This analysis report provides information and gives insight into the activities of the Russian civilian and military intelligence Services (RIS) conducted during the 2016 U.S. presidential election campaign. The Grizzly Steppe Report provides details regarding the tools and hacking techniques used by the Russian hackers in order to interfere the 2016 U.S. elections. This activity by RIS is just part of an ongoing campaign of cyber-enabled operations directed at the U.S. government and its citizens. These cyber operations have included spearphishing campaigns targeting government organizations, critical infrastructure entities, think tanks, universities, political organizations, and corporations leading to the theft of information. In foreign countries, RIS actors conducted damaging and/or disruptive cyber-attacks, including attacks on critical infrastructure networks. In some cases, RIS actors masqueraded as third parties, hiding behind false online personas designed to cause the victim to misattribute the source of the attack. This report provides technical indicators related to many of these operations, recommended mitigations, suggested actions to take in response to the indicators provided, and information on how to report such incidents to the U.S. Government.
Russian Cyber Activity
Federal Bureau of Investigation, U.S. Department of Homeland Security
bookThe Grizzly Steppe Report (Unmasking the Russian Cyber Activity) : Official Joint Analysis Report: Tools and Hacking Techniques Used to Interfere the U.S. Elections
U.S. Department of Homeland Security, Federal Bureau of Investigation
bookRussian Cyber Activity – The Grizzly Steppe Report : Strategy and Hacking Techniques Used to Interfere the U.S. Elections and to exploit Government and Private Sectors
U.S. Department of Homeland Security, Federal Bureau of Investigation
book
Alice and Bob Learn Application Security
Tanya Janca
audiobookCYBER SECURITY HANDBOOK Part-2 : Lock, Stock, and Cyber: A Comprehensive Security Handbook
Poonam Devi
bookIn Depth Security Vol. III
bookManaging Cybersecurity Risk : How Directors and Corporate Officers Can Protect their Businesses
bookIoT-enabled Sensor Networks: Architecture, Methodologies, Security, and Futuristic Applications
bookIn Depth Security Vol. II
bookSecurity Mom : An Unclassified Guide to Protecting Our Homeland and Your Home
Juliette Kayyem
bookBlockchain Applications in Cybersecurity Solutions
bookCyber Forensics and Investigation on Smart Devices: Volume 1
bookCC Certified in Cybersecurity Study Guide
Mike Chapple
audiobookNomenclatura - Encyclopedia of modern Cryptography and Internet Security
bookChallenges, risks and threats for security in Europe
book