CISA Launches CI Fortify Initiative to Ensure Critical Infrastructure Can Operate Offline During Cyberattacks

Published:

spot_img

CISA Launches CI Fortify Initiative to Ensure Critical Infrastructure Can Operate Offline During Cyberattacks

The Cybersecurity and Infrastructure Security Agency (CISA) has introduced a significant initiative aimed at bolstering the resilience of critical infrastructure organizations against cyberattacks. This new program, named CI Fortify, was unveiled this week and emphasizes the importance of preparing for technology and telecommunications outages that may occur during cyber crises.

CISA’s guide encourages organizations to develop strategies that allow them to maintain operations even when under attack. The initiative focuses on isolation and recovery tactics, urging critical infrastructure entities to proactively disconnect from third-party dependencies and to establish methods for functioning without reliable telecommunications and internet access. The guide also highlights the necessity for these organizations to quickly restore compromised systems while operating in isolation.

“CI Fortify is timely, actionable guidance that helps organizations protect their networks and critical services from cyber threat actors that aim to degrade or disrupt infrastructure,” stated Nick Andersen, Acting Director of CISA. He further noted that CISA will conduct targeted assessments of critical infrastructure, although he did not disclose specifics regarding the number of assessments or their locations. These evaluations will vary based on the specific organization and industry.

Andersen emphasized that the ultimate goal is for critical infrastructure organizations to develop detailed emergency plans and operational technology systems that are segmented and isolated from other network components.

Addressing Nation-State Threats: The Volt Typhoon Campaign

The CI Fortify initiative is positioned as a response to recent nation-state hacking campaigns, particularly the Volt Typhoon cyberattacks. These attacks involved Chinese threat actors who prepositioned themselves within U.S. critical infrastructure, potentially enabling destructive cyber actions in the event of military conflict. The CI Fortify webpage includes a link to a 2024 CISA advisory regarding the Volt Typhoon campaign.

When the Volt Typhoon campaign was first publicized in 2023, U.S. officials aimed to eliminate all Chinese hackers embedded within critical infrastructure systems. Jen Easterly, former CISA director, noted in 2024 that agency teams had “found and eradicated Volt Typhoon intrusions into critical infrastructure across multiple sectors.” By 2025, the focus remained on identifying and evicting Chinese cyber actors.

Despite these efforts, some U.S. officials have claimed that the Volt Typhoon initiative was “not successful” for China. Researchers have indicated that Chinese hackers remain deeply embedded in critical infrastructure systems, even after extensive efforts by U.S. law enforcement.

In comments to Recorded Future News, Andersen clarified that the CI Fortify initiative was not specifically aimed at any single nation-state actor, including Volt Typhoon. Instead, it is designed to mitigate the potential destructive impacts on operational technology from any nation-state actor. He also noted that the initiative would address tactics used during alleged Russian cyberattacks on operational technology networks in Poland earlier this year.

The Challenge of Eradication

Cybersecurity expert Matthew Hartman explained that advanced nation-state actors like Volt Typhoon are now so deeply embedded that eradication is no longer a feasible short-term outcome. He stated, “Eviction remains the objective but it cannot be the lone strategy. Prioritizing segmentation and resilience is a pragmatic shift, assuming compromise and limiting blast radius rather than chasing a constantly reconstituting threat.”

Several experts have pointed out that evicting Volt Typhoon hackers was never a realistic goal, especially since CISA acknowledged that some victims had been compromised as far back as 2019. The CISA advisory warned that Volt Typhoon repeatedly targets the same organizations and steals domain credentials to maintain access.

The Role of Artificial Intelligence

Andersen also highlighted that artificial intelligence (AI) is a primary concern driving the pivot to the CI Fortify initiative. He remarked that discussions have taken place regarding the rapid evolution of AI and its potential impact on cyber defense across various sectors, including critical infrastructure and operational technology.

Recent reports indicate that hackers are increasingly utilizing AI models to conduct cyber intrusions. For instance, incident response firm Dragos reported that a hacker employed an AI model to compromise a municipal water and drainage utility in Monterrey, Mexico.

The CI Fortify initiative represents a proactive approach to safeguarding critical infrastructure against the evolving landscape of cyber threats. By emphasizing operational resilience and isolation, CISA aims to equip organizations with the tools necessary to withstand attacks and maintain essential services.

Source: therecord.media

Keep reading for the latest cybersecurity developments, threat intelligence and breaking updates from across the Middle East.

spot_img

Related articles

Recent articles

SentinelOne Unveils Wayfinder Frontier AI Services to Strengthen Real-World Cyber Defense Against Exploitable Vulnerabilities

SentinelOne Unveils Wayfinder Frontier AI Services to Strengthen Real-World Cyber Defense Against Exploitable Vulnerabilities SentinelOne has launched its Wayfinder Frontier AI Services, a significant advancement...

NSW Department of Education Investigates Instructure Canvas Data Breach Impacting Thousands of Students and Staff

NSW Department of Education Investigates Instructure Canvas Data Breach Impacting Thousands of Students and Staff The New South Wales Department of Education is currently investigating...

Global Instructure Breach Exposes Personal Data of Thousands in Queensland Schools

Global Instructure Breach Exposes Personal Data of Thousands in Queensland Schools A significant cybersecurity incident involving the QLearn online learning platform has impacted numerous educational...

Identity-First Security Accelerates as Enterprises Shift Trust Paradigms in an AI-Driven Landscape

Identity-First Security Accelerates as Enterprises Shift Trust Paradigms in an AI-Driven Landscape World Password Day has emerged as a pivotal moment in the cybersecurity landscape,...