CERT mailing list archives

Current Activity - UPDATE: Ongoing Malicious Cyber Activity Against U.S. Government and Private Sector Entities


From: Current Activity <us-cert () us-cert gov>
Date: Fri, 1 Mar 2013 16:45:54 -0500

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

National Cyber Awareness System
UPDATE: Ongoing Malicious Cyber Activity Against U.S. Government and Private Sector Entities

Original release date: February 22, 2013 | Last revised: March 01, 2013

UPDATE: The United States Department of Homeland Security, in
collaboration with the Federal Bureau of Investigation and other
partners, has released a second Joint Indicator Bulletin (JIB) through
secure channels. Confirmed members of the cybersecurity community of
practice, which may include critical infrastructure owners and
operators, systems administrators, and information security
practitioners, may request a copy of this second bulletin by contacting
soc () us-cert gov with the subject "JIB Request," and including the
requestor's name and affiliation.

Various cyber actors have engaged in malicious activity against U.S. Government and private sector entities. The 
apparent objective of this activity has been the theft of intellectual property, trade secrets, and other sensitive 
business information. The malicious actors have employed a variety of techniques to infiltrate targeted organizations, 
establish a foothold, penetrate throughout the targets. networks, and steal confidential or proprietary data. The 
United States Department of Homeland Security, in collaboration with the Federal Bureau of Investigation and other 
partners, has released a Joint Indicator Bulletin (JIB) through secure channels. This JIB contains cyber threat 
indicators that will enable public and private sector critical infrastructure partners to take action to mitigate 
adverse impacts from this activity and protect their sensitive information.

This traffic light protocol green JIB contains internet protocol
addresses, domain names, and malware indicators associated with malicious data exfiltration activity. Confirmed members 
of the cybersecurity community of practice, which may include critical infrastructure owners and operators, systems 
administrators, and information security practitioners, may request a copy of this bulletin by contacting soc () 
us-cert gov with the subject "JIB Request," and including the requestor's name and affiliation.

Relevant URL(s):
<http://www.us-cert.gov/tlp/>

____________________________________________________________________

   Produced by US-CERT, a government organization.
____________________________________________________________________

This product is provided subject to this Notification:
http://www.us-cert.gov/privacy/notification.html

Privacy & Use policy:
http://www.us-cert.gov/privacy/

This document can also be found at
http://www.us-cert.gov/ncas/current-activity/2013/02/22/Ongoing-Malicious-Cyber-Activity-Against-US-Government-and-Private

For instructions on subscribing to or unsubscribing from this
mailing list, visit http://www.us-cert.gov/cas/signup.html

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.5 (GNU/Linux)

iQEVAwUBUTEhindnhE8Qi3ZhAQJYPAf8DdoTGqjxv7SlI2TOOT5yye5fAEtBKm/v
Ad2ndTjatIheDlG7MYT84O0HABtJCTQTZXi3Ktioo6h9om2ksWFwtYNp/6Ygj4fZ
QYwnsLi2vUCSLlgzNxN2nDJq/25ZTE5rnhuolmTMe1v7g7UdMaN0RFOUM2PgWu/8
4oXLmO7HW1Ma4QHtFbb3Ji+aRLhefObI+MGX6J8uDAAmUdjLN0ihn8e/08LVBCit
Dt3zSyVLvHDSSoDLJKW3fWrFah3CBF5b5gnDs0iMuQ1cVbGTOm7wHupHwOiwUO/M
b5f3etfB8yn2k2bs/jNlsjjC3gkzER8rHEo2fYnh7ETNglPibqPucA==
=JPQN
-----END PGP SIGNATURE-----


Current thread: