Tuesday, January 03, 2017

DHS and FBI Joint Analysis Report (JAR) on Russian Malicious Cyber Activity

A December 29, 2016 Department of Homeland Security (DHS) press release discusses  its Joint Analysis Report (JAR) with the FBI. Nicknamed "Grizzy Steppe, the JAR provides "details of the tools and infrastructure used by Russian intelligence services to compromise and exploit networks and infrastructure associated with the recent U.S. election, as well as a range of U.S. government, political and private sector entities."  The "Grizzy Steppe" is described as follows on the December 29, 2016 White House Fact Sheet: Actions in Response to Russian Malicious Cyber Activity and Harassment:
  • The JAR includes information on computers around the world that Russian intelligence services have co-opted without the knowledge of their owners in order to conduct their malicious activity in a way that makes it difficult to trace back to Russia. In some cases, the cybersecurity community was aware of this infrastructure, in other cases, this information is newly declassified by the U.S. government.
  • The report also includes data that enables cybersecurity firms and other network defenders to identify certain malware that the Russian intelligence services use.  Network defenders can use this information to identify and block Russian malware, forcing the Russian intelligence services to re-engineer their malware.  This information is newly de-classified.
  • Finally, the JAR includes information on how Russian intelligence services typically conduct their activities.  This information can help network defenders better identify new tactics or techniques that a malicious actor might deploy or detect and disrupt an ongoing intrusion.
DHS and FBI encourage security companies and private sector owners and operators to use this JAR to check their network traffic for signs of malicious activity as well as to "leverage these indicators in proactive defense efforts to block malicious cyber activity before it occurs."