Grizzly Steppe: FBI, DHS Response to Russian Hacking

Grizzly Steppe: As “evidence” and to document the unprecedented act of expelling 35 Russian diplomats and closing two Russian associations without a major concurrent political or diplomatic incident, or any act of war, the The Department of Homeland Security (DHS) and the FBI published a 13-page “report” justifying the above actions “to breach and exploit networks and parameters related to the US election”, that is, the hack.

As DHS writes, “this document provides technical details about the tools and infrastructure used by Russian civilians and military intelligence services (Russian civilian and military intelligence Services or RIS) to hack and exploit US election-related networks and parameters, as well as US government politicians and private sector sectors. The US government refers to this malicious cyber activity by RIS as GRIZZLY STEPPE.”Grizzly Steppe

From the very beginning of the report, there is a broad disclaimer, according to which everything contained in it (the report) may be totally incorrect.

"This report is provided for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranty for any information contained herein. DHS does not endorse any commercial product or service mentioned in it. ”

The continuation raises questions as there is the claim that the tampered with the election, and the 13-page report allegedly provides technical details about the tools and infrastructure used by Russian intelligence services.

Grizzly Steppe:

So, with this helpful background in mind, we present some of the most notable excerpts from the report that refers to two supposed Russian groups - APT and APT 28.

The US Government confirms that two different RIS actors participated in the US invasion. The first group, also known as Advanced Persistent Threat (APT) 29, attacked party systems in the summer of 2015, while the second, also known as APT28, was launched in the spring of 2016.

Both groups have previously carried out targeted attacks on government organizations, think tanks, universities and companies around the world. APT29 has been observed conducting targeted spearphishing campaigns using web links that lead to malicious Remote Access Tools (RATs).

APT28 is known for using domains that closely mimic those of target organisms and are aimed at cheating potential victims by undermining legitimate certifications.

Once the two APT28 and APT29 teams are able to access their victim's data, they collect and analyze the information to gain value for information services. These teams use this information to create highly targeted spearphishing campaigns.

All the report published today is at the end of the publication, and comes as a retaliation against Russia for Grizzly Steppe by the Obama administration.

It should be noted that the intelligence community officially attributed the attacks to Russia in October, but did not provide any evidence to support its assessment. It is unclear whether this DHS report is trying to pass off as “” that Russia hacked the US election, because if they try, Putin will be laughing all night.

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.100 registrants.

Written by giorgos

George still wonders what he's doing here ...

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).