr telecom, Dniproenergo, Ukrzaliznytsia, Kiev -Boryspil Airport, and the Cabinet of Ministers of Ukraine. Popular aircraft manufacturer Antonov was also reportedly hit.

In other news, DLA Piper, a law firm whose email account was knocked out following the Petya cyber-attack, has confirmed that it has regained control of its email and that other systems were being restored.

"Following the widely reported malware incident that occurred on Tuesday 27 June, we have brought our email safely back online, and continue to bring other systems online in a secure manner. The firm took immediate steps to contain the threat, and we have seen no evidence that client data was taken or that there was a breach of confidentiality of that data," said the firm in a statement to the media.

Copyright Lyonsdown Limited 2020

Top Articles

Universal Health Services lost $67m to a Ryuk ransomware attack last year

Universal Health Services said the cyber attack cost it $67 million in remediation efforts, loss of acute care services, and other expenses.

How the human immune system inspired a new approach to cyber-security

Artificial intelligence is being used to understand what’s ‘normal’ inside digital systems and autonomously fight back against cyber-threats

Solarwinds CEO blames former intern for hilarious password fiasco

SolarWinds has accused a former intern of creating a very weak password for its update server and storing it on a GitHub server for months.

Related Articles