National
Cyber Awareness System: TA18-074A: Russian Government Cyber Activity Targeting Energy and Other Critical Infrastructure Sectors
03/15/2018 09:40 AM EDT
Original release date: March 15,
2018
Systems Affected
OverviewThis joint Technical Alert (TA) is the result of analytic efforts between the Department of Homeland Security (DHS) and the Federal Bureau of Investigation (FBI). This alert provides information on Russian government actions targeting U.S. Government entities as well as organizations in the energy, nuclear, commercial facilities, water, aviation, and critical manufacturing sectors. It also contains indicators of compromise (IOCs) and technical details on the tactics, techniques, and procedures (TTPs) used by Russian government cyber actors on compromised victim networks. DHS and FBI produced this alert to educate network defenders to enhance their ability to identify and reduce exposure to malicious activity.DHS and FBI characterize this activity as a multi-stage intrusion campaign by Russian government cyber actors who targeted small commercial facilities’ networks where they staged malware, conducted spear phishing, and gained remote access into energy sector networks. After obtaining access, the Russian government cyber actors conducted network reconnaissance, moved laterally, and collected information pertaining to Industrial Control Systems (ICS). For a downloadable copy of IOC packages and associated files, see:
DescriptionSince at least March 2016, Russian government cyber actors—hereafter referred to as “threat actors”—targeted government entities and multiple U.S. critical infrastructure sectors, including the energy, nuclear, commercial facilities, water, aviation, and critical manufacturing sectors.Analysis by DHS and FBI, resulted in the identification of distinct indicators and behaviors related to this activity. Of note, the report Dragonfly: Western energy sector targeted by sophisticated attack group, released by Symantec on September 6, 2017, provides additional information about this ongoing campaign. [1] This campaign comprises two distinct categories of victims: staging and intended targets. The initial victims are peripheral organizations such as trusted third-party suppliers with less secure networks, referred to as “staging targets” throughout this alert. The threat actors used the staging targets’ networks as pivot points and malware repositories when targeting their final intended victims. NCCIC and FBI judge the ultimate objective of the actors is to compromise organizational networks, also referred to as the “intended target.” Technical Details The threat actors in this campaign employed a variety of TTPs, including
|
Good Netiquette
And A Green Internet To All! =====================================================================
Tabula Rosa Systems - Tabula Rosa
Systems (TRS) is dedicated to providing Best of Breed Technology and
Best of Class Professional Services to our Clients. We have a portfolio of products which we
have selected for their capabilities, viability and value. TRS provides
product, design, implementation and support services on all products that we
represent. Additionally, TRS provides expertise in Network Analysis, eBusiness
Application Profiling, ePolicy and eBusiness Troubleshooting.
We can be contacted at:
sales@tabularosa.net
or 609 818 1802.
===============================================================
In addition to
this blog, Netiquette IQ has a
website with great assets which are being added to on a regular basis. I have
authored the premiere book on Netiquette, “Netiquette IQ - A Comprehensive
Guide to Improve, Enhance and Add Power to Your Email". My new book,
“You’re Hired! Super Charge Your Email Skills in 60 Minutes. . . And Get That
Job!” has just been published and will be followed by a trilogy of books on
Netiquette for young people. You can view my profile, reviews of the book and
content excerpts at:
Anyone who
would like to review the book and have it posted on my blog or website, please
contact me paul@netiquetteiq.com.