{"id":61165,"date":"2019-06-17T15:19:24","date_gmt":"2019-06-17T20:19:24","guid":{"rendered":"https:\/\/www.pcmatic.com\/blog\/?p=61165"},"modified":"2019-06-17T15:19:28","modified_gmt":"2019-06-17T20:19:28","slug":"us-cyber-command-russian-code","status":"publish","type":"post","link":"https:\/\/www.pcmatic.com\/blog\/us-cyber-command-russian-code\/","title":{"rendered":"U.S. Cyber Command Inserts Malicious Code in Russian Power Grid"},"content":{"rendered":"\n<h4 class=\"wp-block-heading\">U.S. Takes Proactive Measure to Thwart Russian Attacks<\/h4>\n\n\n\n<p>The U.S. Cyber Command is attempting to minimize the realization of Russian cyber attacks by taking a preemptive strike against Russian power grids and other targets.  <\/p>\n\n\n\n<p>Due to the sensitivity on the matter, very few details are being released.  But here&#8217;s what we do know.  <\/p>\n\n\n\n<p>The U.S. Cyber Command has inserted code into Russia&#8217;s power grid and other potential targets.  This code can be maliciously executed if directed to do so.  However, for the time being, it will lay dormant.  <\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Is this even legal?<\/h4>\n\n\n\n<p>Yes.  It\u2019s permitted by a <a class=\"\" href=\"https:\/\/www.congress.gov\/bill\/115th-congress\/house-bill\/5515\/text\">law passed last summer,<\/a>\u00a0which approves &#8220;clandestine military activity&#8221; in cyberspace to \u201cdeter, safeguard or defend&#8221; against attacks. <\/p>\n\n\n\n<p>Now the question is, will this measure deter or trigger Russian cyber attacks against the U.S.?  Unfortunately, we may find out sooner than later.  Just days ago the Russian hacking group Xenotime made news for laying the groundwork to attack U.S. power companies.  <\/p>\n\n\n\n<h4 class=\"wp-block-heading\">What do you think &#8212; is the U.S. poking a sleeping bear, or simply putting on armor to defend for the fight? Drop your comments below.<\/h4>\n","protected":false},"excerpt":{"rendered":"<p>U.S. Takes Proactive Measure to Thwart Russian Attacks The U.S. Cyber Command is attempting to minimize the realization of Russian cyber attacks by taking a preemptive strike against Russian power grids and other targets. Due to the sensitivity on the matter, very few details are being released. But here&#8217;s what we do know. The U.S. [&hellip;]<\/p>\n","protected":false},"author":54,"featured_media":60445,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[7],"tags":[5175],"class_list":["post-61165","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-newsletter","tag-russia"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>U.S. Cyber Command Inserts Malicious Code in Russian Power Grid<\/title>\n<meta name=\"description\" content=\"The U.S. Cyber Command is attempting to minimize the realization of Russian cyber attacks by taking a proactive approach to cyber...\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pcmatic.com\/blog\/us-cyber-command-russian-code\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"U.S. Cyber Command Inserts Malicious Code in Russian Power Grid\" \/>\n<meta property=\"og:description\" content=\"The U.S. Cyber Command is attempting to minimize the realization of Russian cyber attacks by taking a proactive approach to cyber...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pcmatic.com\/blog\/us-cyber-command-russian-code\/\" \/>\n<meta property=\"og:site_name\" content=\"PC Matic Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/pcmatic\" \/>\n<meta property=\"article:published_time\" content=\"2019-06-17T20:19:24+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-06-17T20:19:28+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/PCMatic_protective_cover.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"730\" \/>\n\t<meta property=\"og:image:height\" content=\"414\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Kayla Elliott\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:site\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kayla Elliott\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/us-cyber-command-russian-code\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/us-cyber-command-russian-code\\\/\"},\"author\":{\"name\":\"Kayla Elliott\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/d4a11f480158af9f8090d8d90e0de8db\"},\"headline\":\"U.S. Cyber Command Inserts Malicious Code in Russian Power Grid\",\"datePublished\":\"2019-06-17T20:19:24+00:00\",\"dateModified\":\"2019-06-17T20:19:28+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/us-cyber-command-russian-code\\\/\"},\"wordCount\":204,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/us-cyber-command-russian-code\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/PCMatic_protective_cover.jpg\",\"keywords\":[\"Russia\"],\"articleSection\":[\"Newsletter\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/us-cyber-command-russian-code\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/us-cyber-command-russian-code\\\/\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/us-cyber-command-russian-code\\\/\",\"name\":\"U.S. Cyber Command Inserts Malicious Code in Russian Power Grid\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/us-cyber-command-russian-code\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/us-cyber-command-russian-code\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/PCMatic_protective_cover.jpg\",\"datePublished\":\"2019-06-17T20:19:24+00:00\",\"dateModified\":\"2019-06-17T20:19:28+00:00\",\"description\":\"The U.S. Cyber Command is attempting to minimize the realization of Russian cyber attacks by taking a proactive approach to cyber...\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/us-cyber-command-russian-code\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/us-cyber-command-russian-code\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/us-cyber-command-russian-code\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/PCMatic_protective_cover.jpg\",\"contentUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/PCMatic_protective_cover.jpg\",\"width\":730,\"height\":414},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/us-cyber-command-russian-code\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"U.S. Cyber Command Inserts Malicious Code in Russian Power Grid\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"name\":\"PC Matic Blog\",\"description\":\"Tech Tips and Tricks\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\",\"name\":\"PC Matic - Top Antivirus Company in the USA.\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"contentUrl\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"width\":1535,\"height\":483,\"caption\":\"PC Matic - Top Antivirus Company in the USA.\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/pcmatic\",\"https:\\\/\\\/x.com\\\/pcmatic\",\"https:\\\/\\\/www.instagram.com\\\/pcmaticusa\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/pcmatic\",\"https:\\\/\\\/www.youtube.com\\\/c\\\/PCMaticVideo\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/d4a11f480158af9f8090d8d90e0de8db\",\"name\":\"Kayla Elliott\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/author\\\/kayla\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"U.S. Cyber Command Inserts Malicious Code in Russian Power Grid","description":"The U.S. Cyber Command is attempting to minimize the realization of Russian cyber attacks by taking a proactive approach to cyber...","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pcmatic.com\/blog\/us-cyber-command-russian-code\/","og_locale":"en_US","og_type":"article","og_title":"U.S. Cyber Command Inserts Malicious Code in Russian Power Grid","og_description":"The U.S. Cyber Command is attempting to minimize the realization of Russian cyber attacks by taking a proactive approach to cyber...","og_url":"https:\/\/www.pcmatic.com\/blog\/us-cyber-command-russian-code\/","og_site_name":"PC Matic Blog","article_publisher":"https:\/\/www.facebook.com\/pcmatic","article_published_time":"2019-06-17T20:19:24+00:00","article_modified_time":"2019-06-17T20:19:28+00:00","og_image":[{"width":730,"height":414,"url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/PCMatic_protective_cover.jpg","type":"image\/jpeg"}],"author":"Kayla Elliott","twitter_card":"summary_large_image","twitter_creator":"@pcmatic","twitter_site":"@pcmatic","twitter_misc":{"Written by":"Kayla Elliott","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pcmatic.com\/blog\/us-cyber-command-russian-code\/#article","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/us-cyber-command-russian-code\/"},"author":{"name":"Kayla Elliott","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/d4a11f480158af9f8090d8d90e0de8db"},"headline":"U.S. Cyber Command Inserts Malicious Code in Russian Power Grid","datePublished":"2019-06-17T20:19:24+00:00","dateModified":"2019-06-17T20:19:28+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/us-cyber-command-russian-code\/"},"wordCount":204,"commentCount":0,"publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/us-cyber-command-russian-code\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/PCMatic_protective_cover.jpg","keywords":["Russia"],"articleSection":["Newsletter"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.pcmatic.com\/blog\/us-cyber-command-russian-code\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.pcmatic.com\/blog\/us-cyber-command-russian-code\/","url":"https:\/\/www.pcmatic.com\/blog\/us-cyber-command-russian-code\/","name":"U.S. Cyber Command Inserts Malicious Code in Russian Power Grid","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/us-cyber-command-russian-code\/#primaryimage"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/us-cyber-command-russian-code\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/PCMatic_protective_cover.jpg","datePublished":"2019-06-17T20:19:24+00:00","dateModified":"2019-06-17T20:19:28+00:00","description":"The U.S. Cyber Command is attempting to minimize the realization of Russian cyber attacks by taking a proactive approach to cyber...","breadcrumb":{"@id":"https:\/\/www.pcmatic.com\/blog\/us-cyber-command-russian-code\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pcmatic.com\/blog\/us-cyber-command-russian-code\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/us-cyber-command-russian-code\/#primaryimage","url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/PCMatic_protective_cover.jpg","contentUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/PCMatic_protective_cover.jpg","width":730,"height":414},{"@type":"BreadcrumbList","@id":"https:\/\/www.pcmatic.com\/blog\/us-cyber-command-russian-code\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pcmatic.com\/blog\/"},{"@type":"ListItem","position":2,"name":"U.S. Cyber Command Inserts Malicious Code in Russian Power Grid"}]},{"@type":"WebSite","@id":"https:\/\/www.pcmatic.com\/blog\/#website","url":"https:\/\/www.pcmatic.com\/blog\/","name":"PC Matic Blog","description":"Tech Tips and Tricks","publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pcmatic.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pcmatic.com\/blog\/#organization","name":"PC Matic - Top Antivirus Company in the USA.","url":"https:\/\/www.pcmatic.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","contentUrl":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","width":1535,"height":483,"caption":"PC Matic - Top Antivirus Company in the USA."},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/pcmatic","https:\/\/x.com\/pcmatic","https:\/\/www.instagram.com\/pcmaticusa\/","https:\/\/www.linkedin.com\/company\/pcmatic","https:\/\/www.youtube.com\/c\/PCMaticVideo"]},{"@type":"Person","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/d4a11f480158af9f8090d8d90e0de8db","name":"Kayla Elliott","url":"https:\/\/www.pcmatic.com\/blog\/author\/kayla\/"}]}},"_links":{"self":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/61165","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/users\/54"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/comments?post=61165"}],"version-history":[{"count":0,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/61165\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media\/60445"}],"wp:attachment":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media?parent=61165"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/categories?post=61165"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/tags?post=61165"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}