Russia-linked threat actors targets critical infrastructure, US authorities warn

Pierluigi Paganini January 12, 2022

US authorities warn critical infrastructure operators of the threat of cyberattacks orchestrated by Russia-linked threat actors.

US Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI), and the National Security Agency (NSA) issued a joint alert to warn critical infrastructure operators about threats from Russian state-sponsored hackers.

“This joint Cybersecurity Advisory (CSA)—authored by the Cybersecurity and Infrastructure Security Agency (CISA), Federal Bureau of Investigation (FBI), and National Security Agency (NSA)—is part of our continuing cybersecurity mission to warn organizations of cyber threats and help the cybersecurity community reduce the risk presented by these threats. This CSA provides an overview of Russian state-sponsored cyber operations; commonly observed tactics, techniques, and procedures (TTPs); detection actions; incident response guidance; and mitigations.” reads the joint alert. “This overview is intended to help the cybersecurity community reduce the risk presented by these threats.”

The alert provides information about tactics, techniques, and procedures (TTPs) associated with Russia-Linked threat actors, along with recommendations on incident response and mitigations.

Russia-linked cyber-espionage groups have used common tactics, such as spear-phishing, and brute force attacks. The threat actors also exploited known vulnerabilities to compromise target networks and accounts, including:

The alert remarks that Russian nation-state actors have demonstrated sophisticated tradecraft and cyber capabilities by compromising third-party infrastructure, compromising third-party software, or developing custom malware.

The US agencies have released numerous alerts on Russian state-sponsored cyber-intrusion campaigns and customized malware that targeted ICS, such as:

Some of the hacking campaigns that were publicly attributed to Russian state-sponsored APT actors by U.S. government includes:

  • Russian state-sponsored APT actors targeting state, local, tribal, and territorial (SLTT) governments and aviation networks, September 2020, through at least December 2020. 
  • Russian state-sponsored APT actors’ global Energy Sector intrusion campaign, 2011 to 2018. 
  • Russian state-sponsored APT actors’ campaign against Ukrainian critical infrastructure, 2015 and 2016. 

Follow me on Twitter: @securityaffairs and Facebook

[adrotate banner=”9″][adrotate banner=”12″]

Pierluigi Paganini

(SecurityAffairs – hacking, Russia-linked threat actors)

[adrotate banner=”5″]

[adrotate banner=”13″]



you might also like

leave a comment