www.techtarget.com Open in urlscan Pro
2606:4700:4400::ac40:91d9  Public Scan

URL: https://www.techtarget.com/searchsecurity/news/252513414/CISA-says-Shields-Up-as-Russia-Ukraine-tensions-escalate
Submission Tags: falconsandbox
Submission: On April 27 via api from US — Scanned from DE

Form analysis 1 forms found in the DOM

GET https://www.techtarget.com/search/query

<form action="https://www.techtarget.com/search/query" method="get" class="header-search">
  <label for="header-search-input" class="visuallyhidden">Search the TechTarget Network</label>
  <input class="header-search-input ui-autocomplete-input" id="header-search-input" autocomplete="off" type="text" name="q" placeholder="Search the TechTarget Network">
  <button aria-label="Search" class="header-search-submit"><i class="icon" data-icon="g"></i></button>
</form>

Text Content

SearchSecurity
Search the TechTarget Network
Sign-up now. Start my free, unlimited access.
Login Register
 * Techtarget Network
 * News
 * Features
 * Tips
 * Webinars
 * More Content
    * Answers
    * Definitions
    * Essential Guides
    * Opinions
    * Photo Stories
    * Podcasts
    * Quizzes
    * Tech Accelerators
    * Tutorials
    * Sponsored Communities

 * Schools

 * SearchSecurity
 * Topic Threat detection and response
    * Application and platform security
    * Careers and certifications
    * Cloud security
    * Compliance
    * Data security and privacy
    * Identity and access management
    * Network security
    * Risk management
    * Security analytics and automation
    * Security operations and management
    * Threats and vulnerabilities
    * All Topics

 * Follow:
 * 
 * 
 * 


News


CISA SAYS 'SHIELDS UP' AS RUSSIA-UKRAINE TENSIONS ESCALATE




CISA SAID IN ITS ADVISORY THAT 'THERE ARE NOT CURRENTLY ANY SPECIFIC CREDIBLE
THREATS TO THE U.S. HOMELAND,' BUT CITED PAST RUSSIAN CYBER ATTACKS AGAINST
UKRAINE AND OTHERS.

Share this item with your network:

 * 
 * 
 * 


By
 * Alexander Culafi, News Writer

Published: 14 Feb 2022

CISA is encouraging increased cybersecurity awareness in a new "Shields Up"
advisory as tensions escalate between Ukraine and Russia.

Russia has threatened new invasions against Ukraine as an escalation of the
Russo-Ukrainian War that began in 2014. The cybersecurity implications of these
threats have already been felt, as Ukrainian tech companies are ramping up for
potential conflict. In addition, the U.S. Cybersecurity and Infrastructure
Security Agency (CISA) reported last month that Ukraine was being hit with
destructive malware attacks, though these attacks were not directly connected
with a specific entity.



The advisory, published Saturday, provided general guidance for preventing,
detecting and responding to cyberintrusions, but also direct references to past
and present Russo-Ukrainian conflicts.

"While there are not currently any specific credible threats to the U.S.
homeland, we are mindful of the potential for the Russian government to consider
escalating its destabilizing actions in ways that may impact others outside of
Ukraine," the advisory read.

For example, the advisory mentioned past cyberaggressions involving critical
infrastructure committed by Russia against Ukraine around 2015. These attacks
included the deployment of malware known as BlackEnergy, which hit utility
companies in Ukraine and caused significant power outages in some regions of the
country.

CISA recommended taking extra precautions when working with Ukrainian
organizations. The agency also advised taking "extra care to monitor, inspect,
and isolate traffic from those organizations" and to "closely review access
controls for that traffic." Some of the advice given includes ensuring software
is up to date, disabling ports and protocols not essential for business use, and
designating a crisis response team.

CISA declined to comment beyond the content of the advisory.

CISA

The logo for CISA's 'Shields Up' advisory


In another instance of government entities warning of cyberthreats against
critical infrastructure, the FBI and U.S. Secret Service published a joint
cybersecurity advisory on Friday to raise awareness about BlackByte ransomware,
a ransomware-as-a-service entity that has previously "compromised multiple U.S.
and foreign businesses, including entities in at least three U.S. critical
infrastructure sectors (government facilities, financial, and food &
agriculture)."

Like many ransomware variants, BlackByte avoids infecting systems with Russian
and ex-East bloc languages. The ransomware, first discovered last year, was
recently observed exploiting the ProxyShell vulnerability in Microsoft Exchange
servers.

One recent victim of BlackByte ransomware was the San Francisco 49ers football
team, which the operator's leak site mentioned over the weekend. A spokesperson
for the team shared the following statement with SearchSecurity:

We recently became aware of a network security incident that resulted in
temporary disruption to certain systems on our corporate IT network. Upon
learning of the incident, we immediately initiated an investigation and took
steps to contain the incident. Third-party cybersecurity firms were engaged to
assist, and law enforcement was notified.

While the investigation is ongoing, we believe the incident is limited to our
corporate IT network; to date, we have no indication that this incident involves
systems outside of our corporate network, such as those connected to Levi's
Stadium operations or ticket holders. As the investigation continues, we are
working diligently to restore involved systems as quickly and as safely as
possible.

Alexander Culafi is a writer, journalist and podcaster based in Boston.



RELATED RESOURCES

 * Making the case for cloud-based security –ComputerWeekly.com
 * Protect the Endpoint: Threats, Virtualization, Questions, Backup, and More
   –Carbon Black
 * Making the case for cloud-based security –ComputerWeekly.com
 * Bitdefender GravityZone Ultra Suite –Bitdefender

DIG DEEPER ON THREAT DETECTION AND RESPONSE

 * FBI WARNS OF 'TIMED' RANSOMWARE ATTACKS ON AGRICULTURE SECTOR
   
   

 * UKRAINIAN CYBER DEFENCES PROVE RESILIENT
   
   
   By: Alex Scroxton

 * BIDEN SIGNS RANSOMWARE REPORTING MANDATE INTO LAW
   
   
   By: Alex Scroxton

 * CADDYWIPER IS FOURTH NEW MALWARE LINKED TO UKRAINE WAR
   
   
   By: Alex Scroxton

Sponsored News
 * Modernizing Cyber Resilience Using a Services-Based Model –Dell Technologies
 * Cybersecurity Essentials for Critical Infrastructure –Dell Technologies
 * Choosing the Right Cloud Storage Infrastructure for Improved Risk Management
   –NetApp
 * See More

Related Content
 * Recorded Future: Russia may retaliate with cyber ... – SearchSecurity
 * 2 suspected ransomware operators arrested in Ukraine – SearchSecurity
 * FBI warns of 'timed' ransomware attacks on ... – SearchSecurity



Latest TechTarget resources
 * Cloud Security
 * Networking
 * CIO
 * Enterprise Desktop
 * Cloud Computing
 * Computer Weekly

SearchCloudSecurity
 * Cloud security still needs a lot more work, say European experts
   
   Security and privacy remain a stumbling block for cloud computing, according
   to information experts at the Trust in the Digital ...

 * Amazon Workspaces gets MFA security update
   
   Amazon Web Services has added multifactor authentication to its WorkSpaces
   cloud desktop service, the first step in a larger ...

 * Black Hat 2014: Researcher reveals Amazon cloud security weaknesses
   
   At Black Hat 2014, a researcher showed how AWS cloud security flaws and
   misconfigurations can have devastating consequences for ...

SearchNetworking
 * Indoor 5G gets a boost as small cells come to rescue
   
   Indoor small cells are becoming more common in consumer and enterprise
   markets. Along with distributed antenna systems and Wi-Fi ...

 * Power over Ethernet basics for network architects
   
   Power over Ethernet provides a way to supply electricity to low-power devices
   through a standard Ethernet cable. Learn about the ...

 * The importance of unified, end-to-end network management
   
   As network environments evolve and grow more complex, enterprises are
   realizing their need for unified network management. But is...

SearchCIO
 * Cloud-first strategy forces big shift on IT infrastructure, skills
   
   More and more, IT infrastructure is in the cloud. As organizations adopt
   cloud-first strategies, forward-looking CIOs are ...

 * Digital humanism aims to balance human needs, emerging tech
   
   Digital humanism is an approach to designing a digital future with human
   values and needs in mind, a concept arriving in response...

 * Top 7 metaverse tech strategy do's and don'ts
   
   Technology and business leaders must be strategic when entering the new world
   of metaverse projects. Here are critical tips that ...

SearchEnterpriseDesktop
 * Windows 365 compared to Windows 10
   
   Organizations may look at Windows 365 as a clear improvement from an
   administrative perspective, but a traditional Windows ...

 * Microsoft responds to cloud antitrust complaints
   
   Microsoft has drawn antitrust scrutiny for rules that make it more expensive
   to run Windows and Office on rivals' clouds. The ...

 * Microsoft: Windows 11 features ease hybrid work strain on IT
   
   Microsoft has aimed its latest Windows 11 features at helping IT staff
   automate updates, secure corporate data and assist workers...

SearchCloudComputing
 * Follow these examples to use CloudWatch Logs Insights
   
   CloudWatch Logs Insights helps organizations gain insights from a deluge of
   log data on applications and services. Learn how to ...

 * Azure surpasses AWS for some enterprise cloud uses
   
   Flexera's new 'State of the Cloud Report' puts Azure ahead of AWS for the
   first time as enterprise IT pros' preferred public ...

 * How to launch an EC2 instance using Terraform
   
   With Terraform, developers can lean on familiar coding practices to provision
   the underlying resources for their applications. ...

ComputerWeekly.com
 * The importance of mid-band 5G for European economic growth
   
   The roll-out of 5G networks promises to revolutionise the role of high
   bandwidth wireless connectivity, but underestimating the ...

 * Log4Shell, ProxyLogon, ProxyShell among most exploited bugs of 2021
   
   These 15 CVEs were the most commonly exploited last year, and if you haven’t
   mitigated against them, now is the time

 * Russia-supporting cyber crime gang claims Coca-Cola as victim
   
   Stormous cyber crime collective claims to have stolen 161GB of data from
   Coca-Cola, and says it plans to sell it off

 * About Us
 * Editorial Ethics Policy
 * Meet The Editors
 * Contact Us
 * Videos
 * Photo Stories

 * Definitions
 * Guides
 * Advertisers
 * Business Partners
 * Media Kit
 * Corporate Site

 * Contributors
 * CPE and CISSP Training
 * Reprints
 * Events
 * E-Products

All Rights Reserved, Copyright 2000 - 2022, TechTarget

Privacy Policy
Cookie Preferences
Do Not Sell My Personal Info


Close