This analysis report provides information and gives insight into the activities of the Russian civilian and military intelligence Services (RIS) conducted during the 2016 U.S. presidential election campaign. The Grizzly Steppe Report provides details regarding the tools and hacking techniques used by the Russian hackers in order to interfere the 2016 U.S. elections. This activity by RIS is just part of an ongoing campaign of cyber-enabled operations directed at the U.S. government and its citizens. These cyber operations have included spearphishing campaigns targeting government organizations, critical infrastructure entities, think tanks, universities, political organizations, and corporations leading to the theft of information. In foreign countries, RIS actors conducted damaging and/or disruptive cyber-attacks, including attacks on critical infrastructure networks. In some cases, RIS actors masqueraded as third parties, hiding behind false online personas designed to cause the victim to misattribute the source of the attack. This report provides technical indicators related to many of these operations, recommended mitigations, suggested actions to take in response to the indicators provided, and information on how to report such incidents to the U.S. Government.
Russian Cyber Activity
Federal Bureau of Investigation, U.S. Department of Homeland Security
bookThe Grizzly Steppe Report (Unmasking the Russian Cyber Activity) : Official Joint Analysis Report: Tools and Hacking Techniques Used to Interfere the U.S. Elections
U.S. Department of Homeland Security, Federal Bureau of Investigation
bookRussian Cyber Activity – The Grizzly Steppe Report : Strategy and Hacking Techniques Used to Interfere the U.S. Elections and to exploit Government and Private Sectors
U.S. Department of Homeland Security, Federal Bureau of Investigation
book
In Depth Security Vol. III
bookManaging Cybersecurity Risk : How Directors and Corporate Officers Can Protect their Businesses
bookIn Depth Security Vol. II
bookBlockchain Applications in Cybersecurity Solutions
bookIoT-enabled Sensor Networks: Architecture, Methodologies, Security, and Futuristic Applications
bookAlice and Bob Learn Application Security
Tanya Janca
audiobookCyber Forensics and Investigation on Smart Devices: Volume 1
bookCC Certified in Cybersecurity Study Guide
Mike Chapple
audiobookDefensive Security Handbook : Best Practices for Securing Infrastructure (2nd Edition)
Amanda Berlin, Lee Brotherston, William F. Reyor III
audiobookNomenclatura - Encyclopedia of modern Cryptography and Internet Security
bookChallenges, risks and threats for security in Europe
bookMoscow Rules : What Drives Russia to Confront the West
Keir Giles
audiobook