US Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI), and the National Security Agency (NSA) issued a joint alert to warn critical infrastructure operators about threats from Russian state-sponsored hackers.
“This joint Cybersecurity Advisory (CSA)—authored by the Cybersecurity and Infrastructure Security Agency (CISA), Federal Bureau of Investigation (FBI), and National Security Agency (NSA)—is part of our continuing cybersecurity mission to warn organizations of cyber threats and help the cybersecurity community reduce the risk presented by these threats. This CSA provides an overview of Russian state-sponsored cyber operations; commonly observed tactics, techniques, and procedures (TTPs); detection actions; incident response guidance; and mitigations.” reads the joint alert. “This overview is intended to help the cybersecurity community reduce the risk presented by these threats.”
The alert provides information about tactics, techniques, and procedures (TTPs) associated with Russia-Linked threat actors, along with recommendations on incident response and mitigations.
Russia-linked cyber-espionage groups have used common tactics, such as spear-phishing, and brute force attacks. The threat actors also exploited known vulnerabilities to compromise target networks and accounts, including:
The alert remarks that Russian nation-state actors have demonstrated sophisticated tradecraft and cyber capabilities by compromising third-party infrastructure, compromising third-party software, or developing custom malware.
The US agencies have released numerous alerts on Russian state-sponsored cyber-intrusion campaigns and customized malware that targeted ICS, such as:
Some of the hacking campaigns that were publicly attributed to Russian state-sponsored APT actors by U.S. government includes:
(SecurityAffairs – hacking, Russia-linked threat actors)