State Dept. to Pay Up to $10M for Information on Foreign Cyberattacks

  /     /     /  
Publicated : 23/11/2024   Category : security


State Dept. to Pay Up to $10M for Information on Foreign Cyberattacks


The Rewards for Justice program, a counterterrorism tool, is now aimed at collecting information on nation-states that use hackers to disrupt critical infrastructure.



The United States will pay up to $10 million for information on cyberattacks against critical infrastructure that violate the nations anti-hacking statute, the Computer Fraud and Abuse Act (CFAA), and that are carried out at the direction or under the control of a foreign government, the US Department of State announced on July 15.
The State Departments Rewards for Justice office will run the program, operating a Tor-based tip channel to receive information on potential foreign-directed hacking and sifting through information with a number of other government partners. The agency listed ransomware extortion, hacking or exceeding authorization on any protected computers, and transmitting malicious code as potential violations that — if conducted by a foreign agent — would constitute a relevant cyber threat.
The fund will pay up to $10 million for information leading to the identification or location of any person who, while acting at the direction or under the control of a foreign government, participates in malicious cyber activities against U.S. critical infrastructure, the State Department
said in a statement
.
The bounty offer comes as cyberattacks against US and European infrastructure and companies have ratcheted up. In early May, oil and gas transport network Colonial Pipeline
paid $4.4 million to recover from a ransomware attack
that had disrupted pipeline operations for more than a week, leading to gas shortages in the southeastern United States. In late May, meat producer JBS USA acknowledged that the company
had been hit with a ransomware attack
, delaying food shipments. And on July 2, Russia-linked ransomware group REvil
launched an attack on a zero-day vulnerability
in Kaseya Virtual System Administrator (VSA) servers used by many managed service providers,
affecting more than 1,500 businesses
.
The US government has made responding to the attacks a priority, with the Biden administration
putting pressure on Russian President Vladimir Putin to act
. The State Departments offer to pay for leads and evidence linking countries to serious cyberattacks could make taking action against bad actors easier, Mike Hamilton, founder and chief information security officer at Critical Insight, says in a statement sent to Dark Reading.
It appears to be an attempt to short-cut the process of detailed attribution that is necessary to implicate a foreign government in collusion or cooperation with organized crime, he says. If the US government can incentivize someone to provide evidence of such, paying out $10 million is probably a good deal considering the resources we bring to bear with the intelligence community for the same outcome.
However, the approach also has significant downsides. While the reward program will likely produce leads, sifting through those leads to find verifiable evidence will consume a great deal of resources, Austin Berglas, global head of professional services at cybersecurity services firm BlueVoyant and a former FBI assistant special agent in charge of the New York Office Cyber Branch, says in a statement sent to Dark Reading.
The difficulty is the amount of resources that will be necessary to separate the signal from the noise and identify the legitimate tips, he says, adding that if there was an arrest made and follow-on prosecution — based on an anonymous lead — investigators will have to be able to provide evidence of the crimes alleged by the anonymous party.
He also says that such offers could produce dissension in the ransomware community with rival groups trying to get information on each other, potentially reducing competition. Yet in many cases, the members of those groups will be in countries that will not extradite them, Berglas says.
[W]e still have to overcome the safe harbor provided by Russia and others, he says. There are numerous existing cases where warrants are obtained and red notices are disseminated for criminals residing in these countries.
The US government has already issued indictments for hacking
against 12 Russian nationals
for their operations interfering the US elections and
against another six Russian military officers
for a variety of attacks, including disrupting Ukraines power grid and the NotPetya ransomware attack. None of those indicted have been delivered to the United States to stand trial.
The State Department Rewards for Justice program is not new. Since 1984, the program has paid more than $200 million to more than 100 people worldwide who provided information on terrorist threats and threats to national security, according to the State Department.

Last News

▸ Criminal Possession of Government-Grade Stealth Malware ◂
Discovered: 23/12/2024
Category: security

▸ Senate wants changes to cybercrime law. ◂
Discovered: 23/12/2024
Category: security

▸ Car Sector Speeds Up In Security. ◂
Discovered: 23/12/2024
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
State Dept. to Pay Up to $10M for Information on Foreign Cyberattacks