Earlier this month, U.S. Cyber Command (CYBERCOM) conducted a wide-ranging defensive cyberspace operation focused on sweeping for known malware, and intended to “highlight and enhance CYBERCOM’s interoperability with partners.”
Stressing the importance of interoperability, CYBERCOM explained in a press release that “by improving the consistency of information and insight sharing with unified action partners we improve the security and stability of our national networks, systems and our actions when countering malicious cyber activities.”
The 10-day operation, which ran from Oct. 3-14, had an internal focus and was designed to search for, identify, and mitigate publicly known malware and associated variations that could potentially impact the nation’s cybersecurity.
CYBERCOM explained that starting with known malware or their variations allows operators to improve processes and coordination with combatant commands, interagency, international, industry, and academic partners. When operators identified threats, their insights were shared among all partners.
“Under this framework, the operation was a continuous activity designed to strengthen the resiliency of the Department of Defense Information Network (DODIN) and other supporting systems,” said U.S. Navy Rear Adm. Matthew C. Paradise, deputy director, Operations J-3, CYBERCOM.
“Defensive Cyberspace Operations helps CYBERCOM meet its mission responsibilities by enabling and improving mission assurance of the joint force, as well as our allies and partners, by maintaining reliable and defensible networks,” Paradise added.
The operation was executed concurrently across multiple Defense Department networks, as well as globally with participating partners.