US military officially confirms action against ransomware groups

security
(Image credit: Shutterstock / binarydesign)

Tackling ransomware operators in the US is no longer just a job for the police, but the military and national intelligence officers and spies, government officials have revealed. 

Speaking to the New York Times, US General Paul M. Nakasone, the head of Cyber Command and the director of the National Security Agency explained that nine months ago the US government considered ransomware threats a job for law enforcement agencies.

However, as ransomware groups started targeting crucial national infrastructure (think Colonial Pipeline, JBS, and the likes), it became clear that the destructive power could undermine national security. As a result, the military took over.

Disrupting the disruptors

This new approach means taking a more aggressive, better-coordinated approach, that includes pooled resources from the Cyber Command, the National Security Agency (NSA) and many others.

The US military took actual steps against ransomware operators, General Nakasone confirmed, without going into further detail about what exactly was done, simply stating that, “Before, during and since, with a number of elements of our government, we have taken actions and we have imposed costs. That’s an important piece that we should always be mindful of.”

The New York Times did remind that in September, a country allied to the US managed to disrupt an attack from the Russian REvil ransomware group. The move prompted REvil to shut down its entire operation, at least temporarily. It also said the first known operation against a ransomware group came just before the 2020 presidential election, when it was suspected that the TrickBot group tried to fiddle with the voting. 

In his interview, held at the Reagan National Defense Forum, a gathering of national security officials, General Nakasone did confirm that the US government still has a lot to learn, and is still a long way from being effective in this battle, but added that the country was “on an upward trajectory.” 

Ever since ransomware operators drew the attention of governments, many went into hiding, shutting their operations entirely. Others, on the other hand, publicly stated they would not attack government agencies, non-profits, or hospitals. 

Every ransomware attack generally starts with a compromised endpoint. An unsuspecting employee would share login credentials with the attackers, who would then map out the network, and carefully offload sensitive data, before deploying the ransomware. 

Companies are advised to train their employees on the dangers of phishing and ransomware, deploy cybersecurity solutions such as malware removal tools, or firewalls, switch to zero-trust, and enforce multi-factor authentication.

Sead is a seasoned freelance journalist based in Sarajevo, Bosnia and Herzegovina. He writes about IT (cloud, IoT, 5G, VPN) and cybersecurity (ransomware, data breaches, laws and regulations). In his career, spanning more than a decade, he’s written for numerous media outlets, including Al Jazeera Balkans. He’s also held several modules on content writing for Represent Communications.

Read more
An American flag flying outside the US Capitol building against a blue sky
US military and defense contractors hit with Infostealer malware
Ransomware
8base ransomware site taken down in global police operation
US President Donald Trump speaks to the press as he signs an executive order to create a US sovereign wealth fund, in the Oval Office of the White House on February 3, 2025, in Washington, DC.
US set to pause cyber-offensive operations against Russia - but CISA says it won't stop
Representational image of a cybercriminal
Should ransomware payments be illegal?
An image of network security icons for a network encircling a digital blue earth.
Why effective cybersecurity is a team effort
data recovery
Ghost ransomware has hit firms in over 70 countries, FBI and CISA warn
Latest in Security
A stylized depiction of a padlocked WiFi symbol sitting in the centre of an interlocking vault.
Broadcom warns of worrying security flaws affecting VMware tools
URL phishing
HaveIBeenPwned owner suffers phishing attack that stole his Mailchimp mailing list
Ransomware
Cl0p resurgence drives ransomware attacks to new highs in 2025
cybersecurity
Chinese government hackers allegedly spent years undetected in foreign phone networks
Data leak
A major Keenetic router data leak could put a million households at risk
Code Skull
Interpol operation arrests 300 suspects linked to African cybercrime rings
Latest in News
Xbox Series X and Xbox wireless controller set to a green background
Xbox Insiders are currently testing a new Game Hub feature that looks useful, but I've got mixed feelings about it
A stylized depiction of a padlocked WiFi symbol sitting in the centre of an interlocking vault.
Broadcom warns of worrying security flaws affecting VMware tools
Microsoft Surface Laptop and Surface Pro devices on a table.
Hate Windows 11’s search? Microsoft is fixing it with AI, and that almost makes me want to buy a Copilot+ PC
Oura Ring 4
Activity tracking on Oura Ring is about to get a whole lot better, but I've got bad news about your step count
Google Pixel Buds Pro 2
Cleaned your Pixel Buds Pro 2 recently? If not, you might be getting worse sound
Google Maps on a phone being held in someone's hand
Google Maps is getting two key upgrades, for easier route planning and quicker access to Gemini AI