Russia: Cybercrime

(asked on 13th July 2021) - View Source

Question to the Foreign, Commonwealth & Development Office:

To ask the Secretary of State for Foreign, Commonwealth and Development Affairs, what progress the Government has made in working with it's international allies to develop a common approach to the attribution of malicious cyber activity by (a) Russia and (b) other countries as recommended by the Intelligence and Security Committee’s report on Russia published on 21 July 2020.


Answered by
Wendy Morton Portrait
Wendy Morton
This question was answered on 19th July 2021

The UK has been at the forefront of demonstrating that there are meaningful consequences to malicious cyber activity. We co-ordinate closely with a wide range of international partners. We share our analysis of the threat and our experience in responding in order to increase the capabilities and commitment of countries around the world to respond and deter malicious cyber activity. We have a network of cyber attachés across the world who work with international partners to raise awareness and build capacity to defend against cyberattacks including coordinating on our approaches to attributing malicious cyber activity.

Hostile actors must understand that irresponsible behaviour in cyberspace will carry costs. The UK has been at the forefront of demonstrating these consequences coordinating the use of existing tools and working to put in place new tools such as EU and UK cyber sanctions regimes. In 2020 the UK, working in solidarity with the EU, imposed cyber sanctions on 12 entities and individuals from China, Russia and DPRK. Since 2017, working in solidarity with a growing coalition of international partners we have attributed a number of malicious cyber incidents to Russia, China, DPRK and Iran including attacks including NotPetya, WannaCry, Sandworm, APT28, APT10 and the Solarwinds compromise.

Reticulating Splines