Russia Suspected of Severing Undersea Cables causing Cyber Threat Impacting Availability of Data Communication

Russia Suspected of Severing Undersea Cables causing Cyber Threat Impacting Availability of Data Communication

Suspicions of sabotage have been raised in relation to recent incidents in which underwater cables in the Baltic Sea were severed. After two telecom lines were severed in less than 48 hours, Nordic and German officials began to suspect "hybrid warfare" and possible Russian involvement. These occurrences fit into a larger trend of underwater sabotage in the area, which has previously experienced comparable disruptions.

What are Undersea communication cables?

Submarine cables, sometimes referred to as underwater cables, are essential for international communications. These cables are composed of several layers for both functionality and protection. Thin glass strands called optical fibers, which carry data as light signals, are found in the core. To shield the fibers from environmental elements and physical harm, layers of materials such as polyethylene, aluminum, and steel wire are placed around them. These cables are laid on the ocean floor by specialized vessels known as cable-layers. Careful planning is required to steer clear of hazards like shipwrecks and coral reefs. In shallow waters, high-pressure water jets dig a trench in which the cables are laid; in deeper waters, they rest on the seabed.

Lasers that emit light pulses are used to transfer data through the optical fibers. These pulses carry enormous volumes of data across continents as they move quickly through the glass fibers. In order to boost the signal and guarantee that it reaches its destination with minimal loss, repeaters are positioned along the cable.

When a cable breaks, repair ships are sent out to find and fix the problem. Relaying the cable may entail removing it from the ocean floor, fixing or replacing the damaged portion, and then reinstalling it.

Over 95% of international data traffic is carried by underwater cables, making them indispensable to the internet. They demonstrate how contemporary engineering has made it possible for people to connect globally.

Over 600 submarine cable systems will exist globally by 2024, of which 532 are presently operational and more are in the works. These cables form a vast network that enables data transfer and international communication, spanning almost 1.4 million kilometers worldwide.

Cybersecurity is combination of Confidentiality, Integrity, and Availability. If any of it lagged because of malicious acts, it is known as cyber threat.

What is possible Reason Baltic Sea's Undersea communication cables suffered physical damage?

Last week, European governments reported that physical damage to underwater communication cables in the Baltic Sea may have been the result of Russian sabotage.

On Monday, the foreign ministers of Finland and Germany stated that the incident "raises suspicions of intentional damage" due to the severed 700-mile cable that connected the two countries. Although they did not specifically blame Russia, they claimed that European security was at risk due to Russia's aggressive war against Ukraine.

Ahead of a gathering of European security officials in Brussels on Monday, Germany's defense minister Boris Pistorius told reporters, "Nobody believes that these cables were severed by accident," according to the New York Times.

A repair vessel is on its way from France and should restore the C-Lion1 cable with Germany by the end of this month, according to a statement released by Finnish telecom Cinia on Thursday. It stated that because Finland uses multiple routes for telecommunications, "the impact of a single cable failure depends on the resilience of the service providers' connections."

A 135-mile cable that connects Telia Lithuania to Sweden was severed on Sunday morning, a representative for the telecom company told CNN. Network engineers have since rerouted connections to compensate for the disruption, which reportedly reduced Lithuanian internet capacity by a third.

The disruptions occurred weeks after Russian military activity around important underwater cables increased, according to U.S. officials who spoke to CNN. Russian involvement was denied by a Kremlin spokesperson on Wednesday.

In response to events in Europe on Thursday, U.S. military intelligence services cautioned defense firms to be vigilant for signs of Russian sabotage. The agencies cited network intrusions, insiders seeking digital or physical access "beyond their normal duties," and photographic or video surveillance, including via drones, as warning signs of an impending attack.

Such cyber-attacks can even happen on mission critical assets of any organization. If you are small and medium enterprise, BDSLCCI cybersecurity framework can help in protecting against various cyber threats.

What are Preventive Measures?

To secure undersea cables against cyber threats below are few key measures:

  1. Encryption: The use of end-to-end encryption guarantees that information sent over cables is shielded from illegal access and interception.
  2. Monitoring Systems: Anomalies and possible dangers to the cables can be identified by electronic monitoring systems. These systems enable prompt responses by warning operators of any suspicious activity.
  3. Redundancy and Diversification: Creating several redundant cable routes can help guarantee that data flow can continue even in the event of a cable failure. By doing this, the chance of a single point of failure is decreased.
  4. Physical Security: Physical tampering can be avoided by using protective measures like armoring and burying cables in the seabed, as well as by conducting routine maintenance and inspections of the cables.
  5. International Cooperation: It is essential for nations and private sector stakeholders to work together. The global undersea cable network's overall security can be improved by exchanging threat intelligence and best practices.
  6. Regulatory Actions: Governments have the authority to enact laws and rules requiring cable operators to adhere to security requirements. To reduce risks, this involves vetting foreign investments in cable infrastructure.

Together, these steps contribute to safeguarding the vital infrastructure that underwater cables represent, guaranteeing the dependability and security of international communications.

Stay Safe ?? Stay Secured ??

Dr. Shekhar Pawar

Know More About Our Cybersecurity Services

SecureClaw Inc, USA provides various cybersecurity services and products worldwide. Business Domain Specific Least Cybersecurity Controls Implementation (BDSLCCI) is one of the services of SecureClaw.

GrassDew IT Solutions Pvt Ltd provides Teleservices, Cybersecurity services, and Software Solution services(software development, maintenance and products).

DO CLICK FOLLOW BUTTON on below LinkedIn page!

https://www.dhirubhai.net/showcase/26603417/

Keep reading our articles and do provide your feedback in comments!

Ransomware attacks surged by 24% in India in the first half of 2024 | An Overview on Ransomware Extortion Attacks and Ways to Deal with Them

Can EVMs really be hacked? What do experts say? | Electronic Voting Machine

ElizaRAT – Pakistani Group is Targeting India Using ‘Virus’

MSMEs are vulnerable to cyber threats - the most ignored concern in India | Thanks to the latest issue of Fundamatics on Cybersecurity

The Rise of IoT Attacks: Endpoint Protection Via Trending Technologies - an Article by EC-Council

Importance of Active Defense to Mitigate Security Threats and Intrusions - an Article by EC-Council

An Identity-Based Security Infrastructure for Cloud Environments - an Article by EC-Council

Security Automation for Risk-Based Decisions - an Article by EC-Council

EDR Best Practices: Maximizing Threat Detection and Incident Response - an Article by EC-Council

Drone technology, cyber threats, and recommended security testing practices - an article published in Hakin9's Pentest magazine

Understanding Dark Web by Dr. Shekhar Pawar - an article published in Hakin9 magazine's issue titled "Dark Web Vol.3"

Code Whisperer: Dr. Pawar's Secrets to Cybersecurity for SMEs | SMEVenture & CXO XPERTS

Learnings from various cyber-attacks in 2023: SecureClaw Cyber Threat Advisory

Deepfakes as a Rising Cyberthreat: A Deep Review

Computer Security Day Insights: Interview of Dr. Shekhar Pawar

Guarding Your Business: Ransomware Security and Data Recovery | An Interview of Dr. Shekhar Pawar

Cybercrimes surged in 2022 in India | Praja Report | Hindustan Times

ChatGPT is down: Anonymous hackers in Sudan accept responsibility!

Cloud Security: Comprehensive Survey of Challenges and Trends - a Whitepaper by EC-Council

The impact of a cyber-attack on smart electricity networks might be enormous

How secure is the IoT ecosystem?

Industrial Automation Magazine: How Vulnerable are CNC Machines to Cyberattacks?

Security Tips for Social Media

Keep reading our articles and do provide your feedback in comments!

10 Insightful Web Security Tips for Safe Browsing

Better Security with a Lengthier Password

Have you recorded pronunciation of your name at your LinkedIn profile?

As an employee / stakeholder, how frequently you do receive Cyber Threat alerts and awareness notifications via emails by your Organization?

Clean Internet – What and Why?

Mercedes-Benz E-Class cars were vulnerable for remote hacking

Industrial Automation Robots are facing Many Risks from Legacy Programming Languages

Interactive Voice Response (IVR) Solution helping Organizations to overcome the COVID-19 Business Crisis

SAP’s RECON Vulnerability on Cyber Attack

Shadow Attacks on Digitally Signed PDF Files

Most Destructive Emotet Botnet is Back after long Hibernation Period

Understanding Black Box, White Box and Gray Box Vulnerability Assessment and Penetration Testing (VAPT)

Beware of Fake Zoom Suspension Alerts as Office 365 users are on target of Phishing Attack

Is there a Teammate who is Carbon Dioxide (CO2) of Your Team?

Snake Ransomware is Targeting Industrial Controls : Article @ Industrial Automation India

STRIDE Model Explains 6 Key Types of Cyber Threats

Cyber Extortion, Threats and Blackmail Increasing in Times of COVID-19

Top 18 Must Have Features for any Endpoint Cybersecurity

Top 7 Feature Comparisons Why IZO? Private Cloud by TATA Communication can Benefit compared to Microsoft Azure or AWS

Top 4 Areas for which your Business should have Hosted Interactive Voice Response (HIVR)

Growing Ransomware Attacks in the time of Coronavirus Pandemic

Resolving Top 8 Areas of Concerns by Clean Internet (Security as a Service)

Top 3 Telecom Solutions for Organizations while Employees are Working from Home

Air Team Theory's Book Review in QED, UK Newsletter

Applying Ideas in Real World - Air Team Theory

GrassDew's Article in Industrial Automation Magazine on Cybersecurity Assessment for Mobile Applications

oHRMS Software Product by GrassDew is recognized as Top 10 Most Recommended Employee Management Software Solution Providers of 2019 by CIO Insider

What is GrassDew? in QED September 2019 Newsletter

Interview in "The Co-Founder" magazine by GrassDew CEO Mr. Shekhar Pawar

4 Important Classifications of Physical Threats for IT Systems

Top 5 Security Concerns with Cloud

4 Key Data Pre-processing Methods for Data Mining or Data Warehousing

4 Key Benefits of Using Digital Signature for Documents

6 Easy Defensive Measures For Windows OS Machine Threats

4 Important Points Why GDPR Awareness is Important for Software Delivery Team

GrassDew's Article in Industrial Automation Magazine on "Cybersecurity - Understanding the Vulnerabilities" - Part 2

Understanding Security Issues in Mobile App Code Tampering & Reverse Engineering

Article in Industrial Automation Magazine on "Cybersecurity - Understanding the Vulnerabilities"

Top 10 Types of Bio-metric Authentication

6 Types of Malwares

6 types of IT Security areas

11 contributing factors for Information Security threats

4 Key Benefits of Vulnerability Assessment and Penetration Testing (VAPT)

Air Team Theory by Shekhar Pawar

要查看或添加评论,请登录