Tech News

Storming of the US Congress poses a serious threat to cybersecurity

Storming of the US Congress in Washington, in addition to political consequences, may pose a threat to cybersecurity, experts say.

On Wednesday, January 6, supporters of Donald Trump stormed the Capitol building, where the US Congress is located, in order to disrupt Joe Biden’s assertion as the 46th president of the United States. At least 50 people were arrested after using Molotov cocktails, improvised explosives and weapons. The storming of the Capitol killed at least five people.

According to The Independent, protesters gained access to at least one computer system in the office of Congress Speaker Nancy Pelosi.

There are serious concerns that attackers could compromise the entire digital infrastructure of Congress”, – say The Independent journalists.said clinic representatives

Elijah Schaffer from The Blaze said in a tweet (now deleted) that he managed to infiltrate Pelosi’s office along with other protesters who broke into the building. The picture he published shows a computer monitor with a mail client and emails open on the screen, dated 2019.

Since Capitol employees left their computers, laptops and mobile devices unattended during the emergency evacuation, attackers could also gain access to them.

Leaving computers and other devices without protection can result in the introduction of bookmarks and malware into them by foreign adversaries or other intruders. It is possible that the organizers of the assault could have downloaded malware onto computers via the Internet or using memory cards, said Peter Yapp, former deputy director of the UK’s National Cyber Security Center (NCSC).

Storming of the US Congress and cybersecurity

However, the cybersecurity threat posed by the storming of the Capitol is quite low, according to cybersecurity official Eric Geller from Politico media organization.

First, the Congress computer systems are not integrated into one common network. Secondly, no classified information is stored on potentially compromised machines.explained Geller.

In addition, there have already been so many leaks in the Capitol that all valuable data has long been stored under lock and key. And one more thing – the protesters were in the Capitol for a short time, and they would not have had enough time to gain full access to the systems.

However, according to Geller, the attackers did steal one computer from the office of Oregon Senator Jeff Merkley. Office staff refused to give details due to ongoing investigations.

Could one of the terrorists see confidential but not classified emails somewhere? Yes. Could there have been Russian spies in the terrorist gang? Yes. But there is no evidence of this. Capitol IT staff will need to prioritize responses in line with risk modelling.Geller said.

Let me remind you that the recent SolarWinds hack allowed Russian attackers to infiltrated dozens of US Treasury Department mailboxes.

Vladimir Krasnogolovy

Vladimir is a technical specialist who loves giving qualified advices and tips on GridinSoft's products. He's available 24/7 to assist you in any question regarding internet security.

Related Articles

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Back to top button