Grizzly Steppe: FBI, DHS Response to Russian Hacking

Grizzly Steppe: As “evidence” and to document the unprecedented act of expelling 35 Russian diplomats and closing two Russian associations without a major concurrent political or diplomatic incident, or any act of war, the Department of Homeland Security (DHS) and the FBI released a "report" of 13 pages that justifies the above actions "for the violation and exploitation of networks and parameters related to the elections of ”, that is, the hack.

As DHS writes, “this document provides technical details about the tools and infrastructure used by Russian civilian and military intelligence services (RIS) to breach and exploit and parameters related to US elections, as well as US government politicians, and private sector sectors. The US government refers to this malicious cyber activity by RIS as GRIZZLY STEPPE.”Grizzly Steppe

From the very beginning of the report, there is a broad disclaimer, according to which everything contained in it (the report) may be totally incorrect.

“This report is provided for informational purposes only. The Department of Homeland Security (DHS) makes no warranty of any kind about the information contained within. DHS does not endorse any commercial product or referring to her.”

The continuation raises questions as there is a claim that Russia has violated the elections, and the 13 page report allegedly provides technical details about the tools and infrastructures used by the Russian intelligence services.

Grizzly Steppe:

So, with this helpful background in mind, we present some of the most notable excerpts from the report that refers to two supposed Russian groups - APT and APT 28.

The US Government confirms that two different RIS agencies were involved in the US invasion. The first , also known as Advanced Persistent Threat (APT) 29, attacked party systems in the summer of 2015, while the second, also known as APT28, was active in the spring of 2016.

Both groups have previously carried out targeted attacks on government organizations, think tanks, universities and companies around the world. APT29 has been observed conducting targeted spearphishing campaigns using web links that lead to Remote malware Tools (RATs).

APT28 is known for using domains that closely mimic those of target organisms and are aimed at cheating potential victims by undermining legitimate certifications.

Once the two APT28 and APT29 teams are able to access their victim's data, they collect and analyze the information to gain value for information services. These teams use this information to create highly targeted spearphishing campaigns.

All the report published today is at the end of the publication, and comes as a retaliation against Russia for Grizzly Steppe by the Obama administration.

It should be noted that the intelligence community formally attributed the attacks to Russia in October, but did not provide any evidence to support its assessment. It is unclear whether this DHS report seeks to pass as "proof" that Russia violated the US election, because if they do, Putin will laugh all night.

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.087 registrants.

Written by giorgos

George still wonders what he's doing here ...

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).