Hackers Access Nuclear Weapons Agency in Act of Cyberwarfare

Both the National Nuclear Security Administration and US Energy Department reported evidence of hackers accessing their networks during a security breach including numerous federal agencies. The Cybersecurity and Infrastructure Security Agency (CISA) issued Emergency Directive 21-01 Sunday night, reporting a known compromise for only the fifth time since the Cybersecurity Act of 2015.

Politico reported, “On Thursday, DOE and NNSA officials began coordinating notifications about the breach to their congressional oversight bodies after being briefed by Rocky Campione, the chief information officer at DOE.

“They found suspicious activity in networks belonging to the Federal Energy Regulatory Commission (FERC), Sandia and Los Alamos national laboratories in New Mexico and Washington, the Office of Secure Transportation at NNSA, and the Richland Field Office of the DOE.”

Though the official report states the breach did not impact mission-official national security and was isolated only to business networks, many are clearly concerned about the timing and nature of the hacking efforts.

ThreatPost, a cybersecurity news site, reported, “The known attack vector for the incident is SolarWinds’ Orion network management platform, whose users were infected by a stealth backdoor that opened the way for lateral movement to other parts of the network. It was pushed out via trojanized product updates to almost 18,000 organizations around the globe.”

Interestingly, this hack took place shortly after CISA Chief Christopher Krebs was fired after calling the 2020 election “the most secure in the election history.” Krebs argued to debunk Trump’s election fraud allegations, despite mounting evidence of both software manipulation and offline voter fraud.

Many initial reports blame Russian sources, though no evidence regarding the identity of the hackers has been released. Neither has a group yet to publicly claim responsibility for the act. Russia has denied any involvement in the attack.

Reuters News Agency reported the hackers “backed by a foreign government have been monitoring internal email traffic at the U.S. Treasury Department and an agency that decides internet and telecommunications policy, according to people familiar with the matter.”

An anonymous source told Reuters the breach targeted Microsoft’s Office 365, and staff emails were monitored for months. “The hackers are ‘highly sophisticated’ and have been able to trick the Microsoft platform’s authentication controls, according to a person familiar with the incident, who spoke on condition of anonymity because they were not allowed to speak to the press.”

What is being done in response? John Ullyot, a National Security Council spokesman, stated, “The United States government is aware of these reports and we are taking all necessary steps to identify and remedy any possible issues related to this situation.” In other words, the public is being told nothing. Everything is okay. Nothing to see here. Don’t worry.

Unfortunately, there is a lot to see here. If hackers have really been able to monitor email among Nuclear Security Administration staff for months, there just might be a problem with what was passed along. Also, isn’t Microsoft Office 365 a product under the control of founder Bill Gates, who just happens to be a leading voice behind the coronavirus vaccine and in discussion for a Biden cabinet position?

If security is a top priority of the national government, our nation is clearly in trouble. Let’s hope Team Trump can find a way to turn the election battle around and do something before Biden and Harris take over. The nation’s enemies may not need hackers at that point, as they can buy their way to influence US government.

9 thoughts on “Hackers Access Nuclear Weapons Agency in Act of Cyberwarfare”

  1. Odd there is not more with the private servers being used for decades with the deep state actors and their Fraud ? Trust nothing or who is responsible !

  2. Russia is a threat but I would rather believe Iran or China are bigger threat’s to our national security. Our own government is riddled with corrupt idiots selling us out and this needs to be stopped ASAP!

  3. America needs to list all Political figures that they or their family members have business relationships in China this is obvious threat to America. China is America’s number one enemy.

  4. Hacking needs to rise to the level of a capital crime and the punishments to fit the crime. Needless to say backing that endangers life,limb,property,or country needs to be punished in such a way as to discourage repeat offenders.

  5. Regardless who they are, this is an act of war. When we figure out who did this we should send in special forces to quietly capture or kill the bastards, then hack the hell out of the country or countries responsible.

  6. We have good hackers also. We could hack to find out who hacked.
    Clinton sold us out to Russia. Biden did and is sailing us out to China. (China and Ir We have to an is our biggest threat.)
    Obama and Harris running our Country will turn us over to China.
    We have to keep Trump in. After Trump we need to vote in Cruz and/or Crenshaw. We need to finish draining the swamp.

  7. It’s China that hacked the numbers for a nuclear Warhead and they’re going to use it against the USA. Read the book of Revelation because the USA is the mystery Babylon in Revelation chapter 17 we are the mystery Babylon. If you see a video about something it says that if the American people find out it’ll ruin the democratics party. Watch the video please. 90 million people will die because of the Warhead and it will start world war 3.

Leave a Reply

Your email address will not be published. Required fields are marked *


Most Popular

These content links are provided by Content.ad. Both Content.ad and the web site upon which the links are displayed may receive compensation when readers click on these links. Some of the content you are redirected to may be sponsored content. View our privacy policy here.

To learn how you can use Content.ad to drive visitors to your content or add this service to your site, please contact us at [email protected].

Family-Friendly Content

Website owners select the type of content that appears in our units. However, if you would like to ensure that Content.ad always displays family-friendly content on this device, regardless of what site you are on, check the option below. Learn More



Most Popular
Sponsored Content

These content links are provided by Content.ad. Both Content.ad and the web site upon which the links are displayed may receive compensation when readers click on these links. Some of the content you are redirected to may be sponsored content. View our privacy policy here.

To learn how you can use Content.ad to drive visitors to your content or add this service to your site, please contact us at [email protected].

Family-Friendly Content

Website owners select the type of content that appears in our units. However, if you would like to ensure that Content.ad always displays family-friendly content on this device, regardless of what site you are on, check the option below. Learn More