According to the alert, the Russian government is behind a number of cyberattacks and breaches that actively targeted US government agencies and critical energy, nuclear, commercial facilities, water, aviation and manufacturing sectors. The threat actors “staged malware, conducted spear phishing, and gained remote access into energy sector networks,” said the report.
It appears the campaign had two types of victims: staging targets and intended targets. Staging targets were third parties with weaker networks used to store malware and serve as middle-men in attacks on the final, intended targets.
“After obtaining access, the Russian government cyber actors conducted network reconnaissance, moved laterally and collected information pertaining to industrial control systems,” the report said.
The DHS and FBI hope malicious activity will be reduced and risks identified faster by thoroughly describing the indicators of compromise, as well as a variety of tactics, techniques and procedures (TTPs) used in compromising the networks, such as spear-phishing emails, watering-hole domains, credential gathering, open-source and network reconnaissance and host-based exploitation.