www.cisa.gov
Open in
urlscan Pro
2a02:26f0:fb:5b2::447a
Public Scan
URL:
https://www.cisa.gov/uscert/ncas/current-activity/2022/02/07/fbi-releases-indicators-compromise-associated-lockbit-20
Submission Tags: falconsandbox
Submission: On February 11 via api from US — Scanned from DE
Submission Tags: falconsandbox
Submission: On February 11 via api from US — Scanned from DE
Form analysis
3 forms found in the DOMGET https://search.us-cert.gov/search
<form accept-charset="UTF-8" action="https://search.us-cert.gov/search" class="hidden-xs searchbox" method="get"><input name="utf8" type="hidden" value="✓"><input id="affiliate-desktop" name="affiliate" type="hidden" value="us-cert">
<div class="form-group"><label class="sr-only" for="query-desktop">Enter Search Terms(s):</label>
<div class="input-group"><input autocomplete="off" class="form-control form-control-custom input-lg" id="query-desktop" name="query" placeholder="Search" type="text">
<div class="input-group-addon input-group-addon-custom"><button class="submit input-lg"><img alt="search icon" data-entity-type="" data-entity-uuid="" src="/sites/default/files/cert/search-icon.png" title="search icon"></button></div>
</div>
</div>
</form>
GET https://search.us-cert.gov/search
<form accept-charset="UTF-8" action="https://search.us-cert.gov/search" class="hidden-lg hidden-md searchbox" method="get"><input name="utf8" type="hidden" value="✓"><input id="affiliate-mobile" name="affiliate" type="hidden" value="us-cert">
<div class="form-group"><label class="sr-only" for="query-mobile">Enter Search Terms(s):</label>
<div class="input-group"><input autocomplete="off" class="form-control form-control-custom input-lg" id="query-mobile" name="query" placeholder="Search" type="text">
<div class="input-group-addon input-group-addon-custom"><button class="submit input-lg"><img alt="search icon" data-entity-type="" data-entity-uuid="" src="/sites/default/files/cert/search-icon.png" title="search icon"></button></div>
</div>
</div>
</form>
https://public.govdelivery.com/accounts/USDHSCISA/subscribers/qualify
<form action="https://public.govdelivery.com/accounts/USDHSCISA/subscribers/qualify"><label class="visually-hidden" for="email-address-field">Enter your email address</label> <input class="signup-form" id="email-address-field" name="email"
placeholder=" Enter your email address" title="Enter your email address" type="text"><br><input class="btn btn-primary" name="submit" title="Sign up for alerts" type="submit" value="Sign Up"> </form>
Text Content
Skip to main content An official website of the United States government Here's how you know Official websites use .gov A .gov website belongs to an official government organization in the United States. Secure .gov websites use HTTPS A lock () or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites. Enter Search Terms(s): CISA.gov Services Report -------------------------------------------------------------------------------- Toggle navigation Enter Search Terms(s): CISA.gov Services Report CERTMAIN MENU * Alerts and Tips * Resources * Industrial Control Systems * Report -------------------------------------------------------------------------------- TLP:WHITE TLP:WHITE 1. National Cyber Awareness System > 2. Current Activity > 3. FBI Releases Indicators of Compromise Associated with LockBit 2.0 Ransomware FBI RELEASES INDICATORS OF COMPROMISE ASSOCIATED WITH LOCKBIT 2.0 RANSOMWARE Original release date: February 07, 2022 The Federal Bureau of Investigation (FBI) has released a Flash report detailing indicators of compromise (IOCs) associated with attacks, using LockBit 2.0, a Ransomware-as-a-Service that employs a wide variety of tactics, techniques, and procedures, creating significant challenges for defense and mitigation. CISA encourages users and administrators to review the IOCs and technical details in FBI Flash CU-000162-MW and apply the recommend mitigations. This product is provided subject to this Notification and this Privacy & Use policy. Please share your thoughts. We recently updated our anonymous product survey; we'd welcome your feedback. LATEST ALERTS * 2021 Trends Show Increased Globalized Threat of Ransomware Wednesday, February 9, 2022 * Understanding and Mitigating Russian State-Sponsored Cyber Threats to U.S. Critical Infrastructure Tuesday, January 11, 2022 * Mitigating Log4Shell and Other Log4j-Related Vulnerabilities Wednesday, December 22, 2021 More Alerts » RECENT VULNERABILITIES * VU#119678: Samba vfs_fruit module insecurely handles extended file attributes Thursday, February 10, 2022 at 8:04 AM * VU#930724: Apache Log4j allows insecure JNDI lookups Monday, February 7, 2022 at 8:18 AM * VU#796611: InsydeH2O UEFI software impacted by multiple vulnerabilities in SMM Friday, February 4, 2022 at 6:24 PM * VU#692873: Saviynt Enterprise Identity Cloud vulnerable to local user enumeration and authentication bypass Wednesday, February 2, 2022 at 3:09 PM * VU#287178: McAfee Agent for Windows is vulnerable to privilege escalation due to OPENSSLDIR location Thursday, January 20, 2022 at 4:15 PM More Vulnerability Notes » CONTACT US (888)282-0870 Send us email(link sends email) Download PGP/GPG keys Submit website feedback SUBSCRIBE TO ALERTS Receive security alerts, tips, and other updates. Enter your email address HSIN Report -------------------------------------------------------------------------------- Home Site Map FAQ Contact Us Traffic Light Protocol PCII Accountability Disclaimer Privacy Policy FOIA No Fear Act AccessibilityPlain WritingPlug-ins Inspector General The White House USA.gov CISA is part of the Department of Homeland Security