{"id":20514,"date":"2022-01-12T20:38:28","date_gmt":"2022-01-12T20:38:28","guid":{"rendered":"https:\/\/www.esecurityplanet.com\/?p=20514"},"modified":"2022-01-14T00:49:25","modified_gmt":"2022-01-14T00:49:25","slug":"u-s-security-agencies-issue-russian-threat-alert","status":"publish","type":"post","link":"https:\/\/www.esecurityplanet.com\/threats\/u-s-security-agencies-issue-russian-threat-alert\/","title":{"rendered":"U.S. Security Agencies Warn About Russian Threat Gangs Amid Ukraine Tensions"},"content":{"rendered":"<p>U.S. federal security agencies are putting companies on alert to potential threats from Russian state-sponsored cybercriminal groups, warning in particular about dangers to <a href=\"https:\/\/www.esecurityplanet.com\/networks\/critical-infrastructure-protection-physical-cybersecurity\/\">critical infrastructure<\/a> and urging organizations to learn how to detect and protect against attacks.<\/p>\n<p>The joint <a href=\"https:\/\/www.cisa.gov\/uscert\/ncas\/alerts\/aa22-011a\" target=\"_blank\" rel=\"noopener\">cybersecurity advisory<\/a> issued Jan. 11 by the FBI, National Security Agency (NSA) and Cybersecurity and Infrastructure Security Agency (CISA) comes as tensions rise between Russia, the United States and European countries over Russia\u2019s military activities related to Ukraine. The alert gives companies and agencies an overview of common tactics used by such Russia-based threat groups, lists of <a href=\"https:\/\/www.esecurityplanet.com\/threats\/mitre-cisa-hardware-software-vulnerabilities\/\">vulnerabilities<\/a> they\u2019ve been known to exploit and steps companies can take to detect, respond to and mitigate an attack.<\/p>\n<p>\u201cHistorically, Russian state-sponsored <a href=\"https:\/\/www.esecurityplanet.com\/threats\/advanced-persistent-threat\/\">advanced persistent threat (APT)<\/a> actors have used common but effective tactics \u2013 including <a href=\"https:\/\/www.esecurityplanet.com\/threats\/phishing-attacks\/\">spearphishing<\/a>, brute force, and exploiting known vulnerabilities against accounts and networks with weak security \u2013 to gain initial access to target networks,\u201d the agencies wrote in the alert. \u201cRussian state-sponsored APT actors have also demonstrated sophisticated tradecraft and cyber capabilities by compromising third-party infrastructure, compromising third-party software, or developing and deploying custom <a href=\"https:\/\/www.esecurityplanet.com\/threats\/malware-types\/\">malware<\/a>.\u201d<\/p>\n<p>In addition, such groups have shown they can \u201cmaintain persistent, undetected, long-term access in compromised environments \u2013 including cloud environments \u2013 by using legitimate credentials,\u201d they wrote. \u201cIn some cases, Russian state-sponsored cyber operations against critical infrastructure organizations have specifically targeted operational technology (OT)\/industrial control systems (ICS) networks with destructive malware.\u201d<\/p>\n<p>Also read: <a href=\"https:\/\/www.esecurityplanet.com\/networks\/critical-infrastructure-protection-physical-cybersecurity\/\">Critical Infrastructure Protection: Physical and Cyber Security Both Matter<\/a><\/p>\n<h2><strong>Russian Groups Behind High-Profile Attacks<\/strong><\/h2>\n<p>Russian-backed groups have been behind some of the most significant recent cyberattacks, including the SolarWinds breach (Nobelium) and the <a href=\"https:\/\/www.esecurityplanet.com\/threats\/ransomware-protection\/\">ransomware<\/a> attacks on <a href=\"https:\/\/www.esecurityplanet.com\/trends\/colonial-pipeline-ransomware-attack\/\">Colonial Pipeline<\/a> (DarkSide) and <a href=\"https:\/\/www.esecurityplanet.com\/compliance\/white-house-says-take-ransomware-threat-seriously\/\">global meat supplier JBS<\/a> (REvil).<\/p>\n<p><a href=\"https:\/\/www.esecurityplanet.com\/threats\/white-house-congress-target-ransomware-payments\/\">Government agencies and the Biden administration<\/a> also have taken steps to push back against Russia and the cybercriminal groups it\u2019s accused of supporting. President Biden in July called on Russian President Vladimir Putin to stem <a href=\"https:\/\/www.esecurityplanet.com\/threats\/the-link-between-ransomware-and-cryptocurrency\/\">ransomware<\/a> and other cyberattacks from these gangs. In addition, the administration has taken other actions, from <a href=\"https:\/\/www.esecurityplanet.com\/threats\/tech-giants-pledge-big-money-to-cybersecurity\/\">working with U.S. companies<\/a> on their security posture to <a href=\"https:\/\/www.esecurityplanet.com\/threats\/u-s-10-million-bounty-on-darkside-ransomware-group\/\">putting bounties<\/a> on the more active and notorious threat actors.<\/p>\n<p>Despite all this, the threat of the Russian gangs continues to hang over the United States and is unlikely to disappear anytime soon, according to Erich Kron, <a href=\"https:\/\/www.esecurityplanet.com\/products\/cybersecurity-training\/\">security awareness<\/a> advocate at security training firm KnowBe4.<\/p>\n<p>\u201cTargeting critical infrastructure is nothing new,\u201d Kron told <em>eSecurity Planet<\/em>. \u201cHowever, the increased attacks are certainly something to be concerned with, especially given the tensions between the U.S. and Russia over the Ukraine border crisis. Russia has very advanced cyber warfare skills which keep them hidden once a network is compromised, although ironically, the initial attack vectors are typically those of low-tech email phishing campaigns, taking advantage of people reusing <a href=\"https:\/\/www.esecurityplanet.com\/threats\/credential-stuffing-attacks\/\">already compromised passwords<\/a> or using easily guessed passwords.\u201d<\/p>\n<p>Also read: <a href=\"https:\/\/www.esecurityplanet.com\/products\/best-password-managers\/\">Best Password Managers &amp; Tools<\/a><\/p>\n<h2><strong>Tactics and Responses<\/strong><\/h2>\n<p>In their alert, the agencies laid out a range of tactics used by the Russian-supported groups, including using large-scale scans to find vulnerable servers, compromising <a href=\"https:\/\/www.esecurityplanet.com\/products\/third-party-risk-management\/\">third-party software<\/a> (like SolarWinds\u2019 Orion software), password-guessing and password-spraying efforts and leveraging the credentials of existing accounts to ensure long-term and persistent access to compromised networks.<\/p>\n<p>In addition, the agencies also outlined a number of steps to detect and protect against such attacks. Detection is critical, given the APT actors\u2019 capabilities to maintain a long-term presence in compromised enterprise and cloud environments. They urged companies to implement strong and centralized <a href=\"https:\/\/www.esecurityplanet.com\/products\/siem-tools\/\">log collection and retention programs<\/a> and\u00a0 look for behavioral evidence or network- and host-based artifacts related to known Russian ATP groups. This would include detecting password spray activity, checking authentication logs for system and application login failures of valid accounts, and detecting the use of compromised credentials.<\/p>\n<p>There also was a list of responses companies should take if they\u2019ve been compromised, including isolating affected systems and maintaining and <a href=\"https:\/\/www.esecurityplanet.com\/products\/best-backup-solutions-for-ransomware-protection\/\">securing backups<\/a>. For mitigation, the recommendations include being prepared for such an attack, creating and maintaining cyber incident responses and resiliency plans and enhancing the security posture with tools like <a href=\"https:\/\/www.esecurityplanet.com\/products\/best-iam-software\/\">identity and access management (IAM)<\/a> software and <a href=\"https:\/\/www.esecurityplanet.com\/products\/vulnerability-management-software\/\">vulnerability<\/a> and configuration solutions.<\/p>\n<p>See also: <a href=\"https:\/\/www.esecurityplanet.com\/networks\/best-incident-response-tools-services\/\">Best Incident Response Tools and Software<\/a><\/p>\n<h2><strong>Know the Enemy<\/strong><\/h2>\n<p>The agencies also urged U.S. companies to become familiar with the tactics and targets of these ATP groups.<\/p>\n<p>\u201cIt\u2019s important to remind ourselves that critical infrastructure is more than just a phrase,\u201d Tim Erlin, vice president of strategy for cybersecurity firm Tripwire, told <em>eSecurity Planet<\/em>. \u201cIt describes a vast cross-section of infrastructure on which our nation relies. Critical infrastructure really is critical.\u201d<\/p>\n<p>The agencies\u2019 alert contains both information about the threat and actionable information companies can use to protect themselves, such as the use of the <a href=\"https:\/\/www.esecurityplanet.com\/networks\/use-mitre-attck-to-understand-attacker-behavior\/\">MITRE ATT&amp;CK framework<\/a> for identifying malicious activity and mapping mitigation actions, Erlin said. \u201cIdentifying the attack in progress is important, but preventing the attack from being successful at all is better,\u201d he said.<\/p>\n<p>Also read: <a href=\"https:\/\/www.esecurityplanet.com\/products\/ransomware-removal-and-recovery-services\/\">Best Ransomware Removal and Recovery Services<\/a><\/p>\n<h2><strong>The Importance of Logs<\/strong><\/h2>\n<p>Rick Holland, CISO and vice president of strategy at cybersecurity vendor Digital Shadows, told <em>eSecurity Planet<\/em> that a key message from the alert is the use of logs. When defending against any cybercriminal group, \u201cyou must have a security monitoring infrastructure that provides situational awareness to detect and respond to intrusions,&#8221; he said. &#8220;You must have sensors in place to capture malicious activity. You must also retain those logs for retroactive threat hunting as you develop and acquire new intelligence.\u201d<\/p>\n<p>It was also important for the alert to list the tactics used by the ATP groups, Holland said.<\/p>\n<p>\u201cAlthough these groups have sophisticated capabilities, [such as the] SolarWinds intrusion, they also rely on low-hanging fruit tactics and techniques,\u201d he said. \u201cWhile it isn&#8217;t sexy, effective security hygiene like patching known vulnerabilities on external services raises the advisory costs and makes their job harder. Don&#8217;t be a soft target.\u201d<\/p>\n<p>See also: <a href=\"https:\/\/www.esecurityplanet.com\/products\/siem-tools\/\">Best SIEM Tools &amp; Software<\/a><\/p>\n<h2><strong>Geopolitical Tensions<\/strong><\/h2>\n<p>Holland echoed KnowBe4\u2019s Kron regarding the threat of increased activity stemming from the tensions around Russia\u2019s activities with Ukraine. Should the conflict escalate, the Russian-supported bad actors could also increase their operations.<\/p>\n<p>\u201cCyberspace has become a key component of geopolitics,\u201d he said. \u201cRussian APT groups aren&#8217;t at the top of the threat model for all companies, unlike the critical infrastructure providers mentioned in the alert, but could end up being collateral damage.\u201d<\/p>\n<h2><strong>A Familiar Threat<\/strong><\/h2>\n<p>Some cybersecurity professionals said the agencies\u2019 security alert does little more than remind companies about the threat and to deliver information that they already should know.<\/p>\n<p>Tim Wade, technical director and CTO at cybersecurity firm Vectra, told <em>eSecurity Planet<\/em> that he couldn\u2019t \u201crecall a time in my life when Russia\u00a0wasn\u2019t\u00a0aggressively probing western resolve, ranging from tactical incursions into air space to pulling strategic economic levers.\u00a0This activity is just a continuation of that long-standing tradition, and I read this advisory as another periodic reminder of the background radiation of global politics \u2013 if you\u2019re operating critical infrastructure and are under the impression that you aren\u2019t squarely in an operator\u2019s crosshairs, you\u2019re wrong.\u201d<\/p>\n<p>Tim Helming, security evangelist at threat intelligence company DomainTools, said the guidance in the alert is good, but that \u201cit\u2019s tempting to look at it as motherhood-and-apple-pie. The vast majority of owners and operators of critical infrastructure are well aware of the threats and are also cognizant of many of the fundamental steps toward hardening their assets against these threats. Many in the critical infrastructure community take an \u2018assume breach.\u2019\u201d<\/p>\n<p>Most companies and agencies already are using and improving the procedures and tools outlined in the alert, Helming told <em>eSecurity Planet<\/em>. CISA, the FBI and NSA likely issued the alert in part \u201cbecause if they weren\u2019t on record doing so and a compromise were confirmed, it would have been a glaring gap. It also gives owners and operators facing resource constraints more support in their requests and it\u2019s important not to underestimate how important that can be.\u201d<\/p>\n<p>Further reading: <a href=\"https:\/\/www.esecurityplanet.com\/trends\/cybersecurity-outlook-2022-ransomware-and-ai-attacks\/\">Cybersecurity Outlook 2022: Third-Party, Ransomware and AI Attacks Will Get Worse<\/a><\/p>\n\n\n<div id=\"ta-campaign-widget-66d6f3b4d1ca4-popup-wrapper\" class=\"ta-campaign-widget__popup-wrapper\">\n    \n<div\n    style=\"\n        --ta-campaign-plugin-primary: #3545ed;\n        --ta-campaign-plugin-button-text: #fff;\n        --ta-campaign-plugin-button-hover-background: #3231b4;\n        --ta-campaign-plugin-button-hover-text: #fff;\n        --ta-campaign-plugin-button-toggle-background: #3231b4;\n        --ta-campaign-plugin-button-toggle-text: #3231B4;\n    \"\n    data-ajax-url=\"https:\/\/www.esecurityplanet.com\/wp\/wp-admin\/admin-ajax.php\">\n    <div\n        id=\"ta-campaign-widget-66d6f3b4d1ca4\"\n        class=\"ta-campaign-widget ta-campaign-widget--popup\"\n        data-campaign-fields='{\"properties\":{\"campaign_type\":\"popup\",\"campaign_category\":false,\"sailthru_list\":[\"cybersecurity-insider\"],\"popup_type\":\"exit_intent\",\"appearance\":{\"colors\":{\"primary_color\":\"#3545ed\",\"button\":{\"button_text_color\":\"#fff\",\"hover\":{\"button_hover_background_color\":\"#3231b4\",\"button_hover_text_color\":\"#fff\"},\"toggle\":{\"button_toggle_background_color\":\"#3231b4\",\"button_toggle_text_color\":\"#3231B4\"}}},\"custom_scss\":\"\"},\"behavior\":{\"opt_in_enabled\":true},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}},\"identifier\":\"66d6f3b4d1ca4\",\"campaign_id\":26045,\"campaign_type\":\"popup\",\"popup_type\":\"exit_intent\",\"newsletters\":[\"cybersecurity-insider\"],\"behavior\":{\"opt_in_enabled\":true},\"appearance\":{\"colors\":{\"primary\":\"#3545ed\",\"button\":{\"text\":\"#fff\",\"hover\":{\"background\":\"#3231b4\",\"text\":\"#fff\"},\"toggle\":{\"background\":\"#3231b4\",\"text\":\"#3231B4\"}}},\"custom_css\":\"\"},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}}'>\n\n                <div class=\"ta-campaign-widget__exit\">\n            <svg class=\"w-8\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"1.5\" viewBox=\"0 0 24 24\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\">\n                <path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M6 18L18 6M6 6l12 12\"><\/path>\n            <\/svg>\n        <\/div>\n        \n        <div class=\"ta-campaign-widget__wrapper\">\n            <div class=\"ta-campaign-widget__header mb-6\">\n                                <h3 class=\"ta-campaign-widget__tagline\">\n                    Get the Free Cybersecurity Newsletter                <\/h3>\n                \n                \n                                <p class=\"ta-campaign-widget__content mt-6\">\n                    Strengthen your organization's IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday                <\/p>\n                            <\/div>\n\n            <form class=\"ta-campaign-widget__form\">\n                <div class=\"ta-campaign-widget__input mb-4\"  data-field=\"email\">\n                    <label\n                        class=\"sr-only\"\n                        for=\"email-66d6f3b4d1ca4\">\n                        Email Address\n                    <\/label>\n                    <input\n                        class=\"ta-campaign-widget__input__text\"\n                        placeholder=\"Work Email Address\"\n                        id=\"email-66d6f3b4d1ca4\"\n                        name=\"email\"\n                        type=\"email\">\n                <\/div>\n\n                                <div class=\"ta-campaign-widget__checkbox mb-4\" data-field=\"opt_in\">\n                    <div class=\"flex items-start\">\n                        <input\n                            id=\"opt-in-66d6f3b4d1ca4\"\n                            class=\"ta-campaign-widget__checkbox__input mr-2\"\n                            name=\"opt-in\"\n                            type=\"checkbox\"\/>\n                        <label\n                            class=\"ta-campaign-widget__checkbox__label\"\n                            for=\"opt-in-66d6f3b4d1ca4\">\n                            By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.                        <\/label>\n                    <\/div>\n                <\/div>\n                \n                <button class=\"ta-campaign-widget__button\" type=\"submit\" >\n                    Subscribe                <\/button>\n            <\/form>\n        <\/div>\n    <\/div>\n<\/div>\n\n<style>\n<\/style><\/div>\n","protected":false},"excerpt":{"rendered":"<p>U.S. federal security agencies are putting companies on alert to potential threats from Russian state-sponsored cybercriminal groups, warning in particular about dangers to critical infrastructure and urging organizations to learn how to detect and protect against attacks. The joint cybersecurity advisory issued Jan. 11 by the FBI, National Security Agency (NSA) and Cybersecurity and Infrastructure [&hellip;]<\/p>\n","protected":false},"author":256,"featured_media":20516,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_gazelle_contributing_experts":"","footnotes":""},"categories":[15],"tags":[],"b2b_audience":[33],"b2b_industry":[],"b2b_product":[31788],"class_list":["post-20514","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-threats","b2b_audience-awareness-and-consideration","b2b_product-advanced-persistent-threats"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>U.S. Security Agencies Warn About Russian Threat Gangs Amid Ukraine Tensions | eSecurity Planet<\/title>\n<meta name=\"description\" content=\"With Ukraine tensions rising, U.S. cybersecurity agencies issue defensive guidance for critical infrastructure.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.esecurityplanet.com\/threats\/u-s-security-agencies-issue-russian-threat-alert\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"U.S. Security Agencies Warn About Russian Threat Gangs Amid Ukraine Tensions | eSecurity Planet\" \/>\n<meta property=\"og:description\" content=\"With Ukraine tensions rising, U.S. cybersecurity agencies issue defensive guidance for critical infrastructure.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.esecurityplanet.com\/threats\/u-s-security-agencies-issue-russian-threat-alert\/\" \/>\n<meta property=\"og:site_name\" content=\"eSecurity Planet\" \/>\n<meta property=\"article:published_time\" content=\"2022-01-12T20:38:28+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-01-14T00:49:25+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/01\/cyber-attacks-scaled-e1642019726331.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"900\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Jeff Burt\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:site\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jeff Burt\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/u-s-security-agencies-issue-russian-threat-alert\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/u-s-security-agencies-issue-russian-threat-alert\/\"},\"author\":{\"name\":\"Jeff Burt\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/62368dee45ce8f1ffc35abf9f8cc854e\"},\"headline\":\"U.S. Security Agencies Warn About Russian Threat Gangs Amid Ukraine Tensions\",\"datePublished\":\"2022-01-12T20:38:28+00:00\",\"dateModified\":\"2022-01-14T00:49:25+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/u-s-security-agencies-issue-russian-threat-alert\/\"},\"wordCount\":1358,\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/u-s-security-agencies-issue-russian-threat-alert\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/01\/cyber-attacks-scaled-e1642019726331.jpg\",\"articleSection\":[\"Threats\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/u-s-security-agencies-issue-russian-threat-alert\/\",\"url\":\"https:\/\/www.esecurityplanet.com\/threats\/u-s-security-agencies-issue-russian-threat-alert\/\",\"name\":\"U.S. Security Agencies Warn About Russian Threat Gangs Amid Ukraine Tensions | eSecurity Planet\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/u-s-security-agencies-issue-russian-threat-alert\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/u-s-security-agencies-issue-russian-threat-alert\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/01\/cyber-attacks-scaled-e1642019726331.jpg\",\"datePublished\":\"2022-01-12T20:38:28+00:00\",\"dateModified\":\"2022-01-14T00:49:25+00:00\",\"description\":\"With Ukraine tensions rising, U.S. cybersecurity agencies issue defensive guidance for critical infrastructure.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/u-s-security-agencies-issue-russian-threat-alert\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.esecurityplanet.com\/threats\/u-s-security-agencies-issue-russian-threat-alert\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/u-s-security-agencies-issue-russian-threat-alert\/#primaryimage\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/01\/cyber-attacks-scaled-e1642019726331.jpg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/01\/cyber-attacks-scaled-e1642019726331.jpg\",\"width\":900,\"height\":600},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/u-s-security-agencies-issue-russian-threat-alert\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.esecurityplanet.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"U.S. Security Agencies Warn About Russian Threat Gangs Amid Ukraine Tensions\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"name\":\"eSecurity Planet\",\"description\":\"Industry-leading guidance and analysis for how to keep your business secure.\",\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.esecurityplanet.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\",\"name\":\"eSecurityPlanet\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"width\":1134,\"height\":375,\"caption\":\"eSecurityPlanet\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/eSecurityPlanet\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/62368dee45ce8f1ffc35abf9f8cc854e\",\"name\":\"Jeff Burt\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/07\/Jeff-Burt-photo-150x150.jpg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/07\/Jeff-Burt-photo-150x150.jpg\",\"caption\":\"Jeff Burt\"},\"description\":\"Jeffrey Burt has been a journalist for more than three decades, the last 20-plus years covering technology. During more than 16 years with eWEEK, he covered everything from data center infrastructure and collaboration technology to AI, cloud, quantum computing and cybersecurity. A freelance journalist since 2017, his articles have appeared on such sites as eWEEK, eSecurity Planet, Enterprise Networking Planet, Enterprise Storage Forum, The Next Platform, ITPro Today, Channel Futures, Channelnomics, SecurityNow, and Data Breach Today.\",\"url\":\"https:\/\/www.esecurityplanet.com\/author\/jburt\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"U.S. Security Agencies Warn About Russian Threat Gangs Amid Ukraine Tensions | eSecurity Planet","description":"With Ukraine tensions rising, U.S. cybersecurity agencies issue defensive guidance for critical infrastructure.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.esecurityplanet.com\/threats\/u-s-security-agencies-issue-russian-threat-alert\/","og_locale":"en_US","og_type":"article","og_title":"U.S. Security Agencies Warn About Russian Threat Gangs Amid Ukraine Tensions | eSecurity Planet","og_description":"With Ukraine tensions rising, U.S. cybersecurity agencies issue defensive guidance for critical infrastructure.","og_url":"https:\/\/www.esecurityplanet.com\/threats\/u-s-security-agencies-issue-russian-threat-alert\/","og_site_name":"eSecurity Planet","article_published_time":"2022-01-12T20:38:28+00:00","article_modified_time":"2022-01-14T00:49:25+00:00","og_image":[{"width":900,"height":600,"url":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/01\/cyber-attacks-scaled-e1642019726331.jpg","type":"image\/jpeg"}],"author":"Jeff Burt","twitter_card":"summary_large_image","twitter_creator":"@eSecurityPlanet","twitter_site":"@eSecurityPlanet","twitter_misc":{"Written by":"Jeff Burt","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.esecurityplanet.com\/threats\/u-s-security-agencies-issue-russian-threat-alert\/#article","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/u-s-security-agencies-issue-russian-threat-alert\/"},"author":{"name":"Jeff Burt","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/62368dee45ce8f1ffc35abf9f8cc854e"},"headline":"U.S. Security Agencies Warn About Russian Threat Gangs Amid Ukraine Tensions","datePublished":"2022-01-12T20:38:28+00:00","dateModified":"2022-01-14T00:49:25+00:00","mainEntityOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/u-s-security-agencies-issue-russian-threat-alert\/"},"wordCount":1358,"publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/u-s-security-agencies-issue-russian-threat-alert\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/01\/cyber-attacks-scaled-e1642019726331.jpg","articleSection":["Threats"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.esecurityplanet.com\/threats\/u-s-security-agencies-issue-russian-threat-alert\/","url":"https:\/\/www.esecurityplanet.com\/threats\/u-s-security-agencies-issue-russian-threat-alert\/","name":"U.S. Security Agencies Warn About Russian Threat Gangs Amid Ukraine Tensions | eSecurity Planet","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/u-s-security-agencies-issue-russian-threat-alert\/#primaryimage"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/u-s-security-agencies-issue-russian-threat-alert\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/01\/cyber-attacks-scaled-e1642019726331.jpg","datePublished":"2022-01-12T20:38:28+00:00","dateModified":"2022-01-14T00:49:25+00:00","description":"With Ukraine tensions rising, U.S. cybersecurity agencies issue defensive guidance for critical infrastructure.","breadcrumb":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/u-s-security-agencies-issue-russian-threat-alert\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.esecurityplanet.com\/threats\/u-s-security-agencies-issue-russian-threat-alert\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/threats\/u-s-security-agencies-issue-russian-threat-alert\/#primaryimage","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/01\/cyber-attacks-scaled-e1642019726331.jpg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/01\/cyber-attacks-scaled-e1642019726331.jpg","width":900,"height":600},{"@type":"BreadcrumbList","@id":"https:\/\/www.esecurityplanet.com\/threats\/u-s-security-agencies-issue-russian-threat-alert\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.esecurityplanet.com\/"},{"@type":"ListItem","position":2,"name":"U.S. Security Agencies Warn About Russian Threat Gangs Amid Ukraine Tensions"}]},{"@type":"WebSite","@id":"https:\/\/www.esecurityplanet.com\/#website","url":"https:\/\/www.esecurityplanet.com\/","name":"eSecurity Planet","description":"Industry-leading guidance and analysis for how to keep your business secure.","publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.esecurityplanet.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.esecurityplanet.com\/#organization","name":"eSecurityPlanet","url":"https:\/\/www.esecurityplanet.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","width":1134,"height":375,"caption":"eSecurityPlanet"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/eSecurityPlanet"]},{"@type":"Person","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/62368dee45ce8f1ffc35abf9f8cc854e","name":"Jeff Burt","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/07\/Jeff-Burt-photo-150x150.jpg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/07\/Jeff-Burt-photo-150x150.jpg","caption":"Jeff Burt"},"description":"Jeffrey Burt has been a journalist for more than three decades, the last 20-plus years covering technology. During more than 16 years with eWEEK, he covered everything from data center infrastructure and collaboration technology to AI, cloud, quantum computing and cybersecurity. A freelance journalist since 2017, his articles have appeared on such sites as eWEEK, eSecurity Planet, Enterprise Networking Planet, Enterprise Storage Forum, The Next Platform, ITPro Today, Channel Futures, Channelnomics, SecurityNow, and Data Breach Today.","url":"https:\/\/www.esecurityplanet.com\/author\/jburt\/"}]}},"_links":{"self":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/20514"}],"collection":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/users\/256"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/comments?post=20514"}],"version-history":[{"count":0,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/20514\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media\/20516"}],"wp:attachment":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media?parent=20514"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/categories?post=20514"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/tags?post=20514"},{"taxonomy":"b2b_audience","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_audience?post=20514"},{"taxonomy":"b2b_industry","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_industry?post=20514"},{"taxonomy":"b2b_product","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_product?post=20514"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}