In a shock move, U.S. Defense Secretary Pete Hegseth has ordered Cyber Command to stop all cyber operations against Russia.

The Shift in Policy

On February 28th 2025, Secretary of Defense Pete Hegseth issued a directive ordering US Cyber Command to immediately call off all offensive cyber operations which target Russia. This order was communicated directly to Cyber Command’s leader, Gen. Timothy Haugh, who then instructed his teams to stand down. It was a decision which reportedly took many within the Department of Defense by surprise. Many ongoing cyber operations against Russian state-sponsored hacking groups had been in progress for some time, so the increased risk of cyberattacks was a major concern.

Established in 2010, Cyber Command has played a key role in US cybersecurity strategy for 15 years. From protecting cyberspace through to disrupting Russian cyber threats and state-backed hacking campaigns, Cyber Command has played a major role in preventing attacks which have targeted government infrastructures and private companies. It’s important to note, however, that while Cyber Command’s operations against Russia have been put on hold, other US intelligence agencies are still permitted to monitor and collect information on Russian activities online.

Why Were US Cyber Operations Stopped?

Hegseth’s directive has caused equal measures of concern and intrigue. It was a move which no one saw coming and the objectives remain unconfirmed. The main reason behind the decision appears to be a shift in foreign policy by the new administration. President Donald Trump has long been open about his desire to build diplomatic bridges with Russia, which have been tense since Moscow’s 2022 invasion of Ukraine. Trump has promised his electorate he will put a swift end to the war in Ukraine but appears to be taking the side of Russia by blaming the conflict on Ukraine.

Many suspect that, by ending cyber operations against Russia, the US administration aims to demonstrate an end to hostilities between the two nations, with the Kremlin benefitting significantly from this act of goodwill. Nonetheless, many critics are arguing that this move weakens the defenses of the US and encourages Russia to continue its cyberattacks without consequence.

Is US Cybersecurity Now at Risk?

The ramifications of this controversial decision have the potential to be far-reaching. National security has long relied on cyber strategies and operations to protect US interests. Russian cyberattacks have been plentiful in recent years, with 2024 seeing Russian hackers striking critical US infrastructures. Accordingly, the ongoing presence of Cyber Command has been crucial in countering Russian attacks in the digital landscape. Experts fear that suspending these activities could have several consequences:

What Has the Reaction from the Digital Community Been?

Understandably, this news story has caused major debate amongst politicians, journalists and commentators in the digital community. Strong opinions have been voiced, and the internet has been ablaze with polarizing comments.

Lawmakers from Congress have criticized the decision and compared it to removing the military’s ability to defend itself against aggressive action in war. At the same time, cybersecurity experts have condemned the move and pointed at the obvious fact that Russia now has free rein to target critical infrastructure in the US. Commentators on Reddit have been much harsher, with conspiracy theories swirling that Russian executives have infiltrated the Trump administration.

The Immediate Future of US Cybersecurity and Russia

For now, Cyber Command is following orders and has ceased its offensive operations. However, it remains unclear whether this is a temporary move or part of a long-term strategy. If Russian cyber activity increases significantly, surely there will be a change in policy. Only time will tell.

For more ways to secure and optimize your business technology, contact your local IT professionals.

Read More


The hacking collective RansomHub has unveiled a new strain of malware, one which is used to disable security software and leave PCs open to attack.

Discovered by security firm Sophos, RansomHub’s new malware has been dubbed EDRKillShifter. First detected during May 2024, EDRKillShifter carries out a Bring Your Own Vulnerable Driver (BYOVD) attack. The main objective of a BYOVD attack is to install a vulnerable driver on a target PC. With this driver in place, threat actors can remotely gain unauthorized access and get a foothold within the system.

The Story Behind EDRKillShifter’s Attack

EDRKillShifter typically targets Endpoint Detection and Response (EDR) security software, leaving PCs at risk of multiple malware attacks. Classed as a ‘loader’ malware, EDRKillShifter delivers a legitimate, yet vulnerable driver onto the target PC. In many cases, it’s been identified that multiple drivers, which are all vulnerable, have been introduced to PCs.

Once the vulnerable drivers have been deployed within the PC, EDRKillShifter executes a further payload within the device’s memory. This payload allows the threat actors to exploit the vulnerable drivers and, as a result, gain access to elevated privileges. This change in privileges gives the attackers the ability to disable EDR software on the machine. And the name of this software is hardcoded into EDRKillShifter’s processes, to prevent it from being restarted.

Attempts to run ransomware on compromised machines has been noted by Sophos and, digging deeper into the EDRKillShifter code, there are strong indicators that the malware originates from Russia. As regards the vulnerable drivers, these are freely available on the Github repository and have been known about for some time.

Preventing the Spread of EDRKillShifter

The mechanics of EDRKillShifter are effective and dangerous but are nothing new. Similar attacks, such as AuKill, have been carried out in the last year, and the technique currently appears popular with threat actors.

Luckily, your organization doesn’t have to fall victim to malware such as EDRKillShifter and its variants. Instead, you can maintain the security of your IT infrastructure by following these best practices:

For more ways to secure and optimize your business technology, contact your local IT professionals.

Read More


The news footage may focus on military strikes, but, behind the war in Ukraine, cyberattacks are being utilised as a major weapon by Russia. 

Government-backed cyberattacks are nothing new, and they will continue to be utilized as part of global espionage campaigns for the foreseeable future. However, while these attacks are unlikely to be aimed at small businesses, the methods and techniques employed are likely to trickle down into the arsenal of smaller hackers. Therefore, in the near future, these powerful attacks could regularly be launched against your business. 

At Ophtek, we pride ourselves on keeping our clients up to date on contemporary threats. But we also strive to keep you one step ahead of the hackers. And that’s why we’re going to take you through this latest attack. 

Understanding the Mechanics of this Military Hack  

Warfare has always relied on much more than just weapons, intelligence has always been equally important. And, with the rise of technology in the digital age, compromising IT equipment has proven to be highly rewarding in the pursuit of sensitive information. This latest attack, which has links with Russia’s FSB security service, has been launched by Shuckworm, a Russian threat actor with a long history of attacks. 

February 2023 saw Shuckworm intensifying their attacks against Ukraine, a campaign which has been running for several years. Most notably, Shuckworm have been developing new malware in conjunction with command-and-control servers. Central to these attacks has been a strain of malware called Pterodo. Developed by Shuckworm, Pterodo is a backdoor attack which is executed when malicious USB drives are installed onto PCs. The first step that Pterodo takes is to install shortcut links on the infected PC, with these links given names such as evidence.rtf.lnk in order to tempt users into clicking them. 

Clicking these links will install Pterodo on the user’s PC and allow Pterodo to spread through any connected drives and download further malware. To cover its tracks, Pterodo uses a number of innovative approaches. Numerous variants of Pterodo have been developed to bypass identification tools and, in order to conceal their identity, the related command-and-control servers regularly rotate their IP addresses. While the USB route for launching this attack appears to be Shuckworm’s preferred method, there is also evidence that it’s being spread through phishing emails. 

How Do You Beat Military Backed Hackers? 

Threat actors which receive government support are very powerful, but it doesn’t mean they are unbeatable. In fact, this latest attack by Shuckworm can easily be deflected by practicing the following: 

  • Be wary of USB drives: USB drive attacks have been commonplace for many years, so it’s important that you don’t let your guard down. Mysterious USB drives which arrive in the mail or are found out in the parking lot should be fully scrutinized and never plugged into your PCs. As well as compromising data security, malicious USB drives also have the potential to destroy your PC

For more ways to secure and optimize your business technology, contact your local IT professionals. 

Read More