U.S. Security Agencies Issue Advisory for Russian Cyber Attacks on Infrastructure

January 13, 2022

Federal cybersecurity officials are again warning of Russian cyber attacks and urging critical infrastructure networks in particular to be on alert.

The Cybersecurity and Infrastructure Security Agency, the Federal Bureau of Investigation, and the National Security Agency released a joint Cybersecurity Advisory (CSA) that provides an overview of Russian state-sponsored cyber operations, including commonly observed tactics, techniques and procedures.

Historically, Russian state-sponsored actors have used spearphishing, brute force and exploiting known vulnerabilities against accounts and networks with weak security, as well as other “common but effective tactics” to gain initial access to target networks, according to the advisory.

The agencies did not cite a specific reason for releasing the Russia report at this time. They said only that it was being released to “help the cybersecurity community reduce the risk presented by Russian state-sponsored cyber threats.”

According to federal cyber officials, these are actions that critical infrastructure organizations should implement immediately:
• Patch all systems. Prioritize patching known exploited vulnerabilities.
• Implement multi-factor authentication.
• Use antivirus software.
• Develop internal contact lists and surge support.

CISA recommends network defenders review CISA’s Russia Cyber Threat Overview and Advisories page for more information on Russian state-sponsored malicious cyber activity. CISA recommends critical infrastructure leaders review CISA Insights: Preparing for and Mitigating Potential Cyber Threats.

President Joe Biden has been pressuring Russian President Vladimir Putin to halt Russian cyber actions against the U.S. In recent weeks, there has been concern expressed in Washington that Russia may turn to cyber attacks as U.S.-Russia tensions over Ukraine grow. That’s something they did in 2015 and 2016 when the U.S. and Russia last squared off over Ukraine, according to the advisory.

The agencies are encouraging the cybersecurity community, especially those involved in protecting critical infrastructure, to adopt a “heightened state of awareness, conduct proactive threat hunting and implement the mitigations” identified in the joint CSA.

In its review of past Russian cyber attacks, the advisory identifies key vulnerabilities that Russian hackers have exploited in systems including Microsoft Exchange, Cisco routers, Oracle servers, Zimbra software and Citrix networks, among others.

The advisory says Russian actors have also “demonstrated the ability to maintain persistent, undetected, long-term access in compromised environments—including cloud environments—by using legitimate credentials.”

Russian hackers in the past have targeted a variety of U.S. and international critical infrastructure organizations, including those in the defense industry, healthcare, public health, energy, telecommunications and government facilities. Some of the high-profile cyber activity publicly attributed to Russian state-sponsored actors and cited in the report include: