CERT mailing list archives
Current Activity - UPDATE: Ongoing Malicious Cyber Activity Against U.S. Government and Private Sector Entities
From: Current Activity <us-cert () us-cert gov>
Date: Fri, 1 Mar 2013 16:45:54 -0500
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 National Cyber Awareness System UPDATE: Ongoing Malicious Cyber Activity Against U.S. Government and Private Sector Entities Original release date: February 22, 2013 | Last revised: March 01, 2013 UPDATE: The United States Department of Homeland Security, in collaboration with the Federal Bureau of Investigation and other partners, has released a second Joint Indicator Bulletin (JIB) through secure channels. Confirmed members of the cybersecurity community of practice, which may include critical infrastructure owners and operators, systems administrators, and information security practitioners, may request a copy of this second bulletin by contacting soc () us-cert gov with the subject "JIB Request," and including the requestor's name and affiliation. Various cyber actors have engaged in malicious activity against U.S. Government and private sector entities. The apparent objective of this activity has been the theft of intellectual property, trade secrets, and other sensitive business information. The malicious actors have employed a variety of techniques to infiltrate targeted organizations, establish a foothold, penetrate throughout the targets. networks, and steal confidential or proprietary data. The United States Department of Homeland Security, in collaboration with the Federal Bureau of Investigation and other partners, has released a Joint Indicator Bulletin (JIB) through secure channels. This JIB contains cyber threat indicators that will enable public and private sector critical infrastructure partners to take action to mitigate adverse impacts from this activity and protect their sensitive information. This traffic light protocol green JIB contains internet protocol addresses, domain names, and malware indicators associated with malicious data exfiltration activity. Confirmed members of the cybersecurity community of practice, which may include critical infrastructure owners and operators, systems administrators, and information security practitioners, may request a copy of this bulletin by contacting soc () us-cert gov with the subject "JIB Request," and including the requestor's name and affiliation. Relevant URL(s): <http://www.us-cert.gov/tlp/> ____________________________________________________________________ Produced by US-CERT, a government organization. ____________________________________________________________________ This product is provided subject to this Notification: http://www.us-cert.gov/privacy/notification.html Privacy & Use policy: http://www.us-cert.gov/privacy/ This document can also be found at http://www.us-cert.gov/ncas/current-activity/2013/02/22/Ongoing-Malicious-Cyber-Activity-Against-US-Government-and-Private For instructions on subscribing to or unsubscribing from this mailing list, visit http://www.us-cert.gov/cas/signup.html -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.5 (GNU/Linux) iQEVAwUBUTEhindnhE8Qi3ZhAQJYPAf8DdoTGqjxv7SlI2TOOT5yye5fAEtBKm/v Ad2ndTjatIheDlG7MYT84O0HABtJCTQTZXi3Ktioo6h9om2ksWFwtYNp/6Ygj4fZ QYwnsLi2vUCSLlgzNxN2nDJq/25ZTE5rnhuolmTMe1v7g7UdMaN0RFOUM2PgWu/8 4oXLmO7HW1Ma4QHtFbb3Ji+aRLhefObI+MGX6J8uDAAmUdjLN0ihn8e/08LVBCit Dt3zSyVLvHDSSoDLJKW3fWrFah3CBF5b5gnDs0iMuQ1cVbGTOm7wHupHwOiwUO/M b5f3etfB8yn2k2bs/jNlsjjC3gkzER8rHEo2fYnh7ETNglPibqPucA== =JPQN -----END PGP SIGNATURE-----
Current thread:
- Current Activity - UPDATE: Ongoing Malicious Cyber Activity Against U.S. Government and Private Sector Entities Current Activity (Mar 01)