This analysis report provides information and gives insight into the activities of the Russian civilian and military intelligence Services (RIS) conducted during the 2016 U.S. presidential election campaign. The Grizzly Steppe Report provides details regarding the tools and hacking techniques used by the Russian hackers in order to interfere the 2016 U.S. elections. This activity by RIS is just part of an ongoing campaign of cyber-enabled operations directed at the U.S. government and its citizens. These cyber operations have included spearphishing campaigns targeting government organizations, critical infrastructure entities, think tanks, universities, political organizations, and corporations leading to the theft of information. In foreign countries, RIS actors conducted damaging and/or disruptive cyber-attacks, including attacks on critical infrastructure networks. In some cases, RIS actors masqueraded as third parties, hiding behind false online personas designed to cause the victim to misattribute the source of the attack. This report provides technical indicators related to many of these operations, recommended mitigations, suggested actions to take in response to the indicators provided, and information on how to report such incidents to the U.S. Government.
Russian Cyber Activity
Federal Bureau of Investigation, U.S. Department of Homeland Security
bookThe Grizzly Steppe Report (Unmasking the Russian Cyber Activity) : Official Joint Analysis Report: Tools and Hacking Techniques Used to Interfere the U.S. Elections
U.S. Department of Homeland Security, Federal Bureau of Investigation
bookRussian Cyber Activity – The Grizzly Steppe Report : Strategy and Hacking Techniques Used to Interfere the U.S. Elections and to exploit Government and Private Sectors
U.S. Department of Homeland Security, Federal Bureau of Investigation
book
China and Cybersecurity : Espionage, Strategy, and Politics in the Digital Domain
audiobookSvenska hackare : en berättelse från nätets skuggsida
Daniel Goldberg, Linus Larsson
audiobookbookThe Art of Deception
Kevin D. Mitnick, William L. Simon, Steve Wozniak
audiobookPegasus : The Story of the World's Most Dangerous Spyware
Laurent Richard, Sandrine Rigaud
audiobookFooled by Randomness : The Hidden Role of Chance in Life and in the Markets
Nassim Nicholas Taleb
audiobookBe Cyber Secure : Tales, Tools and Threats
Jonathan Reuvid
bookBuilding a Cyber Risk Management Program : Evolving Security for the Digital Age
Brandon Bapst, Terry Allan Hicks, Brian Allen
audiobookCyber Intelligence Driven Risk : How to Build, Deploy, and Use Cyber Intelligence for Improved Business Risk Decisions
Richard O. Moore III
audiobookExam AZ 900: Azure Fundamental Study Guide-1 : Explore Azure Fundamental guide and Get certified AZ 900 exam
Mamta Devi
bookUnleashing the Power of IT : Bringing People, Business, and Technology Together
Dan Roberts
audiobookCyber War...and Peace : Building Digital Trust Today with History as Our Guide
Nicholas Shevelyov
audiobookInternational Conflicts in Cyberspace - Battlefield of the 21st Century : Cyber Attacks at State Level, Legislation of Cyber Conflicts, Opposite Views by Different Countries on Cyber Security Control & Report on the Latest Case of Russian Hacking of Government Sectors
U.S. Department of Defense, Strategic Studies Institute, United States Army War College, Department of Homeland Security, Federal Bureau of Investigation
book