CSASVR 网络运营和漏洞利用更新 8页

VIP文档

ID:71771

大小:0.81 MB

页数:8页

时间:2024-11-18

金币:10

上传者:人情世故
To report suspicious or criminal activity related to information found in this Joint Cybersecurity Advisory, contact
your local FBI field office. When available, please include the following information regarding the incident: date,
time, and location of the incident; type of activity; number of people affected; type of equipment used for the
activity; the name of the submitting company or organization; and a designated point of contact. For NSA
cybersecurity reporting inquiries, contact CybersecurityReports@nsa.gov.
This document is marked TLP:CLEAR. Disclosure is not limited. Sources may use TLP:CLEAR when information
carries minimal or no foreseeable risk of misuse, in accordance with applicable rules and procedures for public
release. Subject to standard copyright rules, TLP:CLEAR information may be distributed without restriction. For
more information on the Traffic Light Protocol, see cisa.gov/tlp.
Product ID: JCSA-20241010-001
October 10, 2024
Co-Authored by:
TLP:CLEAR
TLP:CLEAR
Update on SVR Cyber Operations and
Vulnerability Exploitation
SUMMARY
The Federal Bureau of Investigation (FBI), the
National Security Agency (NSA), Cyber National
Mission Force (CNMF), and the United
Kingdom’s National Cyber Security Centre
(NCSC-UK) are releasing this joint Cybersecurity
Advisory (CSA) to highlight the tactics,
techniques, and procedures (TTPs) employed by
the Russian Federation’s Foreign Intelligence
Service (SVR) in recent cyber operations and
provide network defenders with information to
help counter SVR cyber threats.
Since at least 2021, Russian SVR cyber actors
also tracked as APT29, Midnight Blizzard
(formerly Nobelium), Cozy Bear, and the Dukes
have consistently targeted US, European, and
global entities in the defense, technology, and
finance sectors to collect foreign intelligence and
enable future cyber operations, including in
support of Russia’s ongoing invasion of Ukraine since February 2022. Their operations continue to
pose a global threat to government and private sector organizations.
The authoring agencies are releasing this CSA to warn network defenders that SVR cyber actors are
highly capable of and interested in exploiting software vulnerabilities for initial access [T1190] and
escalation of privileges [T1068]. Organizations should prioritize rapid patch deployment and keep
software up to date. The SVR continues using TTPs such as spearphishing [T1566], password
spraying [T1078], abuse of supply chain [T1195] and trusted relationships [T1199], custom and
The authoring agencies recommend the
following mitigations to protect their networks.
See the Mitigations section for the complete
list.
Reduce attack surface by disabling
Internet-accessible services that you do
not need, or restrict access to trusted
networks, and removing unused
applications and utilities from
workstations and development
environments.
Require and enforce multi-factor
authentication whenever possible.
Regularly audit cloud-based accounts
and applications with administrative
access to email for unusual activity.
资源描述:

当前文档最多预览五页,下载文档查看全文

此文档下载收益归作者所有

当前文档最多预览五页,下载文档查看全文
温馨提示:
1. 部分包含数学公式或PPT动画的文件,查看预览时可能会显示错乱或异常,文件下载后无此问题,请放心下载。
2. 本文档由用户上传,版权归属用户,天天文库负责整理代发布。如果您对本文档版权有争议请及时联系客服。
3. 下载前请仔细阅读文档内容,确认文档内容符合您的需求后进行下载,若出现内容与标题不符可向本站投诉处理。
4. 下载文档时可能由于网络波动等原因无法下载或下载错误,付费完成后未能成功下载的用户请联系客服处理。
关闭