www.techtarget.com
Open in
urlscan Pro
2606:4700:4400::ac40:91d9
Public Scan
URL:
https://www.techtarget.com/searchsecurity/news/252513414/CISA-says-Shields-Up-as-Russia-Ukraine-tensions-escalate
Submission Tags: falconsandbox
Submission: On April 27 via api from US — Scanned from DE
Submission Tags: falconsandbox
Submission: On April 27 via api from US — Scanned from DE
Form analysis
1 forms found in the DOMGET https://www.techtarget.com/search/query
<form action="https://www.techtarget.com/search/query" method="get" class="header-search">
<label for="header-search-input" class="visuallyhidden">Search the TechTarget Network</label>
<input class="header-search-input ui-autocomplete-input" id="header-search-input" autocomplete="off" type="text" name="q" placeholder="Search the TechTarget Network">
<button aria-label="Search" class="header-search-submit"><i class="icon" data-icon="g"></i></button>
</form>
Text Content
SearchSecurity Search the TechTarget Network Sign-up now. Start my free, unlimited access. Login Register * Techtarget Network * News * Features * Tips * Webinars * More Content * Answers * Definitions * Essential Guides * Opinions * Photo Stories * Podcasts * Quizzes * Tech Accelerators * Tutorials * Sponsored Communities * Schools * SearchSecurity * Topic Threat detection and response * Application and platform security * Careers and certifications * Cloud security * Compliance * Data security and privacy * Identity and access management * Network security * Risk management * Security analytics and automation * Security operations and management * Threats and vulnerabilities * All Topics * Follow: * * * News CISA SAYS 'SHIELDS UP' AS RUSSIA-UKRAINE TENSIONS ESCALATE CISA SAID IN ITS ADVISORY THAT 'THERE ARE NOT CURRENTLY ANY SPECIFIC CREDIBLE THREATS TO THE U.S. HOMELAND,' BUT CITED PAST RUSSIAN CYBER ATTACKS AGAINST UKRAINE AND OTHERS. Share this item with your network: * * * By * Alexander Culafi, News Writer Published: 14 Feb 2022 CISA is encouraging increased cybersecurity awareness in a new "Shields Up" advisory as tensions escalate between Ukraine and Russia. Russia has threatened new invasions against Ukraine as an escalation of the Russo-Ukrainian War that began in 2014. The cybersecurity implications of these threats have already been felt, as Ukrainian tech companies are ramping up for potential conflict. In addition, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) reported last month that Ukraine was being hit with destructive malware attacks, though these attacks were not directly connected with a specific entity. The advisory, published Saturday, provided general guidance for preventing, detecting and responding to cyberintrusions, but also direct references to past and present Russo-Ukrainian conflicts. "While there are not currently any specific credible threats to the U.S. homeland, we are mindful of the potential for the Russian government to consider escalating its destabilizing actions in ways that may impact others outside of Ukraine," the advisory read. For example, the advisory mentioned past cyberaggressions involving critical infrastructure committed by Russia against Ukraine around 2015. These attacks included the deployment of malware known as BlackEnergy, which hit utility companies in Ukraine and caused significant power outages in some regions of the country. CISA recommended taking extra precautions when working with Ukrainian organizations. The agency also advised taking "extra care to monitor, inspect, and isolate traffic from those organizations" and to "closely review access controls for that traffic." Some of the advice given includes ensuring software is up to date, disabling ports and protocols not essential for business use, and designating a crisis response team. CISA declined to comment beyond the content of the advisory. CISA The logo for CISA's 'Shields Up' advisory In another instance of government entities warning of cyberthreats against critical infrastructure, the FBI and U.S. Secret Service published a joint cybersecurity advisory on Friday to raise awareness about BlackByte ransomware, a ransomware-as-a-service entity that has previously "compromised multiple U.S. and foreign businesses, including entities in at least three U.S. critical infrastructure sectors (government facilities, financial, and food & agriculture)." Like many ransomware variants, BlackByte avoids infecting systems with Russian and ex-East bloc languages. The ransomware, first discovered last year, was recently observed exploiting the ProxyShell vulnerability in Microsoft Exchange servers. One recent victim of BlackByte ransomware was the San Francisco 49ers football team, which the operator's leak site mentioned over the weekend. A spokesperson for the team shared the following statement with SearchSecurity: We recently became aware of a network security incident that resulted in temporary disruption to certain systems on our corporate IT network. Upon learning of the incident, we immediately initiated an investigation and took steps to contain the incident. Third-party cybersecurity firms were engaged to assist, and law enforcement was notified. While the investigation is ongoing, we believe the incident is limited to our corporate IT network; to date, we have no indication that this incident involves systems outside of our corporate network, such as those connected to Levi's Stadium operations or ticket holders. As the investigation continues, we are working diligently to restore involved systems as quickly and as safely as possible. Alexander Culafi is a writer, journalist and podcaster based in Boston. RELATED RESOURCES * Making the case for cloud-based security –ComputerWeekly.com * Protect the Endpoint: Threats, Virtualization, Questions, Backup, and More –Carbon Black * Making the case for cloud-based security –ComputerWeekly.com * Bitdefender GravityZone Ultra Suite –Bitdefender DIG DEEPER ON THREAT DETECTION AND RESPONSE * FBI WARNS OF 'TIMED' RANSOMWARE ATTACKS ON AGRICULTURE SECTOR * UKRAINIAN CYBER DEFENCES PROVE RESILIENT By: Alex Scroxton * BIDEN SIGNS RANSOMWARE REPORTING MANDATE INTO LAW By: Alex Scroxton * CADDYWIPER IS FOURTH NEW MALWARE LINKED TO UKRAINE WAR By: Alex Scroxton Sponsored News * Modernizing Cyber Resilience Using a Services-Based Model –Dell Technologies * Cybersecurity Essentials for Critical Infrastructure –Dell Technologies * Choosing the Right Cloud Storage Infrastructure for Improved Risk Management –NetApp * See More Related Content * Recorded Future: Russia may retaliate with cyber ... – SearchSecurity * 2 suspected ransomware operators arrested in Ukraine – SearchSecurity * FBI warns of 'timed' ransomware attacks on ... – SearchSecurity Latest TechTarget resources * Cloud Security * Networking * CIO * Enterprise Desktop * Cloud Computing * Computer Weekly SearchCloudSecurity * Cloud security still needs a lot more work, say European experts Security and privacy remain a stumbling block for cloud computing, according to information experts at the Trust in the Digital ... * Amazon Workspaces gets MFA security update Amazon Web Services has added multifactor authentication to its WorkSpaces cloud desktop service, the first step in a larger ... * Black Hat 2014: Researcher reveals Amazon cloud security weaknesses At Black Hat 2014, a researcher showed how AWS cloud security flaws and misconfigurations can have devastating consequences for ... SearchNetworking * Indoor 5G gets a boost as small cells come to rescue Indoor small cells are becoming more common in consumer and enterprise markets. Along with distributed antenna systems and Wi-Fi ... * Power over Ethernet basics for network architects Power over Ethernet provides a way to supply electricity to low-power devices through a standard Ethernet cable. Learn about the ... * The importance of unified, end-to-end network management As network environments evolve and grow more complex, enterprises are realizing their need for unified network management. But is... SearchCIO * Cloud-first strategy forces big shift on IT infrastructure, skills More and more, IT infrastructure is in the cloud. As organizations adopt cloud-first strategies, forward-looking CIOs are ... * Digital humanism aims to balance human needs, emerging tech Digital humanism is an approach to designing a digital future with human values and needs in mind, a concept arriving in response... * Top 7 metaverse tech strategy do's and don'ts Technology and business leaders must be strategic when entering the new world of metaverse projects. Here are critical tips that ... SearchEnterpriseDesktop * Windows 365 compared to Windows 10 Organizations may look at Windows 365 as a clear improvement from an administrative perspective, but a traditional Windows ... * Microsoft responds to cloud antitrust complaints Microsoft has drawn antitrust scrutiny for rules that make it more expensive to run Windows and Office on rivals' clouds. The ... * Microsoft: Windows 11 features ease hybrid work strain on IT Microsoft has aimed its latest Windows 11 features at helping IT staff automate updates, secure corporate data and assist workers... SearchCloudComputing * Follow these examples to use CloudWatch Logs Insights CloudWatch Logs Insights helps organizations gain insights from a deluge of log data on applications and services. Learn how to ... * Azure surpasses AWS for some enterprise cloud uses Flexera's new 'State of the Cloud Report' puts Azure ahead of AWS for the first time as enterprise IT pros' preferred public ... * How to launch an EC2 instance using Terraform With Terraform, developers can lean on familiar coding practices to provision the underlying resources for their applications. ... ComputerWeekly.com * The importance of mid-band 5G for European economic growth The roll-out of 5G networks promises to revolutionise the role of high bandwidth wireless connectivity, but underestimating the ... * Log4Shell, ProxyLogon, ProxyShell among most exploited bugs of 2021 These 15 CVEs were the most commonly exploited last year, and if you haven’t mitigated against them, now is the time * Russia-supporting cyber crime gang claims Coca-Cola as victim Stormous cyber crime collective claims to have stolen 161GB of data from Coca-Cola, and says it plans to sell it off * About Us * Editorial Ethics Policy * Meet The Editors * Contact Us * Videos * Photo Stories * Definitions * Guides * Advertisers * Business Partners * Media Kit * Corporate Site * Contributors * CPE and CISSP Training * Reprints * Events * E-Products All Rights Reserved, Copyright 2000 - 2022, TechTarget Privacy Policy Cookie Preferences Do Not Sell My Personal Info Close