Quantcast
Channel: BOT24
Viewing all articles
Browse latest Browse all 8064

US-CERT Current Activity - UPDATE: Ongoing Malicious Cyber Activity Against U.S. Government and Private Sector Entities

$
0
0
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

National Cyber Awareness System
UPDATE: Ongoing Malicious Cyber Activity Against U.S. Government and Private Sector Entities

Original release date: February 22, 2013 | Last revised: March 01, 2013

UPDATE: The United States Department of Homeland Security, in
collaboration with the Federal Bureau of Investigation and other
partners, has released a second Joint Indicator Bulletin (JIB) through
secure channels. Confirmed members of the cybersecurity community of
practice, which may include critical infrastructure owners and
operators, systems administrators, and information security
practitioners, may request a copy of this second bulletin by contacting
soc@us-cert.gov with the subject "JIB Request," and including the
requestor's name and affiliation.

Various cyber actors have engaged in malicious activity against U.S. Government and private sector entities. The apparent objective of this activity has been the theft of intellectual property, trade secrets, and other sensitive business information. The malicious actors have employed a variety of techniques to infiltrate targeted organizations, establish a foothold, penetrate throughout the targets. networks, and steal confidential or proprietary data. The United States Department of Homeland Security, in collaboration with the Federal Bureau of Investigation and other partners, has released a Joint Indicator Bulletin (JIB) through secure channels. This JIB contains cyber threat indicators that will enable public and private sector critical infrastructure partners to take action to mitigate adverse impacts from this activity and protect their sensitive information.

This traffic light protocol green JIB contains internet protocol
addresses, domain names, and malware indicators associated with malicious data exfiltration activity. Confirmed members of the cybersecurity community of practice, which may include critical infrastructure owners and operators, systems administrators, and information security practitioners, may request a copy of this bulletin by contactingsoc@us-cert.gov with the subject "JIB Request," and including the requestor's name and affiliation.

Relevant URL(s):
<http://www.us-cert.gov/tlp/>

____________________________________________________________________

   Produced by US-CERT, a government organization.
____________________________________________________________________

This product is provided subject to this Notification:
http://www.us-cert.gov/privacy/notification.html

Privacy & Use policy:
http://www.us-cert.gov/privacy/

This document can also be found at
http://www.us-cert.gov/ncas/current-activity/2013/02/22/Ongoing-Malicious-Cyber-Activity-Against-US-Government-and-Private



-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.5 (GNU/Linux)

iQEVAwUBUTEhindnhE8Qi3ZhAQJYPAf8DdoTGqjxv7SlI2TOOT5yye5fAEtBKm/v
Ad2ndTjatIheDlG7MYT84O0HABtJCTQTZXi3Ktioo6h9om2ksWFwtYNp/6Ygj4fZ
QYwnsLi2vUCSLlgzNxN2nDJq/25ZTE5rnhuolmTMe1v7g7UdMaN0RFOUM2PgWu/8
4oXLmO7HW1Ma4QHtFbb3Ji+aRLhefObI+MGX6J8uDAAmUdjLN0ihn8e/08LVBCit
Dt3zSyVLvHDSSoDLJKW3fWrFah3CBF5b5gnDs0iMuQ1cVbGTOm7wHupHwOiwUO/M
b5f3etfB8yn2k2bs/jNlsjjC3gkzER8rHEo2fYnh7ETNglPibqPucA==
=JPQN
-----END PGP SIGNATURE-----

Viewing all articles
Browse latest Browse all 8064

Trending Articles