Russian State-Sponsored and Criminal Cyber Threats to Critical Infrastructure

This article is contributed. See the original author and article here.

The cybersecurity authorities of the United States, Australia, Canada, New Zealand, and the United Kingdom have released a joint Cybersecurity Advisory (CSA) to warn organizations that Russia’s invasion of Ukraine could expose organizations both within and beyond the region to increased malicious cyber activity from Russian state-sponsored cyber actors or Russian-aligned cybercrime groups.

Joint CSA: Russian State-Sponsored and Criminal Cyber Threats to Critical Infrastructure, drafted with contributions from industry members of the Joint Cyber Defense Collaborative, provides an overview of Russian state-sponsored advanced persistent threat groups, Russian-aligned cyber threat groups, and Russian-aligned cybercrime groups to help the cybersecurity community protect against possible cyber threats.

U.S., Australian, Canadian, New Zealand, and UK cybersecurity authorities urge critical infrastructure network defenders to prepare for and mitigate potential cyber threats by hardening their cyber defenses as recommended in the joint CSA.

For more information on current and historical Russian-state-sponsored cyber activity and recommended mitigations, see the following CISA webpages: 

Azure Marketplace new offers – April 20, 2022

Azure Marketplace new offers – April 20, 2022

This article is contributed. See the original author and article here.

We continue to expand the Azure Marketplace ecosystem. For this volume, 134 new offers successfully met the onboarding criteria and went live. See details of the new offers below:


 





























































































































































































































































































































































































































































































Get it now in our marketplace


Apache Web Server on Ubuntu 16.04 LTS.png

Apache Web Server on Ubuntu 16.04 LTS: Cognosys provides this preconfigured image of Apache Web Server on Ubuntu 16.04 LTS for Microsoft Azure. Deploy a self-managed Apache web server community edition at minimal cost while enjoying the benefits of enterprise-grade security.


Citrix Virtual Apps and Desktop Advanced CCU.png

Citrix Virtual Apps and Desktop Advanced CCU: Deploy apps and desktops at scale to any device with Citrix’s advanced concurrent user licensing model. Built on Microsoft Azure, this virtual desktop infrastructure solution allows you to manage all your environments from one cloud-based location.


Datto Remote Monitoring and Management for MSPs.png

Datto Remote Monitoring and Management for MSPs: This solution allows you to manage multiple endpoints with the flexibility to monitor and mitigate risk with a centralized view. It provides a modern user experience with intuitive navigation, powerful search, and insightful dashboards.


Easy Body Fit.png

Easy Body Fit: Delight shoppers, boost sales, and reduce merchandise returns with this AI-powered Easy Body Fit sizing app. The body scan solution generates perfect 3D measurements and can help your customers find a flawless fit and style, while gathering crucial consumer intelligence.


EVA Unified Commerce Consulting Sprint.png

EVA Unified Commerce Consulting Sprint: This offer provides brands and retailers insight into EVA’s SaaS solution on Microsoft Azure. EVA is a global commerce platform that ensure a seamless shopping experience by designing customer-centric architecture for running instore logistics and order flows. 


Evertrack for Information Security.png

Evertrack for Information Security: Evertrack is an AI-powered productivity management platform designed to help managers efficiently monitor, measure, track, and classify their teams’ activities. Evertrack, available only in Portuguese, is 100 percent LGPD compliant.


Evertrack for IT Inventory Management.png

Evertrack for IT Inventory Management: Evertrack for IT inventory management supports supervision of employees by combining centralized operations with information security data. Get an overview of your company’s micro and macro landscape. This application is available only in Portuguese.


Evertrack for Operational Insights.png

Evertrack for Operational Insights: This solution centralizes operational, IT, HR and information security insights so you can easily manage your employees and boost their productivity with data-driven and targeted strategies. Evertrack for Operational Insights is available only in Portuguese.


Fish Crowd Detection API.png

Fish Crowd Detection API: This solution detects a school of fish and other marine life from an input photo using AI. The Fish Crowd Detection API can be useful in developing applications for deep sea exploration and building submerged surveillance cameras for fishing ships.


Forecast Platform- ML DevOps Service .png

Forecast Platform: ML DevOps Service: Utilizing Microsoft Azure services and reference architectures, HMS Analytical Software covers the complete project lifecycle from ideation and feasibility analysis to the operationalization of a strategic enterprise-grade manufacturing intelligence platform.


IP Restriction by miniOrange.png

IP Restriction by miniOrange: This solution enables easy setup of adaptive authentication methods for extra security. Configure a list of IP addresses to allow or deny access when a user tries to login into any of the applications configured with adaptive authentication, limit the number of devices, and more.


Jekyll.png

Jekyll: This offer from Niles Partners provides Jekyll, a static html page generator, on a Microsoft Azure virtual machine. Written in Ruby, Jekyll enables clutter-free and effortless site building by rendering markdown or textile templates so you can publish static pages in one go.


LCMS.png

LCMS: With LCMS, system providers can dispatch software updates to devices. It also provides a mechanism to avoid man-in-the-middle attacks. Additionally, it verifies the software is issued by a trusted source. This can prevent malware from being installed and damaging your devices.


Lookout Cloud Security.png

Lookout Cloud Security: Lookout Cloud Access Security Broker provides advanced security monitoring and control for Microsoft Office 365 and other cloud collaboration platforms. Integrated with Azure Information Protection (AIP) it offers deep visibility and end-to-end data protection and compliance.


Magento Ready with Ubuntu Server LTS 20.04.png

Magento Ready with Ubuntu Server LTS 20.04: readymind offers this optimized Microsoft Azure virtual machine instance of Magento with Ubuntu Server LTS 20.04. Magento is an open-source e-commerce platform. This app is available only in Spanish.


MediaWiki.png

MediaWiki: This offer provides MediaWiki on a Microsoft Azure virtual machine and is powered by Niles Partners. MediaWiki is a free and open-sources software designed to run on server farms and suited to power collaborative websites with various anti-spam and anti-vandalism extensions.


Migrate to Azure Virtual Desktop -2 week POC.png

Migrate to Azure Virtual Desktop: 2-Week Proof of Concept: Hexaware offers an implementation trial to experience Microsoft Azure Virtual Desktop first-hand. It leverages Azure Virtual Desktop to build a turnkey, virtual workspace proposition that solves remote work issues and improves user experience.


Opigno LMS + Support.png

Opigno LMS + Support: This offer provides Opigno LMS with support from ATH Infosystems. Opigno is an open source, Drupal-based learning management system that offers engaging and fun lessons tailored to your specific environment, industry, and business objectives.


People Smoking Blur API.png

People Smoking Blur API: This solution detects, localizes, and blurs people smoking objects from an input photo using AI. The smoking objects must be focalized, unobstructed, with the details very clear. Pictures are not stored. Also, the photo quality and angles contribute to a higher reading accuracy.


People Smoking Detection API.png

People Smoking Detection API: This solution detects people smoking objects from an input photo using AI. The smoking objects must be focalized, unobstructed, with the details very clear. Pictures are not stored. Also, the photo quality and angles contribute to a higher reading accuracy.


Cross Platform CLI Framework pi-cli.png

pi-cli – Cross Platform CLI Framework: pi-cli is Perpetual Intelligence’s cross-platform framework for building command-line systems or interface (CLI) in the .NET ecosystem. Create CLIs with a few flags or advanced CLIs with organization commands, command groups, and subcommands.


PostgreSQL 13.3 on CentOS Stream 8.0.png

PostgreSQL 13.3 on CentOS Stream 8.0: Optimized for production environments on Microsoft Azure, this EuroDB minimal image containing PostgreSQL 13.3 on CentOS Stream 8.0 from EuroLinux is designed to support the most demanding applications. 


PostgreSQL 13.3 with EuroDB modules on CentOS Stream 8.0.png

PostgreSQL 13.3 with EuroDB Modules on CentOS Stream 8.0: This image offered by EuroLinux provides PostgreSQL 13.3 with EuroDB modules on CentOS Stream 8.0. EuroDB modules significantly expand the capabilities of the engine beyond those available in standard PostgreSQL database.


Privacy Analytics Eclipse - Enterprise.png

Privacy Analytics Eclipse – Enterprise: Eclipse empowers healthcare organizations to automate de-identification of data at scale, significantly simplifying an expert determination approach (as defined under HIPAA guidance) to safely share and reuse data, while protecting individual privacy.


Python on Ubuntu 20.04.png

Python on Ubuntu 20.04: This offer from Apps4Rent provides Python on Ubuntu 20.04. Python is a widely used programming language with a wide array of applications ranging from building websites, software, and games to programming networks.


Sea Mine Detection API.png

Sea Mine Detection API: Intended for military and naval training, this cross-browser REST API uses artificial intelligence to detect and classify underwater or floating mines from an input photo using AI. An online app may be used to check the input and output JSONs of the API.


Secured DreamFactory on Ubuntu 16.04 LTS.png

Secured DreamFactory on Ubuntu 16.04 LTS: This is a REST API for SQL and NoSQL databases, file storage, cache, email, and push notifications. Using DreamFactory, developers can build mobile, web, and IoT applications without hand coding APIs. Deploy DreamFactory instead of a vanilla install.


SilverStripe.png

SilverStripe: This offer from Niles Partners provides SilverStripe, an enhanced content management system that provides authors with an intuitive AJAX-based web interface, while developers can leverage modern programming techniques like OOP, MVC, and ORM with the robust PHP-based framework.


Supermetrics for Azure Synapse.png

Supermetrics for Azure Synapse: Supermetrics’ data integration solution makes it easy to move marketing data from different platforms to Azure Synapse or Azure Storage Container. Automated data pipelines enable you to trial and then purchase this SaaS offer at a fixed annual rate.


Tanium.png

Tanium: Tanium’s enterprise platform helps organizations gain visibility and control in real time across all endpoints regardless of their number or location. Turbocharge your security team’s capabilities so they can proactively hunt for new vulnerabilities and threats operations.



Go further with workshops, proofs of concept, and implementations


Azure ARC Hybrid Cloud Management- 4-Week Pilot Implementation.png

Azure Arc Hybrid Cloud Management: 4-Week Pilot Implementation: Collect and aggregate your operational data across a hybrid datacenter environment while modernizing infrastructure and operations into a single pane of glass with Cyclotron’s pilot implementation.


Azure Cloud Migration- 8-Week  Implementation.png

Azure Cloud Migration: 8-Week Implementation: Achieve better scalability, security, and versatility with this cost-effective and sustainable migration to Microsoft Azure. VENZO’s certified professionals will guide you throughout your cloud journey.


Azure Data Warehouse- 6-Week Proof of Concept.png

Azure Data Warehouse: 6-Week Proof of ConceptIn this engagement, Unify will work with your organization to align business, data, and analytics goals while developing a data warehouse strategy and proof of concept to support your self-service reporting needs.


 


Azure DevOps Services Offerings- 8-Week basic implementation.png

Azure DevOps Services Offerings: 8-Week Basic Implementation: Huco Fzco will help you optimize your development and delivery pipelines securely and enable you to bring your innovations to market faster using Microsoft Azure. Decrease time to market with seamless automated application delivery.


Azure Digital Business Transformation- 8-Week Implementation.png

Azure Digital Business Transformation: 8-Week Implementation: This offer from Publicis Sapient will include the foundational landing zone design and buildout on Microsoft Azure, including a defined business transformation strategy of leveraging Azure cloud services.


Azure Sentinel- 4-Week Workshop.png

Azure Sentinel: 4-Week Workshop: The experts from &Partners will provide an overview of Microsoft Azure Sentinel along with insights on active threats to your Microsoft 365 cloud and on-premises environments. You’ll gain end-to-end expertise, cost savings, audits, and more.


Microsoft Virtual Desktop- 10-Day Implementation.png

Azure Virtual Desktop: 10-Day Implementation: CruicalLogics will bring the power of cloud-native resource management to your organization with the design, planning, introduction and management of Azure Virtual Desktop. This offer will devise a functioning platform and identify key deliverables.


Azure Virtual Desktop (AVD) for Healthcare and Life Sciences- 4-Week Implementation.png

Azure Virtual Desktop for Healthcare and Life Sciences: 4-Week Implementation: In this offer, boxxe provides a range of modern, cost-effective, and flexible Azure Virtual Desktop services designed for the healthcare industry, so your staff can connect securely and provide services from anywhere.


Azure Virtual Desktop Pilot- 12-Day Proof of Concept.png

Azure Virtual Desktop Pilot: 12-Day Proof of Concept: Allow Phoenix to architect, deploy, and manage performant End User Computing (EUC) solutions to cope with the high demands of the modern, mobile workforce. This pilot offer is for up to 40 users to test and begin their move to Azure Virtual Desktop.


BSG Power BI Administrator- 4-Hour Implementation Support.png

Power BI Administrator from BSG: 4-Hour Implementation: Administrate your Microsoft Power BI tenant and back up and restore your artifacts in Power BI by leveraging Azure Blob Storage and Azure Functions with this offering from BSgroup. Monitor your user activity and store it for later analysis.


Business Opportunities with Azure- Half-Day Workshop.png

Business Opportunities with Azure: Half-Day Workshop: This offering is only available in French. A Softcom Technologies Microsoft Azure cloud expert will help you identify opportunities to use Azure to help digitalize your business. Learn what it takes to set up Azure and more.


Citrix on Azure Deployment Services- 7-Day Implementation.png

Citrix on Azure Deployment Services: 7-Day Implementation: Wordtext Systems will help deploy Citrix virtualization on Microsoft Azure so your IT team can have the flexibility of delivering enterprise-class VDI infrastructure services for Windows apps and desktops with the benefits of cloud elasticity.


Cloud for Marketing by 55 -full day use case Workshop.png

Cloud for Marketing by 55: 1-Day Workshop: The objective of this workshop from 55 is to define the marketing data architecture and organization you need to implement the top priority use cases to meet your goals. Fully control the tools, data sources, and algorithms that inform your marketing decisions.


Customer Data Platform AI + ML Data Intelligence- 6-Week Proof of Concept.png

Customer Data Intelligence Platform: 6-Week Proof of Concept: This offer from Publicis Sapient provides a real-time, unified intelligent insights view into your customer data by leveraging Microsoft Azure data, machine learning, and analysis services. The solution is focused on the retail and media industries.


Cyber Resilience with SAP on Azure.png

Cyber Resilience with SAP on Azure: This service from Kyndryl’s integrates the cloud-native environment of Microsoft Azure with Azure Active Directory, Microsoft Defender and other custom services to ensure your business data from SAP is protected.


Data & AI Consulting Services- 3-Month Implementation.png

Data & AI Consulting Services: 3-Month Implementation: Inetum-Realdolmen will set up a modern data platform on Microsoft Azure so you can move past traditional reports and dashboards to building industry-level business analytics apps powered by AI and ML.


DevOps Modernization- 2-Day Workshop.png

DevOps Modernization: 2-Day Workshop: Active Solution will combine analytic design methods and qualitative assessments to identify your business objectives, user roles, and needs, resulting in a roadmap for a more comprehensive and efficient Azure DevOps process.


Digital Identity Framework- 5-Week Implementation.png

Digital Identity Framework: 5-Week Implementation: Gain a global view of your organization’s user identities and protect your applications with Neudesic’s solution. Their experts will enable multifactor authentication through Microsoft Azure Active Directory and deploy an Azure landing zone.


Digital Twin- 10-Week Proof of Concept.png

Digital Twin: 10-Week Proof of Concept: OpenSistemas will demonstrate how to make your product lifecycles and factory processes predictive, prescriptive, and self-aware. Utilizing Microsoft Azure IoT services you will learn to visualize and contextualize data on a virtual asset for sophisticated analytics.


Disaster Recovery in Azure- 5-Week Implementation.png

Disaster Recovery in Azure: 5-Week Implementation: Get trained on how to deploy a disaster recovery solution to keep your workloads and data safe in this implementation from AMTRA. Remediation of workloads on Microsoft Azure and DR solution compatibility are part of this cost-effective offer.


GitHub Enablement- 1-Week Proof of Concept .png

GitHub Enablement: 1-Week Proof of Concept: Drive a cost-optimized, secure, and Microsoft Azure-ready GitHub migration journey with Insight’s offering. Insight will work with you to scope, plan, and execute a proof of concept of GitHub Enterprise and selected DevOps processes and apps on Azure.


Infrastructure as Code (IaC) on Microsoft Azure- 3-Week Implementation.png

Infrastructure as Code (IaC) on Microsoft Azure: 3-Week Implementation: To address the issue of error-prone and time-consuming manual infrastructure setting, eliminating human error, VOLO offers Infrastructure as Code implementation along with configuration management for Azure.


Managed Sentinel XDR- 1-Week Implementation .png

Managed Azure Sentinel Extended Detection Response: 1-Week Implementation: HTG will utilize Microsoft Azure security tools to deliver managed detection and response services in real-time so you can respond effectively against cyber events, including phishing, malware and ransomware attacks.


Microsoft Azure + Nutanix Frame- 5-Day Workshop.png

Microsoft Azure + Nutanix Frame: 5-Day Workshop: Egroup will show you how to leverage the power of Microsoft Azure to quickly and easily deploy hundreds or thousands of Nutanix Frame-based applications and desktops as needed without the burdens of infrastructure management.


Master Data Management- 4-Day Profisee Workshop.png

Profisee Master Data Management: 4-Day Workshop: QS2’s customized Master Data Management workshop can be used as quick start for your data governance journey. The workshop environment is built using Profisee MDM running in QS2’s Microsoft Azure training environment.


Rise Technology - App Modernization- 4-Week Implementation.png

Rise Technology – App Modernization: 4-Week Implementation: Rise Technology will partner with you in your modernization projects by systematically reviewing a variety of environments and infrastructure and mapping their features and functionality to Microsoft Azure workloads.


Rise Technology - Cloud Native App Redesign- 28-Week Implementation.png

Rise Technology – Cloud Native App Redesign: 28-Week Implementation: Accelerate business outcomes with Rise Technology’s app redesign services. Utilizing Azure Kubernetes Service and microservices architecture you will learn how to create end-to-end CI/CD pipelines and automate processes.


The Data Value Capture- 1-Day Workshop.png

The Data Value Capture: 1-Day Workshop: By combining design thinking, industry and domain-specific expertise, and a set of accelerators that reside on the Microsoft Azure platform, Wavicle Data Solutions will identify opportunities and develop a value-based roadmap for modernizing your data platform.


Thinkubator- 8-Week Implementation.png

Thinkubator: 8-Week Implementation: Sogeti’s Intelligent Experience Thinkubator will implement a chatbot using Azure Cognitive Services to accelerate your business outcomes and AI digital transformation initiatives. Key focus areas include vision, speech, language, knowledge, and search.


WatServ IoT Blueprint- 4-Week Discovery Workshop.png

WatServ IoT Blueprint: 4-Week Discovery Workshop: Data engineers from WatServ will help you get clarity on your next IoT project using the power of the Microsoft Azure IoT platform. Unlock the full value of your data to meet your current and future business objectives.



Contact our partners



Abstracta – A Data Abstraction Platform



AccuNix



Aggregion Data Collaboration Platform



Aparavi



Apollo Hospitals AICVD



appCURE Packager v3



Apporetum – Application Access Management



AVEVA Data Hub



Azure Application Migration: 2-Day Assessment



Azure Discovery Service: 6-Week Assessment



Azure Governance: 4-Week Assessment



Azure Migration Readiness: 1-Week Assessment



Azure Platform Foundation and Landing Zone: 2-Hour Briefing



Azure Sentinel: Managed Services



Azure Virtual Desktop: 3-Day Assessment



Birlasoft iSight Platform



Calastone Funds Network



Calastone Money Market Services



Clea AI & IoT Solution



Client Lifecycle Management: Automated AML and KYC Compliance



Cloud Wallet: Take Control of Your Cloud Spend



Cyber Resilience Maturity: 2- to 3-Week Assessment



Cytomate Advanced Persistent Threats (APT)



Data & AI Discovery: 10-Day Assessment



Data Estate: 5-Week Assessment



Data Management & Governance: 12-Week Assessment



Data Strategy: 10-Day Assessment



Datacenter Transformation: 3-Week Assessment



Datto Continuity for Microsoft Azure (DCMA) for MSPs



Datto SaaS Defense for Microsoft 365 for MSPs



Demand Forecasting SaaS Offering



DevSecOps: 4-Week Assessment



Distributed Market Infrastructure (DMI) Fund Services



DWH/BI Architecture: 4-Week Assessment



eMeetings Platform



Enterprise Microsoft Adoption: 1-Day Assessment



EY Data Fabric



EY Lifecycle Navigation (EY Lion)



F5 Distributed Cloud Bot Defense Service Node



FHIR Jumpstart



Hackrate Pentest-as-a-Service



Harbor Exporter Packaged by Bitnami



HCL Accelerate on Azure: 1-Hour Briefing



Hybrid Cloud Transformation Using Stack HCI & Azure Arc: 3-Week Assessment



IBM Consulting Global Azure App Modernization OpenShift Services



IBM Consulting Global Azure Cloud Native Services



IDENCE



KUDO for Microsoft Teams



Lead with Data: 10-Day Assessment



Link Retail Video Analytics



Managed Detection & Response



Managed SOC with CARE



Microsoft Azure Sentinel SOC Services: 8-Week Assessment



Modern Tech Ops Maturity: 2-Hour Assessment



NVISO Managed Security for SME



NXLog AIX Audit for Azure Sentinel



OpenText RightFax



Project Management Automation Tools



Retail Forecasting



Rise App Modernization: 1-Week Assessment



SecureKi Privileged Access Management Solution



SMB Microsoft Adoption: 1-Day Assessment



StormForge Optimize



Streamwise D.I. Solution



Sybase to Azure SQL Database: 5-Week Assessment



Synergy Indicata: Grant Management Software



Synergy Indicata: Portfolio Management, Monitoring & Evaluation Software



Synergy PFM: Integrated Public Financial Management



Tanium



TradLinx ShipGo



VenueArc – Automated Contract Generator



VenueArc – Clientele Management



VenueArc – Venue Booking Calendar



Verified Biometric Authentication


Russian State-Sponsored and Criminal Cyber Threats to Critical Infrastructure

This article is contributed. See the original author and article here.

Russian State-Sponsored Cyber Operations

Russian state-sponsored cyber actors have demonstrated capabilities to compromise IT networks; develop mechanisms to maintain long-term, persistent access to IT networks; exfiltrate sensitive data from IT and operational technology (OT) networks; and disrupt critical industrial control systems (ICS)/OT functions by deploying destructive malware. 
Historical operations have included deployment of destructive malware—including BlackEnergy and NotPetya—against Ukrainian government and critical infrastructure organizations. Recent Russian state-sponsored cyber operations have included DDoS attacks against Ukrainian organizations. Note: for more information on Russian state-sponsored cyber activity, including known TTPs, see joint CSA Understanding and Mitigating Russian State-Sponsored Cyber Threats to U.S. Critical Infrastructure

Cyber threat actors from the following Russian government and military organizations have conducted malicious cyber operations against IT and/or OT networks:

  • The Russian Federal Security Service (FSB), including FSB’s Center 16 and Center 18
  • Russian Foreign Intelligence Service (SVR)
  • Russian General Staff Main Intelligence Directorate (GRU), 85th Main Special Service Center (GTsSS)
  • GRU’s Main Center for Special Technologies (GTsST)
  • Russian Ministry of Defense, Central Scientific Institute of Chemistry and Mechanics (TsNIIKhM)

The Russian Federal Security Service

Overview: FSB, the KGB’s successor agency, has conducted malicious cyber operations targeting the Energy Sector, including UK and U.S. energy companies, U.S. aviation organizations, U.S. government and military personnel, private organizations, cybersecurity companies, and journalists. FSB has been known to task criminal hackers for espionage-focused cyber activity; these same hackers have separately been responsible for disruptive ransomware and phishing campaigns.

Industry reporting identifies three intrusion sets associated with the FSB, but the U.S. and UK governments have only formally attributed one of these sets—known as BERSERK BEAR—to FSB.

  • BERSERK BEAR (also known as Crouching Yeti, Dragonfly, Energetic Bear, and Temp.Isotope) has, according to industry reporting, historically targeted entities in Western Europe and North America including state, local, tribal, and territorial (SLTT) organizations, as well as Energy, Transportation Systems, and Defense Industrial Base (DIB) Sector organizations. This group has also targeted the Water and Wastewater Systems Sector and other critical infrastructure facilities. Common TTPs include scanning to exploit internet-facing infrastructure and network appliances, conducting brute force attacks against public-facing web applications, and leveraging compromised infrastructure—often websites frequented or owned by their target—for Windows New Technology Local Area Network Manager (NTLM) credential theft. Industry reporting assesses that this actor has a destructive mandate.

The U.S. and UK governments assess that this APT group is almost certainly FSB’s Center 16, or Military Unit 71330, and that FSB’s Center 16 has conducted cyber operations against critical IT systems and infrastructure in Europe, the Americas, and Asia. 

Resources: for more information on BERSERK BEAR, see the MITRE ATT&CK® webpage on Dragonfly.

High-Profile Activity: in 2017, FSB employees, including one employee in the FSB Center for Information Security (also known as Unit 64829 and Center 18), were indicted by the U.S. Department of Justice (DOJ) for accessing email accounts of U.S. government and military personnel, private organizations, and cybersecurity companies, as well as email accounts of journalists critical of the Russian government.[9] More recently, in 2021, FSB Center 16 officers were indicted by the U.S. DOJ for their involvement in a multi-stage campaign in which they gained remote access to U.S. and international Energy Sector networks, deployed ICS-focused malware, and collected and exfiltrated enterprise and ICS-related data. One of the victims was a U.S. nuclear power plant.[10

Resources: for more information on FSB, see: 

Russian Foreign Intelligence Service

Overview: SVR has operated an APT group since at least 2008 that has targeted multiple critical infrastructure organizations. SVR cyber threat actors have used a range of initial exploitation techniques that vary in sophistication coupled with stealthy intrusion tradecraft within compromised networks. SVR cyber actors’ novel tooling and techniques include:

  • Custom, sophisticated multi-platform malware targeting Windows and Linux systems (e.g., GoldMax and TrailBlazer); and
  • Lateral movement via the “credential hopping” technique, which includes browser cookie theft to bypass multifactor authentication (MFA) on privileged cloud accounts.[11]

High-Profile Activity: the U.S. Government, the Government of Canada, and the UK Government assess that SVR cyber threat actors were responsible for the SolarWinds Orion supply chain compromise and the associated campaign that affected U.S. government agencies, critical infrastructure entities, and private sector organizations.[12][13][14]

Also known as: APT29, COZY BEAR, CozyDuke, Dark Halo, The Dukes, NOBELIUM, and NobleBaron, StellarParticle, UNC2452, YTTRIUM [15]

Resources: for more information on SVR, see:

For more information on the SolarWinds Orion supply chain compromise, see:

GRU, 85th Main Special Service Center

Overview: GTsSS, or Unit 26165, is an APT group that has operated since at least 2004 and primarily targets government organizations, travel and hospitality entities, research institutions, and non-governmental organizations, in addition to other critical infrastructure organizations. 

According to industry reporting, GTsSS cyber actors frequently collect credentials to gain initial access to target organizations. GTsSS actors have collected victim credentials by sending spearphishing emails that appear to be legitimate security alerts from the victim’s email provider and include hyperlinks leading to spoofed popular webmail services’ logon pages. GTsSS actors have also registered domains to conduct credential harvesting operations. These domains mimic popular international social media platforms and masquerade as tourism- and sports-related entities and music and video streaming services.

High-Profile Activity: the U.S. Government assesses that GTsSS cyber actors have deployed Drovorub malware against victim devices as part of their cyber espionage operations.[16] The U.S. Government and UK Government assess that GTsSS actors used a Kubernetes® cluster to conduct widespread, distributed, and anonymized brute force access attempts against hundreds of government and private sector targets worldwide.[17

Also known as: APT28, FANCY BEAR, Group 74, IRON TWILIGHT, PawnStorm, Sednit, SNAKEMACKEREL, Sofacy, STRONTIUM, Swallowtail, TG-4127, Threat Group-4127, and Tsar Team [18]

Resources: for more information on GTsSS, see the MITRE ATT&CK webpage on APT28

GRU’s Main Center of Special Technologies

Overview: GTsST, or Unit 74455, is an APT group that has operated since at least 2009 and has targeted a variety of critical infrastructure organizations, including those in the Energy, Transportation Systems, and Financial Services Sectors. According to industry reporting, GTsST also has an extensive history of conducting cyber espionage as well as destructive and disruptive operations against NATO member states, Western government and military organizations, and critical infrastructure-related organizations, including in the Energy Sector.

The primary distinguishing characteristic of the group is its operations use techniques aimed at causing disruptive or destructive effects at targeted organizations using DDoS attacks or wiper malware. The group’s destructive operations have also leveraged wiper malware that mimics ransomware or hacktivism and can result in collateral effects to organizations beyond the primary intended targets. Some of their disruptive operations have shown disregard or ignorance of potential secondary or tertiary effects. 

High-Profile Activity: the malicious activity below has been previously attributed to GTsST by the U.S. Government and the UK Government.[19][20]

The U.S. Government, the Government of Canada, and UK Government have also attributed the October 2019 large-scale, disruptive cyber operations against a range of Georgian web hosting providers to GTsST. This activity resulted in websites—including sites belonging to the Georgian government, courts, non-government organizations (NGOs), media, and businesses—being defaced and interrupted the service of several national broadcasters.[21]22][23]

Also known as: ELECTRUM, IRON VIKING, Quedagh, the Sandworm Team, Telebots, VOODOO BEAR [24]

Resources: for more information on GTsST, see the MITRE ATT&CK webpage on Sandworm Team

Russian Ministry of Defense, Central Scientific Institute of Chemistry and Mechanics 

Overview: TsNIIKhM, as described on their webpage, is a research organization under Russia’s Ministry of Defense (MOD). Actors associated with TsNIIKhM have developed destructive ICS malware.

High-Profile Activity: TsNIIKhM has been sanctioned by the U.S. Department of the Treasury for connections to the destructive Triton malware (also called HatMan and TRISIS); TsNIIKhM has been sanctioned by the UK Foreign, Commonwealth, and Development Office (FCDO) for a 2017 incident that involved safety override controls (with Triton malware) in a foreign oil refinery.[25][26] In 2021, the U.S. DOJ indicted a TsNIIKhM Applied Development Center (ADC) employee for conducting computer intrusions against U.S. Energy Sector organizations. The indicted employee also accessed the systems of a foreign oil refinery and deployed Triton malware.[27] Triton is a custom-built malware designed to manipulate safety instrumented systems within ICS controllers, disabling the safety alarms that prevent dangerous conditions. 

Also known as: Temp.Veles, XENOTIME [28]

Resources: for more information on TsNIIKhM, see the MITRE ATT&CK webpage on TEMP.Veles. For more information on Triton, see:

Russian-Aligned Cyber Threat Groups

In addition to the APT groups identified in the Russian State-Sponsored Cyber Operations section, industry reporting identifies two intrusion sets—PRIMITIVE BEAR and VENOMOUS BEAR—as state-sponsored APT groups, but U.S., Australian, Canadian, New Zealand, and UK cyber authorities have not attributed these groups to the Russian government.

  • PRIMITIVE BEAR has, according to industry reporting, targeted Ukrainian organizations since at least 2013. This activity includes targeting Ukrainian government, military, and law enforcement entities using high-volume spearphishing campaigns to deliver its custom malware. According to industry reporting, PRIMITIVE BEAR conducted multiple cyber operations targeting Ukrainian organizations in the lead up to Russia’s invasion.

Resources: for more information on PRIMITIVE BEAR, see the MITRE ATT&CK webpage on the Gamaredon Group.

  • VENOMOUS BEAR has, according to industry reporting, historically targeted governments aligned with the North Atlantic Treaty Organization (NATO), defense contractors, and other organizations of intelligence value. Venomous Bear is known for its unique use of hijacked satellite internet connections for command and control (C2). It is also known for the hijacking of other non-Russian state-sponsored APT actor infrastructure.[29] VENOMOUS BEAR has also historically leveraged compromised infrastructure and maintained an arsenal of custom-developed sophisticated malware families, which is extremely complex and interoperable with variants developed over time. VENOMOUS BEAR has developed tools for multiple platforms, including Windows, Mac, and Linux.[30

Resources: for more information on VENOMOUS BEAR, see the MITRE ATT&CK webpage on Turla.

Russian-Aligned Cybercrime Groups

Cybercrime groups are typically financially motivated cyber actors that seek to exploit human or security vulnerabilities to enable direct theft of money (e.g., by obtaining bank login information) or by extorting money from victims. These groups pose consistent threats to critical infrastructure organizations globally. 

Since Russia’s invasion of Ukraine in February 2022, some cybercrime groups have independently publicly pledged support for the Russian government or the Russian people and/or threatened to conduct cyber operations to retaliate against perceived attacks against Russia or materiel support for Ukraine. These Russian-aligned cybercrime groups likely pose a threat to critical infrastructure organizations primarily through:

  • Deploying ransomware through which cyber actors remove victim access to data (usually via encryption), potentially causing significant disruption to operations.
  • Conducting DDoS attacks against websites. 
    • In a DDoS attack, the cyber actor generates enough requests to flood and overload the target page and stop it from responding. 
    • DDoS attacks are often accompanied by extortion. 
    • According to industry reporting, some cybercrime groups have recently carried out DDoS attacks against Ukrainian defense organizations, and one group claimed credit for DDoS attack against a U.S. airport the actors perceived as supporting Ukraine (see the Killnet section).

Based on industry and open-source reporting, U.S., Australian, Canadian, New Zealand, and UK cyber authorities assess multiple Russian-aligned cybercrime groups pose a threat to critical infrastructure organizations. These groups include:

  • The CoomingProject
  • Killnet
  • MUMMY SPIDER 
  • SALTY SPIDER
  • SCULLY SPIDER
  • SMOKEY SPIDER
  • WIZARD SPIDER
  • The Xaknet Team

Note: although some cybercrime groups may conduct cyber operations in support of the Russian government, U.S., Australian, Canadian, New Zealand, and UK cyber authorities assess that cyber criminals will most likely continue to operate primarily based on financial motivations, which may include targeting government and critical infrastructure organizations.

The CoomingProject

Overview: the CoomingProject is a criminal group that extorts money from victims by exposing or threatening to expose leaked data. Their data leak site was launched in August 2021.[31] The CoomingProject stated they would support the Russian Government in response to perceived cyberattacks against Russia.[32]

Killnet

Overview: according to open-source reporting, Killnet released a video pledging support to Russia.[33
Victims: Killnet claimed credit for carrying out a DDoS attack against a U.S. airport in March 2022 in response to U.S. materiel support for Ukraine.[34]

MUMMY SPIDER

Overview: MUMMY SPIDER is a cybercrime group that creates, distributes, and operates the Emotet botnet. Emotet is advanced, modular malware that originated as a banking trojan (malware designed to steal information from banking systems but that may also be used to drop additional malware and ransomware). Today Emotet primarily functions as a downloader and distribution service for other cybercrime groups. Emotet has been used to deploy WIZARD SPIDER’s TrickBot, which is often a precursor to ransomware delivery. Emotet has worm-like features that enable rapid spreading in an infected network. 

Victims: according to open sources, Emotet has been used to target industries worldwide, including financial, e-commerce, healthcare, academia, government, and technology organizations’ networks.

Also known as: Gold Crestwood, TA542, TEMP.Mixmaster, UNC3443

Resources: for more information on Emotet, see joint Alert Emotet Malware. For more information on TrickBot, see joint CSA TrickBot Malware

SALTY SPIDER

Overview: SALTY SPIDER is a cybercrime group that develops and operates the Sality botnet. Sality is a polymorphic file infector that was discovered in 2003; since then, it has been replaced by more advanced peer-to-peer (P2P) malware loaders.[35]

Victims: according to industry reporting, in February 2022, SALTY SPIDER conducted DDoS attacks against Ukrainian web forums used to discuss events relating to Russia’s military offensive against the city of Kharkiv.

Also known as: Sality

SCULLY SPIDER

Overview: SCULLY SPIDER is a cybercrime group that operates using a malware-as-a-service model; SCULLY SPIDER maintains command and control infrastructure and sells access to their malware and infrastructure to affiliates, who distribute their own malware.[36][37] SCULLY SPIDER develops and operates the DanaBot botnet, which originated primarily as a banking Trojan but expanded beyond banking in 2021 and has since been used to facilitate access for other types of malware, including TrickBot, DoppelDridex, and Zloader. Like Emotet, Danabot effectively functions as an initial access vector for other malware, which can result in ransomware deployment.

According to industry reporting, recent DDoS activity by the DanaBot botnet suggests SCULLY SPIDER has operated in support of Russia’s military offensive in Ukraine. 

Victims: SCULLY SPIDER affiliates have primarily targeted organizations in the United States, Canada, Germany, United Kingdom, Australia, Italy, Poland, Mexico, and Ukraine.[38] According to industry reporting, in March 2022, Danabot was used in DDoS attacks against multiple Ukrainian government organizations. 

Also known as: Gold Opera

SMOKEY SPIDER

Overview: SMOKEY SPIDER is a cybercrime group that develops Smoke Loader (also known as Smoke Bot), a malicious bot that is used to upload other malware. Smoke Loader has been available since at least 2011, and operates as a malware distribution service for a number of different payloads, including—but not limited to—DanaBot, TrickBot, and Qakbot.

Victims: according to industry reporting, Smoke Loader was observed in March 2022 distributing DanaBot payloads that were subsequently used in DDoS attacks against Ukrainian targets.
Resources: for more information on Smoke Loader, see the MITRE ATT&CK webpage on Smoke Loader.

WIZARD SPIDER

Overview: WIZARD SPIDER is a cybercrime group that develops TrickBot malware and Conti ransomware. Historically, the group has paid a wage to the ransomware deployers (referred to as affiliates), some of whom may then receive a share of the proceeds from a successful ransomware attack. In addition to TrickBot, notable initial access and persistence vectors for affiliated actors include Emotet, Cobalt Strike, spearphishing, and stolen or weak Remote Desktop Protocol (RDP) credentials.

After obtaining access, WIZARD SPIDER affiliated actors have relied on various publicly available and otherwise legitimate tools to facilitate earlier stages of the attack lifecycle before deploying Conti ransomware.

WIZARD SPIDER pledged support to the Russian government and threatened critical infrastructure organizations of countries perceived to carry out cyberattacks or war against the Russian government.[39] They later revised this pledge and threatened to retaliate against perceived attacks against the Russian people.[40]

Victims: Conti victim organizations span across multiple industries, including construction and engineering, legal and professional services, manufacturing, and retail. In addition, WIZARD SPIDER affiliates have deployed Conti ransomware against U.S. healthcare and first responder networks.

Also known as: UNC2727, Gold Ulrick

Resources: for more information on Conti, see joint CSA Conti Ransomware. For more information on TrickBot, see joint CSA TrickBot Malware

The XakNet Team

Overview: XakNet is a Russian-language cyber group that has been active as early as March 2022. According to open-source reporting, the XakNet Team threatened to target Ukrainian organizations in response to perceived DDoS or other attacks against Russia.[41] According to reporting from industry, on March 31, 2022, XakNet released a statement stating they would work “exclusively for the good of [Russia].” According to industry reporting, the XakNet Team may be working with or associated with Killnet actors, who claimed credit for the DDoS attacks against a U.S. airport (see the Killnet section).

Victims: according to industry reporting, in late March 2022, the XakNet Team leaked email contents of a Ukrainian government official. The leak was accompanied by a political statement criticizing the Ukrainian government, suggesting the leak was politically motivated. 

U.S., Australian, Canadian, New Zealand, and UK cyber authorities urge critical infrastructure organizations to prepare for and mitigate potential cyber threats by immediately (1) updating software, (2) enforcing MFA, (3) securing and monitoring RDP and other potentially risky services, and (4) providing end-user awareness and training.

  • Update software, including operating systems, applications, and firmware, on IT network assets. Prioritize patching known exploited vulnerabilities and critical and high vulnerabilities that allow for remote code execution or denial-of-service on internet-facing equipment.
    • Consider using a centralized patch management system. For OT networks, use a risk-based assessment strategy to determine the OT network assets and zones that should participate in the patch management program.  
    • Consider signing up for CISA’s cyber hygiene services, including vulnerability scanning, to help reduce exposure to threats. CISA’s vulnerability scanning service evaluates external network presence by executing continuous scans of public, static IP addresses for accessible services and vulnerabilities.
  • Enforce MFA to the greatest extent possible and require accounts with password logins, including service accounts, to have strong passwords. Do not allow passwords to be used across multiple accounts or stored on a system to which an adversary may have access. As Russian state-sponsored APT actors have demonstrated the ability to exploit default MFA protocols and known vulnerabilities, organizations should review configuration policies to protect against “fail open” and re-enrollment scenarios. For more information, see joint CSA Russian State-Sponsored Cyber Actors Gain Network Access by Exploiting Default Multifactor Authentication Protocols and “PrintNightmare” Vulnerability.
  • If you use RDP and/or other potentially risky services, secure and monitor them closely. RDP exploitation is one of the top initial infection vectors for ransomware, and risky services, including RDP, can allow unauthorized access to your session using an on-path attacker.
    • Limit access to resources over internal networks, especially by restricting RDP and using virtual desktop infrastructure. After assessing risks, if RDP is deemed operationally necessary, restrict the originating sources and require MFA to mitigate credential theft and reuse. If RDP must be available externally, use a virtual private network (VPN) or other means to authenticate and secure the connection before allowing RDP to connect to internal devices. Monitor remote access/RDP logs, enforce account lockouts after a specified number of attempts to block brute force attempts, log RDP login attempts, and disable unused remote access/RDP ports.
    • Ensure devices are properly configured and that security features are enabled. Disable ports and protocols that are not being used for a business purpose (e.g., RDP Transmission Control Protocol Port 3389). 
  • Provide end-user awareness and training to help prevent successful targeted social engineering and spearphishing campaigns. Phishing is one of the top infection vectors for ransomware, and Russian state-sponsored APT actors have conducted successful spearphishing campaigns to gain credentials of target networks.
    • Ensure that employees are aware of potential cyber threats and delivery methods. 
    • Ensure that employees are aware of what to do and whom to contact when they receive a suspected phishing email or suspect a cyber incident.

As part of a longer-term effort, implement network segmentation to separate network segments based on role and functionality. Network segmentation can help prevent the spread of ransomware and threat actor lateral movement by controlling traffic flows between—and access to—various subnetworks.

  • Ensure OT assets are not externally accessible. Ensure strong identity and access management when OT assets needs to be externally accessible.
  • Appropriately implement network segmentation between IT and OT networks. Network segmentation limits the ability of adversaries to pivot to the OT network even if the IT network is compromised. Define a demilitarized zone that eliminates unregulated communication between the IT and OT networks.
  • Organize OT assets into logical zones by considering criticality, consequence, and operational necessity. Define acceptable communication conduits between the zones and deploy security controls to filter network traffic and monitor communications between zones. Prohibit ICS protocols from traversing the IT network.

To further prepare for and mitigate cyber threats from Russian state-sponsored or criminal actors, U.S., Australian, Canadian, New Zealand, and UK cyber authorities encourage critical infrastructure organizations to implement the recommendations listed below.

Preparing for Cyber Incidents

  • Create, maintain, and exercise a cyber incident response and continuity of operations plan. 
    • Ensure the cyber incident response plan contains ransomware- and DDoS-specific annexes. For information on preparing for DDoS attacks, see NCSC-UK guidance on preparing for denial-of-service attacks.
    • Keep hard copies of the incident response plan to ensure responders and network defenders can access the plan if the network has been shut down by ransomware, etc.
  • Maintain offline (i.e., physically disconnected) backups of data. Backup procedures should be conducted on a frequent, regular basis (at a minimum every 90 days). Regularly test backup procedures and ensure that backups are isolated from network connections that could enable the spread of malware.
    • Ensure the backup keys are kept offline as well, to prevent them being encrypted in a ransomware incident.
  • Ensure all backup data is encrypted, immutable (i.e., cannot be altered or deleted), and covers the entire organization’s data infrastructure with a particular focus on key data assets.
  • Develop recovery documentation that includes configuration settings for common devices and critical equipment. Such documentation can enable more efficient recovery following an incident.
  • Identify the attack surface by mapping and accounting all external-facing assets (applications, servers, IP addresses) that are vulnerable to DDoS attacks or other cyber operations.
  • For OT assets/networks:
    • Identify a resilience plan that addresses how to operate if you lose access to—or control of—the IT and/or OT environment.
    • Identify OT and IT network interdependencies and develop workarounds or manual controls to ensure ICS networks can be isolated from IT networks if the connections create risk to the safe and reliable operation of OT processes. Regularly test contingency plans, such as manual controls, so that safety-critical functions can be maintained during a cyber incident. Ensure that the OT network can operate at necessary capacity even if the IT network is compromised.
    • Regularly test manual controls so that critical functions can be kept running if ICS or OT networks need to be taken offline.
    • Implement data backup procedures.
    • Develop recovery documents that include configuration settings for common devices and critical OT equipment. 

Identity and Access Management

  • Require accounts with password logins, including service accounts, to have strong passwords and do not allow passwords to be used across multiple accounts or stored on a system to which an adversary may have access. Consider using a password manager; see NCSC-UK’s Password Manager Buyers Guide for guidance.
  • Implement authentication timeout and lockout features to prevent repeated failed login attempts and successful brute-force attempts.
  • Create a deny list of known compromised credentials and prevent users from using known-compromised passwords.
  • Secure credentials by restricting where accounts and credentials can be used and by using local device credential protection features. Russian state-sponsored APT actors have demonstrated their ability to maintain persistence using compromised credentials.
    • Use virtualizing solutions on modern hardware and software to ensure credentials are securely stored.
    • Ensure storage of clear text passwords in Local Security Authority Subsystem Service (LSASS) memory is disabled. Note: for Windows 8, this is enabled by default. For more information see Microsoft Security Advisory Update to Improve Credentials Protection and Management.
    • Consider disabling or limiting NTLM and WDigest Authentication.
    • Implement Credential Guard for Windows 10 and Server 2016 (refer to Microsoft: Manage Windows Defender Credential Guard for more information). For Windows Server 2012R2, enable Protected Process Light for Local Security Authority (LSA).
    • Minimize the Active Directory (AD) attack surface to reduce malicious ticket-granting activity. Malicious activity such as “Kerberoasting” takes advantage of Kerberos’ Ticket Granting Service (TGS) and can be used to obtain hashed credentials that malicious cyber actors attempt to crack.
  • Audit domain controllers to log successful Kerberos TGS requests and ensure the events are monitored for anomalous activity.  
    • Secure accounts.
    • Enforce the principle of least privilege. Administrator accounts should have the minimum permission necessary to complete their tasks.
    • Ensure there are unique and distinct administrative accounts for each set of administrative tasks.
    • Create non-privileged accounts for privileged users and ensure they use the non-privileged accounts for all non-privileged access (e.g., web browsing, email access).
  • Disable inactive accounts uniformly across the AD, MFA systems, etc.
  • Implement time-based access for privileged accounts. The FBI and CISA observed cybercriminals conducting increasingly impactful attacks against U.S. entities on holidays and weekends in 2021. Threat actors may view holidays and weekends—when offices are normally closed—as attractive timeframes, as there are fewer network defenders and IT support personnel at victim organizations. The just-in-time access method provisions privileged access when needed and can support enforcement of the principle of least privilege (as well as the zero-trust model) by setting network-wide policy to automatically disable admin accounts at the AD level. As needed, individual users can submit requests through an automated process that enables access to a system for a set timeframe. 

Protective Controls and Architecture

  • Identify, detect, and investigate abnormal activity that may indicate lateral movement by a threat actor, ransomware, or other malware. Use network monitoring tools and host-based logs and monitoring tools, such as an endpoint detection and response (EDR) tool. EDR tools are particularly useful for detecting lateral connections as they have insight into common and uncommon network connections for each host.
  • Implement a firewall and configure it to block Domain Name System (DNS) responses from outside the enterprise network or drop Internet Control Message Protocol (ICMP) packets. Review which admin services need to be accessible externally and allow those explicitly, blocking all others by default.
    • U.S. Defense Industrial Base organizations may sign up for the NSA Cybersecurity Collaboration Center’s Protective Domain Name System (PDNS) services.
  • Enable web application firewalls to mitigate application-level DDoS attacks. 
  • Implement a multi-content delivery network (CDN) solution. This will minimize the threat of DDoS attacks by distributing and balancing web traffic across a network.

Vulnerability and Configuration Management

  • Use an antivirus programs that uses heuristics and reputational ratings to check a file’s prevalence and digital signature prior to execution. Note: organizations should assess the risks inherent in their software supply chain (including its security/antivirus software supply chain) in light of the existing threat landscape.
    • Set antivirus/antimalware programs to conduct regular scans of IT network assets using up-to-date signatures. 
    • Use a risk-based asset inventory strategy to determine how OT network assets are identified and evaluated for the presence of malware.
  • Implement rigorous configuration management programs. Ensure the programs can track and mitigate emerging threats. Review system configurations for misconfigurations and security weaknesses.
  • Disable all unnecessary ports and protocols.
    • Review network security device logs and determine whether to shut off unnecessary ports and protocols. Monitor common ports and protocols for command and control activity.
    • Turn off or disable any unnecessary services (e.g., PowerShell) or functionality within devices.
  • Identify business-to-business VPNs and block high-risk protocols.
  • Ensure OT hardware is in read-only mode.
  • Enable strong spam filters.
    • Enable strong spam filters to prevent phishing emails from reaching end users.
    • Filter emails containing executable files to prevent them from reaching end users.
    • Implement a user training program to discourage users from visiting malicious websites or opening malicious attachments.
  • Restrict Server Message Block (SMB) Protocol within the network to only access servers that are necessary and remove or disable outdated versions of SMB (i.e., SMB version 1). Threat actors use SMB to propagate malware across organizations.
  • Review the security posture of third-party vendors and those interconnected with your organization. Ensure all connections between third-party vendors and outside software or hardware are monitored and reviewed for suspicious activity.
  • Implement listing policies for applications and remote access that only allow systems to execute known and permitted programs under an established security policy.
  • Open document readers in protected viewing modes to help prevent active content from running.

Responding to Cyber Incidents

U.S., Australian, Canadian, New Zealand, and UK cybersecurity authorities urge network defenders of critical infrastructure organizations to exercise due diligence in identifying indicators of malicious activity. Organizations detecting potential APT or ransomware activity in their IT or OT networks should:

  1. Immediately isolate affected systems.
  2. For DDoS attacks:
    1. Identify the source address originating the attack via the SIEM or logging service. If the attack is originating from a single pool of IP addresses, block IP traffic from suspected IPs via access control lists or by contacting your internet service provider (ISP).
    2. Enable firewall rate limiting to restrict the amount of IP traffic coming in from suspected IP addresses
    3. Notify your ISP and enable remote triggered blackhole (RTBH).
  3. Secure backups. Ensure your backup data is offline and secure. If possible, scan your backup data with an antivirus program to ensure it is free of malware.
  4. Collect and review relevant logs, data, and artifacts.
  5. Consider soliciting support from a third-party IT organization to provide subject matter expertise, ensure the actor is eradicated from the network, and avoid residual issues that could enable follow-on exploitation.
  6. Report incidents to appropriate cyber and law enforcement authorities:
  • U.S organizations: share information about incidents and anomalous activity to CISA’s 24/7 Operations Center at report@cisa.gov or (888) 282-0870 and/or the FBI via your local FBI field office or the FBI’s 24/7 CyWatch at (855) 292-3937 or CyWatch@fbi.gov. For ransomware incidents, organizations can also report to the U.S. Secret Service via a U.S. Secret Service Field Office
  • Australian organizations: if you have questions about this advice or have indications that your environment has been compromised, call the ACSC at 1300 CYBER1 (1300 292 371). To report an incident see cyber.gov.au/acsc/report.
  • Canadian organizations: report incidents by emailing CCCS at contact@cyber.gc.ca.
  • New Zealand organizations: if your organization requires assistance from the National Cyber Security Centre, contact them directly via telephone at (04) 498-7654 or via email at ncscincidents@ncsc.govt.nz.
  • UK organizations: report a significant cybersecurity incident at ncsc.gov.uk/report-an-incident (monitored 24 hours) or, for urgent assistance, call 03000 200 973.

For additional guidance on responding to a ransomware incident, see the CISA-Multi-State Information Sharing and Analysis Center (MS-ISAC) Joint Ransomware Guide.

See the joint advisory from Australia, Canada, New Zealand, the United Kingdom, and the United States on Technical Approaches to Uncovering and Remediating Malicious Activity for guidance on hunting or investigating a network, and for common mistakes in incident handling.

Additionally, CISA, the FBI, and NSA encourage U.S. critical infrastructure owners and operators to see CISA’s Federal Government Cybersecurity Incident and Vulnerability Response Playbooks. Although tailored to federal civilian branch agencies, these playbooks provide operational procedures for planning and conducting cybersecurity incident and vulnerability response activities and detail each step for both incident and vulnerability response.  

Note: U.S., Australian, Canadian, New Zealand, and UK cyber authorities strongly discourage paying a ransom to criminal actors. Paying a ransom may embolden adversaries to target additional organizations, encourage other criminal actors to engage in the distribution of ransomware, and/or fund illicit activities. Paying the ransom does not guarantee that a victim’s files will be recovered.

RESOURCES

DISCLAIMER

The information you have accessed or received is being provided “as is” for informational purposes only. CISA, NSA, FBI, ACSC, CCCS, NZ NCSC, NCSC-UK, and the UK National Crime Agency (NCA) do not endorse any commercial product or service, including any subjects of analysis. Any reference to specific commercial products, processes, or services by service mark, trademark, manufacturer, or otherwise, does not constitute or imply endorsement, recommendation, or favoring.

TRADEMARK RECOGNITION

MITRE and ATT&CK are registered trademarks of The MITRE Corporation. Kubernetes is a registered trademark of The Linux Foundation.

PURPOSE 

This document was developed by U.S., Australian, Canadian, New Zealand, and UK cybersecurity authorities in furtherance of their respective cybersecurity missions, including their responsibilities to develop and issue cybersecurity specifications and mitigations.

REFERENCES

[1] Cybersecurity and Infrastructure Security Agency
[2] Federal Bureau of Investigation
[3] National Security Agency
[4] Australian Cyber Security Centre
[5] Canadian Centre for Cyber Security
[6] New Zealand’s National Cyber Security Centre
[7] United Kingdom’s National Cyber Security Centre
[8] United Kingdom’s National Crime Agency
[9] U.S. DOJ Press Release: U.S. Charges Russian FSB Officers and Their Criminal Conspirators for Hacking Yahoo and Millions of Email Accounts
[10] U.S. DOJ Press Release: Four Russian Government Employees Charged in Two Historical Hacking Campaigns Targeting Critical Infrastructure Worldwide
[11] CrowdStrike Blog: Early Bird Catches the Wormhole: Observations from the StellarParticle Campaign
[12] U.S. White House Statement: FACT SHEET: Imposing Costs for Harmful Foreign Activities by the Russian
[
13] Government of Canada Statement on SolarWinds Cyber Compromise
[14] UK Government Press Release: Russia: UK and US expose global campaign of malign activity by Russian intelligence services
[15] MITRE ATT&CK: APT29
[
16] Joint CSA Russian GRU 85th GTsSS Deploys Previously Undisclosed Drovorub Malware
[17] Joint CSA Russian GRU Conducting Global Brute Force Campaign to Compromise Enterprise and Cloud Environments
[18] MITRE ATT&CK APT28
[19] Joint CSA New Sandworm Malware Cyclops Blink Replaces VPNFilter
[20] UK Government Press Release: UK condemns Russia’s GRU over Georgia cyber-attacks
[21] U.S. Department of State, Press Statement: The United States Condemns Russian Cyber Attack Against the Country of Georgia
[22] Government of Canada CSE Statement on Malicious Russian Cyber Activity Targeting Georgia
[23] UK Government Press Release: UK condemns Russia’s GRU over Georgia cyber-attacks
[24] MITRE ATT&CK The Sandworm Team
[25] U.S. Department of the Treasury Press Release: Treasury Sanctions Russian Government Research Institution Connected to the Triton Malware
[26] UK Government Press Release: UK exposes Russian spy agency behind cyber incident
[27] U.S. DOJ Press Release: Four Russian Government Employees Charged in Two Historical Hacking Campaigns Targeting Critical Infrastructure Worldwide
[28] MITRE ATT&CK TEMP.Veles
[29] NSA and NCSC-UK Cybersecurity Advisory Turla Group Exploits Iranian APT To Expand Coverage Of Victims
[30] CrowdStrike Adversary Profile: VENEMOUS BEAR
[31] KELA Cybersecurity Intelligence Center: Ain’t No Actor Trustworthy Enough: The importance of validating sources
[32] Twitter: Valery Marchive Status, Feb. 25, 2022 1:41 PM
[33] The Record by Recorded Future: Russia or Ukraine: Hacking Groups Take Sides
[34] Twitter: CyberKnow Status, March 29, 2022, 7:54 AM
[35] CrowdStrike Blog: Who is Salty Spider (Sality)?
[36] Proofpoint Blog: New Year, New Version of DanaBot
[37] Zscaler Blog: Spike in DanaBot Malware Activity
[38] Proofpoint Blog: New Year, New Version of DanaBot
[39] The Record by Recorded Future: Russia or Ukraine: Hacking Groups Take Sides
[40] TechTarget: Conti ransomware gang backs Russia, threatens US
[41] The Record by Recorded Future: Russia or Ukraine: Hacking Groups Take Sides

ACKNOWLEDGEMENTS

The U.S., Australian, Canadian, New Zealand, and UK cyber authorities would like to thank CrowdStrike, Google, LookingGlass Cyber, Mandiant, Microsoft, and Secureworks for their contributions to this CSA.

Oracle Releases April 2022 Critical Patch Update

This article is contributed. See the original author and article here.

Oracle has released its Critical Patch Update for April 2022 to address 520 vulnerabilities across multiple products. A remote attacker could exploit some of these vulnerabilities to take control of an affected system. 

CISA encourages users and administrators to review the Oracle April 2022 Critical Patch Update and apply the necessary updates. 

Adapting for the new workplace with updates from Microsoft Purview Insider Risk Management

Adapting for the new workplace with updates from Microsoft Purview Insider Risk Management

This article is contributed. See the original author and article here.

Navigating uncertainty and corporate change can be a major challenge for organizations, especially for security and compliance teams. The processes and ways we engage with our colleagues, customers and partners look very different than they did just a few years ago. The nature of work is evolving, and our strategies on how to protect our users and our data must evolve with it.


 


Results from Microsoft’s most recent Work Trend Index indicated 52% of employees are considering a switch to remote or hybrid in the year ahead, and that 43% of employees are likely to consider changing jobs. Security teams will now have to be more diligent in protecting their corporate data as employees work from different locations or leave the organization.


 


We recently shared how Microsoft insider risk solutions were evolving to meet the needs of the Great Reshuffle, including enhanced data exfiltration detection capabilities and richer alert context.


 


Today we announced Microsoft Purview – a comprehensive set of solutions which help you govern, protect, and manage your entire data estate. This new brand family combines the capabilities of the former Azure Purview and the Microsoft 365 Compliance portfolio that customers already rely on, providing unified data governance and risk management for your organization. Insider Risk Management in Microsoft 365 will now be called Microsoft Purview Insider Risk Management.


 


As part of this announcement, we are excited to announce the latest updates for Insider Risk Management:



  • New policy recommendations, email notifications and sequence detection in analytics

  • Policy triggers based on anomalous activity

  • Detection capabilities for priority file types

  • Expanded coverage with third-party alerts (via Microsoft Defender for Cloud Apps)

  • Recommended guidance and actions for Insider Risk Management admins

  • Launch of our new “Become an Insider Risk Management Ninja” resource page


 


New updates to analytics


One of the best ways to get started with Insider Risk Management is with an analytics assessment. Within 48 hours of an Insider Risk Management administrator initiating the analytics assessment, the results provide actionable insights which may indicate risk of data leaks or theft, such as what percentage of users in your environment are performing exfiltration activities. These results are anonymized and aggregated, providing a top-level view of existing risks in your environment while protecting user privacy.


 


We are excited to announce that analytics will now be going further with new policy recommendations, email notifications and sequence detection capabilities in public preview:


 



  • New policy recommendations: The results of an analytics scan will now include recommendations for policy thresholds, specifically built to address potential data leaks and IP theft. For example, if the analytics scan determines that your organization sends a large number of sensitive attachments to recipients outside of the organization, the recommended threshold for a data leak detection policy may be higher than in a typical organization. This helps security or compliance teams to set thresholds and policies that better reflect their organizations’ specific needs.


Analytics thresholds.png


 



  • Email notifications for analytics activation: We are now adding new email notifications so that Insider Risk Management administrators receive an email notification once analytics has been turned on and when the assessment results are first available.

  • Enhanced insights with sequence detection: Identifying risky user behavior can be tricky when looking at isolated events, like confidential documents being sent to an external email recipient or downgrading a sensitivity label from “Highly Confidential” to “General”. When these events are tied together, however, security teams have more context and can better identify which activities pose a bigger risk. In Insider Risk Management, we refer to this as “sequence detection”: the activities may not raise alerts individually, but a flow of specific activities, like “Downgrade sensitivity level” > “Download” > “Exfiltrate”, may be something we want to flag as potentially risk activity. Analytics in Insider Risk Management will now include insights into the percentage of users who are performing sequences of risky activities, in addition to other data leak and exfiltration detection. (Learn more about sequences here: Investigate insider risk management activities)


Analytics sequences.png


 


New policy triggers based on anomalous activity


We are also further expanding Insider Risk Management’s ability to support organizations concerned about anomalous (or abnormal) activity. With our new anomalous activity policy trigger, security and compliance teams will have the ability to customize their policies to trigger on an anomalous activity, like an unusual amount of emails with attachments sent outside the organization, and bring users into scope of that policy.


 


Anomaly triggers.png


 


This new capability means that Insider Risk Management can augment and support work done by security teams, by identifying what activities are abnormal or irregular for a user. Organizations looking to integrate more machine learning and automated decision making into their insider risk investigations may find that the anomalous activity trigger capabilities can help in identifying potential risks.


 


New detection capabilities for priority file types


When thinking about high-priority data or sensitive documents, your organization may have specific file types deemed particularly important. For example, an automotive company developing new car designs may create and save these designs in 3-D formats like .3dxml or .3mf. These files can be considered particularly sensitive due to the nature of their content, and organizations may want to prioritize these critical IP file types as high priority.


 


Insider Risk Management now allows organizations to indicate specific file types they would like to prioritize for additional visibility and scrutiny. Insider Risk Management administrators who are setting up new policies are able to indicate which file extensions should be considered high-priority, which can help in risk detection and surfacing important alerts.


 


File extension priority.png


 


Expanded coverage with third-party alerts (via Microsoft Defender for Cloud Apps)


Insider Risk Management becomes even more powerful with alerts surfaced from third-party connected applications. We are now supporting nine additional third-party anomaly alert types via Microsoft Defender for Cloud Apps. These automatically enabled detection policies can detect and collate results, identifying behavioral anomalies across your users and devices in your network. Through this integration, Insider Risk Management expands coverage into multi-cloud environments including alerts identifying anomalous activity on Google Cloud Platform or Amazon Web Services, and allows organizations to have visibility if users are performing potentially high-risk activities like unusual mass deletion of content from a connected cloud app.


 


MDA.png


 


To leverage these capabilities in your policies, update your Insider Risk Management settings to include the “Microsoft Defender for Cloud Apps” policy indicators.


 


To learn more about anomaly detection policies in Defender for Cloud Apps, visit our Microsoft Docs page: Create anomaly detection policies in Defender for Cloud Apps.


 


Recommended guidance and actions for Insider Risk Management administrators


The best way to leverage the full capacity of Insider Risk Management is configuring the solution for your environment, your organizational requirements and your users.


 


Administrators are now more empowered than ever with guided recommendations for fine-tuning Insider Risk Management to fit their needs. These new recommendations are designed to help you to better manage noise from alerts in your environment, with recommended policy actions like adding domains, excluding specific file types or ensuring that all users are covered with at least one policy.


 


Watch part one of our new Insider Risk Management Mechanics video series


We have just kicked off a new Mechanics video series about our insider risk solutions. Insider Risk Management and Communication Compliance. In our first video, we show how you can leverage machine learning to identify explicit high-risk incidents like data theft or workplace harassment and how our solutions provide designated stakeholders with context and workflows to take action on insider risk.


 


 


New “Become an Insider Risk Management Ninja” resource page


Microsoft has a number of resources to help you get started and to learn more about using and configuring Insider Risk Management. For the one-stop shop of our public-facing material and resources on the solution, check out the new “Become an Insider Risk Management Ninja” resource page at https://aka.ms/insiderriskninja.


 


This page will be updated quarterly so be sure to bookmark it to see the latest on Insider Risk Management!


 


Get started


These new features in Microsoft Purview Insider Risk Management have already rolled out or will start rolling out to customer tenants in the coming weeks. These solutions are also generally available across government clouds, supported in Government Community Cloud (GCC), GCC-High, and US Department of Defense (DoD) tenants.


 


We are happy to share that there is now an easier way for you to try Microsoft Purview solutions directly in the Microsoft Purview compliance portal. If you are a current Microsoft 365 E3 user and interested in experiencing Insider Risk Management, check out the Insider Risk Management Trial or the Microsoft Purview Trial to see how insider risk solutions and analytics can give you actionable insights.


 


Learn more about how to get started and configure policies in your tenant in the supporting documentation for Insider Risk Management. Keep a lookout for updates to the documentation with information on the new features over the coming weeks.