{"id":7473,"date":"2022-02-18T10:41:41","date_gmt":"2022-02-18T18:41:41","guid":{"rendered":"https:\/\/blogs.infoblox.com\/?p=7473"},"modified":"2022-02-25T15:51:22","modified_gmt":"2022-02-25T23:51:22","slug":"sponsored-cyber-actors-target-cleared-defense-contractor-networks-to-obtain-sensitive-u-s-defense-information-and-technology","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/security\/sponsored-cyber-actors-target-cleared-defense-contractor-networks-to-obtain-sensitive-u-s-defense-information-and-technology\/","title":{"rendered":"Sponsored Cyber Actors Target Cleared Defense Contractor Networks to Obtain Sensitive U.S. Defense Information and Technology"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">The Cybersecurity and Infrastructure Agency (CISA), the Federal Bureau of Investigation (FBI), and the National Security Agency (NSA) have issued a <\/span><a href=\"https:\/\/www.ic3.gov\/Media\/News\/2022\/220217.pdf\"><span style=\"font-weight: 400;\">Joint Advisory<\/span><\/a><span style=\"font-weight: 400;\"> after observing the regular and persistent targeting of United States cleared defense contractors (CDCs) by Russian state-sponsored cyber threat actors. The targeted CDCs have contracts supporting the U.S. Department of Defense and Intelligence agencies in areas to include: command, control, communications, and combat systems; intelligence, surveillance, reconnaissance, and targeting; weapons and missile development; vehicle and aircraft design; and software development, data analytics, computers, and logistics.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In the past state-sponsored Russian cyber threat actors used common techniques to access the targeted networks. These include credential harvesting, brute force\/password spray techniques, spear phishing, and the use of known vulnerability exploitation against accounts and networks with weak security. These threat actors take advantage of simple and unchanged default passwords, unpatched systems, and unsuspecting and potentially socially engineered employees to gain initial access. Once access is obtained then the threat actors can begin moving laterally through the network to establish persistence, exfiltrate data, and cause harm in many other ways. These same cyber threat actors have employed very similar tactics to gain unauthorized access to enterprise and cloud networks with a focus on leveraging their expertise in attacking Microsoft Office 365 environments.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">These network intrusions and subsequent data breaches have enabled the actors to acquire sensitive, unclassified information, as well as CDC-proprietary and export-controlled technology. The acquired information is still highly sensitive. It provides significant data on U.S. weapons platforms development and deployment timelines, vehicle specifications, and plans for communications infrastructure and information technology.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This information may help adversaries to adjust their own military plans and priorities, hasten technological development efforts, inform foreign policymakers of U.S. intentions, and target potential sources for recruitment. Given the sensitivity of information widely available on unclassified CDC networks, the FBI, NSA, and CISA anticipate that Russian state-sponsored cyber actors will continue to target CDCs for U.S. defense information. The Joint Advisory has provided recommended mitigations.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">High level actions to help protect against these Russian state-sponsored cyber threat actors activity include:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Enforce multi factor authentication.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Enforce strong, unique passwords.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Enable Microsoft Office 365 Unified Audit Logs.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Implement endpoint detection and response tools.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">There is highly detailed information in the <\/span><a href=\"https:\/\/www.cisa.gov\/uscert\/ncas\/alerts\/aa22-047a\"><span style=\"font-weight: 400;\">Joint Alert<\/span><\/a><span style=\"font-weight: 400;\"> including:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Threat details on the targeted industries and assessed motive.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Threat actor activity as defined using the MITRE ATT&amp;CK framework with detailed specification of the specific tactics, techniques, and procedures (TTPs) employed.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Detection best practices around anomalous activity and evidence of known TTPs.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Incident response and remediation best practices including password resets on *all* local accounts.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Mitigations to include credential hardening, centralized log management, better and faster software and patch management programs, antivirus programs, the use of EDR tools, configuration management programs, the principle of least privileges, review of trusted relationships, work environment best practices, user awareness best practices.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">The use of MITRE ATT&amp;CK provides you data from a well understood taxonomy of the activities of threat actors so that you can, in turn, validate that your environment is protected against these techniques. If not adequately protected, then your team can prioritize the required mitigations to shut down these attack vectors.<\/span><\/p>\n<h3><b>DNS security is also an important part of any defense.<\/b><\/h3>\n<h3><b>\u00a0<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">DNS gives you an opportunity to know and control what resources a user is accessing on the network. DNS can provide the earliest indicators of a user\u2019s true intent. BloxOne\u00ae Threat Defense, the DNS security solution from Infoblox, along with DNS, DHCP, IPAM (DDI) provide deep visibility to activity, including which network assets are accessing which destinations, where compromised devices are on the network and when new devices join the network.\u00a0 BloxOne Threat Defense Foundational Security is an essential control point and can be a critical part of your intelligence gathering and defensive measures.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">BloxOne Threat Defense helps protect users, devices, and systems across your on-premises\/HQ, cloud workloads, remote locations, and teleworking environments. BloxOne Threat Defense can protect against phishing, exploits, ransomware and other dangerous modern malware.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Let us remember that DDI functions are core and critical network services. Absolutely nothing can happen within your networks if a device has no IP address and cannot query for domains. Using DDI, you know who and what is on your network and the services are being accessed. DDI data is a critical part of your first first line of defense against state-sponsored Russian threat actors or any other party with malicious intent.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Looking at this more closely, also remember that DHCP is the first step in the DDI chain. Before a device can access anything on a network, it must request and be granted an IP address using DHCP.\u00a0 Once this happens the server has a record, also called a \u201clease,\u201d that ties that device based upon its MAC address to the granted IP address.\u00a0 DHCP links an IP address to a device and unlocks all of the metadata associated with the DHCP process.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">DNS is the second step in the DDI chain. DNS knows the service that is being accessed based on the domain for which the user traffic is destined. Envision this as a security stack where you have devices (and associated metadata), IP, and now data about the traffic destinations.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">IPAM provides the unification of all of this data. You can use IPAM to improve your defenses across the board. IPAM is the authoritative inventory for all devices on the network.\u00a0 IPAM is one place any host, subnet, server, or service VIP is defined, tracked, and kept up-to-date. This information is an invaluable and important part of any cyber defense strategy.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">To find out more please go to:\u00a0 <\/span><a href=\"https:\/\/www.infoblox.com\/products\/bloxone-threat-defense\/\"><span style=\"font-weight: 400;\">https:\/\/www.infoblox.com\/products\/bloxone-threat-defense\/<\/span><\/a><span style=\"font-weight: 400;\">\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Defense Industrial Base companies may additionally sign up for NSA\u2019s free cybersecurity services, including Protective DNS, vulnerability scanning, and threat intelligence collaboration at <\/span><a href=\"mailto:dib_defense@cyber.nsa.gov\"><span style=\"font-weight: 400;\">dib_defense@cyber.nsa.gov<\/span><\/a><span style=\"font-weight: 400;\">\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Other relevant links:<\/span><\/p>\n<p><a href=\"https:\/\/www.cisa.gov\/uscert\/ncas\/alerts\/aa22-047a\"><span style=\"font-weight: 400;\">https:\/\/www.cisa.gov\/uscert\/ncas\/alerts\/aa22-047a<\/span><\/a><span style=\"font-weight: 400;\">\u00a0<\/span><\/p>\n<p><a href=\"https:\/\/www.ic3.gov\/Media\/News\/2022\/220217.pdf\"><span style=\"font-weight: 400;\">https:\/\/www.ic3.gov\/Media\/News\/2022\/220217.pdf<\/span><\/a><\/p>\n<p><a href=\"https:\/\/media.defense.gov\/2022\/Feb\/15\/2002939184\/-1\/-1\/0\/AA22-047A_Russian_State_Sponsored_Cyber_Actors_Target_CDC_Networks_20220216.PDF\"><span style=\"font-weight: 400;\">https:\/\/media.defense.gov\/2022\/Feb\/15\/2002939184\/-1\/-1\/0\/AA22-047A_Russian_State_Sponsored_Cyber_Actors_Target_CDC_Networks_20220216.PDF<\/span><\/a><span style=\"font-weight: 400;\">\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">For additional information on Russian state-sponsored cyber activity, see CISA&#8217;s webpage, <\/span><a href=\"https:\/\/www.us-cert.cisa.gov\/russia\"><span style=\"font-weight: 400;\">Russia Cyber Threat Overview and Advisories<\/span><\/a><span style=\"font-weight: 400;\">.<\/span><\/p>\n<table width=\"624\">\n<tbody>\n<tr>\n<td><a href=\"https:\/\/www.cisa.gov\/shields-up\">Shields Up | CISA<\/a><\/p>\n<p>Every organization in the United States is at risk from cyber threats that can disrupt essential services and potentially result in impacts to public safety. Over the past year, cyber incidents have impacted many companies, non-profits, and other organizations, large and small, across multiple sectors of the economy.<\/p>\n<p><a href=\"http:\/\/www.cisa.gov\">www.cisa.gov<\/a><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Cybersecurity and Infrastructure Agency (CISA), the Federal Bureau of Investigation (FBI), and the National Security Agency (NSA) have issued a Joint Advisory after observing the regular and persistent targeting of United States cleared defense contractors (CDCs) by Russian state-sponsored cyber threat actors. The targeted CDCs have contracts supporting the U.S. Department of Defense and [&hellip;]<\/p>\n","protected":false},"author":324,"featured_media":2689,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[2],"tags":[479,641,642,519,360],"class_list":{"0":"post-7473","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-security","8":"tag-cyber-security","9":"tag-russian-cyber-attack","10":"tag-joint-advisory","11":"tag-mitre","12":"tag-dns-security","13":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Sponsored Cyber Actors Target Cleared Defense Contractor Networks to Obtain Sensitive U.S. Defense Information and Technology<\/title>\n<meta name=\"description\" content=\"Sponsored Cyber Actors Target Cleared Defense Contractor Networks to Obtain Sensitive U.S. Defense Information and Technology. The Cybersecurity and Infrastructure Agency (CISA), the Federal Bureau of Investigation (FBI), and the National Security Agency (NSA) have issued a Joint Advisory after observing the regular and persistent targeting of United States cleared defense contractors (CDCs) by Russian state-sponsored cyber threat actors. The targeted CDCs have contracts supporting the U.S. Department of Defense and Intelligence agencies in areas to include: command, control, communications, and combat systems; intelligence, surveillance, reconnaissance, and targeting; weapons and missile development; vehicle and aircraft design; and software development, data analytics, computers, and logistics.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/security\/sponsored-cyber-actors-target-cleared-defense-contractor-networks-to-obtain-sensitive-u-s-defense-information-and-technology\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Sponsored Cyber Actors Target Cleared Defense Contractor Networks to Obtain Sensitive U.S. Defense Information and Technology\" \/>\n<meta property=\"og:description\" content=\"Sponsored Cyber Actors Target Cleared Defense Contractor Networks to Obtain Sensitive U.S. Defense Information and Technology. The Cybersecurity and Infrastructure Agency (CISA), the Federal Bureau of Investigation (FBI), and the National Security Agency (NSA) have issued a Joint Advisory after observing the regular and persistent targeting of United States cleared defense contractors (CDCs) by Russian state-sponsored cyber threat actors. The targeted CDCs have contracts supporting the U.S. Department of Defense and Intelligence agencies in areas to include: command, control, communications, and combat systems; intelligence, surveillance, reconnaissance, and targeting; weapons and missile development; vehicle and aircraft design; and software development, data analytics, computers, and logistics.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/security\/sponsored-cyber-actors-target-cleared-defense-contractor-networks-to-obtain-sensitive-u-s-defense-information-and-technology\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2022-02-18T18:41:41+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-02-25T23:51:22+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/threatindexblog-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"660\" \/>\n\t<meta property=\"og:image:height\" content=\"454\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Michael Zuckerman\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Michael Zuckerman\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/sponsored-cyber-actors-target-cleared-defense-contractor-networks-to-obtain-sensitive-u-s-defense-information-and-technology\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/sponsored-cyber-actors-target-cleared-defense-contractor-networks-to-obtain-sensitive-u-s-defense-information-and-technology\\\/\"},\"author\":{\"name\":\"Michael Zuckerman\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/212816c17be869578ba1574b5fc7abf4\"},\"headline\":\"Sponsored Cyber Actors Target Cleared Defense Contractor Networks to Obtain Sensitive U.S. Defense Information and Technology\",\"datePublished\":\"2022-02-18T18:41:41+00:00\",\"dateModified\":\"2022-02-25T23:51:22+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/sponsored-cyber-actors-target-cleared-defense-contractor-networks-to-obtain-sensitive-u-s-defense-information-and-technology\\\/\"},\"wordCount\":1108,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/sponsored-cyber-actors-target-cleared-defense-contractor-networks-to-obtain-sensitive-u-s-defense-information-and-technology\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/threatindexblog-1.jpg\",\"keywords\":[\"Cyber security\",\"russian cyber attack\",\"joint advisory\",\"MITRE\",\"DNS Security\"],\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/sponsored-cyber-actors-target-cleared-defense-contractor-networks-to-obtain-sensitive-u-s-defense-information-and-technology\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/sponsored-cyber-actors-target-cleared-defense-contractor-networks-to-obtain-sensitive-u-s-defense-information-and-technology\\\/\",\"name\":\"Sponsored Cyber Actors Target Cleared Defense Contractor Networks to Obtain Sensitive U.S. Defense Information and Technology\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/sponsored-cyber-actors-target-cleared-defense-contractor-networks-to-obtain-sensitive-u-s-defense-information-and-technology\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/sponsored-cyber-actors-target-cleared-defense-contractor-networks-to-obtain-sensitive-u-s-defense-information-and-technology\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/threatindexblog-1.jpg\",\"datePublished\":\"2022-02-18T18:41:41+00:00\",\"dateModified\":\"2022-02-25T23:51:22+00:00\",\"description\":\"Sponsored Cyber Actors Target Cleared Defense Contractor Networks to Obtain Sensitive U.S. Defense Information and Technology. The Cybersecurity and Infrastructure Agency (CISA), the Federal Bureau of Investigation (FBI), and the National Security Agency (NSA) have issued a Joint Advisory after observing the regular and persistent targeting of United States cleared defense contractors (CDCs) by Russian state-sponsored cyber threat actors. The targeted CDCs have contracts supporting the U.S. Department of Defense and Intelligence agencies in areas to include: command, control, communications, and combat systems; intelligence, surveillance, reconnaissance, and targeting; weapons and missile development; vehicle and aircraft design; and software development, data analytics, computers, and logistics.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/sponsored-cyber-actors-target-cleared-defense-contractor-networks-to-obtain-sensitive-u-s-defense-information-and-technology\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/sponsored-cyber-actors-target-cleared-defense-contractor-networks-to-obtain-sensitive-u-s-defense-information-and-technology\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/sponsored-cyber-actors-target-cleared-defense-contractor-networks-to-obtain-sensitive-u-s-defense-information-and-technology\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/threatindexblog-1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/threatindexblog-1.jpg\",\"width\":660,\"height\":454,\"caption\":\"Survey Says . . . \u201cExchanging Cyber Threat Intelligence: There Has to Be a Better Way\u201d\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/sponsored-cyber-actors-target-cleared-defense-contractor-networks-to-obtain-sensitive-u-s-defense-information-and-technology\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/security\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Sponsored Cyber Actors Target Cleared Defense Contractor Networks to Obtain Sensitive U.S. Defense Information and Technology\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/212816c17be869578ba1574b5fc7abf4\",\"name\":\"Michael Zuckerman\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_324_1628613720-96x96.jpg\",\"url\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_324_1628613720-96x96.jpg\",\"contentUrl\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_324_1628613720-96x96.jpg\",\"caption\":\"Michael Zuckerman\"},\"description\":\"Michael Zuckerman is a seasoned B2B product marketing and marketing strategy consultant with experience in the cybersecurity marketplace. Zuckerman\u2019s domain experience in cybersecurity over the past 10 years includes DNS security, threat intelligence, threat intelligence platforms (TIP), container security, mobile device security, moving target defense, network threat analysis (AI), sandbox, deception technology, cloud access security brokers (CASB), SASE, AI based SIEM, secure collaborative governance, and related technology sets to include data loss prevention (DLP), user and entity behavior analytics (UEBA), and encryption.\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/michael-zuckerman\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Sponsored Cyber Actors Target Cleared Defense Contractor Networks to Obtain Sensitive U.S. Defense Information and Technology","description":"Sponsored Cyber Actors Target Cleared Defense Contractor Networks to Obtain Sensitive U.S. Defense Information and Technology. The Cybersecurity and Infrastructure Agency (CISA), the Federal Bureau of Investigation (FBI), and the National Security Agency (NSA) have issued a Joint Advisory after observing the regular and persistent targeting of United States cleared defense contractors (CDCs) by Russian state-sponsored cyber threat actors. The targeted CDCs have contracts supporting the U.S. Department of Defense and Intelligence agencies in areas to include: command, control, communications, and combat systems; intelligence, surveillance, reconnaissance, and targeting; weapons and missile development; vehicle and aircraft design; and software development, data analytics, computers, and logistics.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/security\/sponsored-cyber-actors-target-cleared-defense-contractor-networks-to-obtain-sensitive-u-s-defense-information-and-technology\/","og_locale":"en_US","og_type":"article","og_title":"Sponsored Cyber Actors Target Cleared Defense Contractor Networks to Obtain Sensitive U.S. Defense Information and Technology","og_description":"Sponsored Cyber Actors Target Cleared Defense Contractor Networks to Obtain Sensitive U.S. Defense Information and Technology. The Cybersecurity and Infrastructure Agency (CISA), the Federal Bureau of Investigation (FBI), and the National Security Agency (NSA) have issued a Joint Advisory after observing the regular and persistent targeting of United States cleared defense contractors (CDCs) by Russian state-sponsored cyber threat actors. The targeted CDCs have contracts supporting the U.S. Department of Defense and Intelligence agencies in areas to include: command, control, communications, and combat systems; intelligence, surveillance, reconnaissance, and targeting; weapons and missile development; vehicle and aircraft design; and software development, data analytics, computers, and logistics.","og_url":"https:\/\/www.infoblox.com\/blog\/security\/sponsored-cyber-actors-target-cleared-defense-contractor-networks-to-obtain-sensitive-u-s-defense-information-and-technology\/","og_site_name":"Infoblox Blog","article_published_time":"2022-02-18T18:41:41+00:00","article_modified_time":"2022-02-25T23:51:22+00:00","og_image":[{"width":660,"height":454,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/threatindexblog-1.jpg","type":"image\/jpeg"}],"author":"Michael Zuckerman","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Michael Zuckerman","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/security\/sponsored-cyber-actors-target-cleared-defense-contractor-networks-to-obtain-sensitive-u-s-defense-information-and-technology\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/sponsored-cyber-actors-target-cleared-defense-contractor-networks-to-obtain-sensitive-u-s-defense-information-and-technology\/"},"author":{"name":"Michael Zuckerman","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/212816c17be869578ba1574b5fc7abf4"},"headline":"Sponsored Cyber Actors Target Cleared Defense Contractor Networks to Obtain Sensitive U.S. Defense Information and Technology","datePublished":"2022-02-18T18:41:41+00:00","dateModified":"2022-02-25T23:51:22+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/sponsored-cyber-actors-target-cleared-defense-contractor-networks-to-obtain-sensitive-u-s-defense-information-and-technology\/"},"wordCount":1108,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/sponsored-cyber-actors-target-cleared-defense-contractor-networks-to-obtain-sensitive-u-s-defense-information-and-technology\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/threatindexblog-1.jpg","keywords":["Cyber security","russian cyber attack","joint advisory","MITRE","DNS Security"],"articleSection":["Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/security\/sponsored-cyber-actors-target-cleared-defense-contractor-networks-to-obtain-sensitive-u-s-defense-information-and-technology\/","url":"https:\/\/www.infoblox.com\/blog\/security\/sponsored-cyber-actors-target-cleared-defense-contractor-networks-to-obtain-sensitive-u-s-defense-information-and-technology\/","name":"Sponsored Cyber Actors Target Cleared Defense Contractor Networks to Obtain Sensitive U.S. Defense Information and Technology","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/sponsored-cyber-actors-target-cleared-defense-contractor-networks-to-obtain-sensitive-u-s-defense-information-and-technology\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/sponsored-cyber-actors-target-cleared-defense-contractor-networks-to-obtain-sensitive-u-s-defense-information-and-technology\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/threatindexblog-1.jpg","datePublished":"2022-02-18T18:41:41+00:00","dateModified":"2022-02-25T23:51:22+00:00","description":"Sponsored Cyber Actors Target Cleared Defense Contractor Networks to Obtain Sensitive U.S. Defense Information and Technology. The Cybersecurity and Infrastructure Agency (CISA), the Federal Bureau of Investigation (FBI), and the National Security Agency (NSA) have issued a Joint Advisory after observing the regular and persistent targeting of United States cleared defense contractors (CDCs) by Russian state-sponsored cyber threat actors. The targeted CDCs have contracts supporting the U.S. Department of Defense and Intelligence agencies in areas to include: command, control, communications, and combat systems; intelligence, surveillance, reconnaissance, and targeting; weapons and missile development; vehicle and aircraft design; and software development, data analytics, computers, and logistics.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/sponsored-cyber-actors-target-cleared-defense-contractor-networks-to-obtain-sensitive-u-s-defense-information-and-technology\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/security\/sponsored-cyber-actors-target-cleared-defense-contractor-networks-to-obtain-sensitive-u-s-defense-information-and-technology\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/security\/sponsored-cyber-actors-target-cleared-defense-contractor-networks-to-obtain-sensitive-u-s-defense-information-and-technology\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/threatindexblog-1.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/threatindexblog-1.jpg","width":660,"height":454,"caption":"Survey Says . . . \u201cExchanging Cyber Threat Intelligence: There Has to Be a Better Way\u201d"},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/security\/sponsored-cyber-actors-target-cleared-defense-contractor-networks-to-obtain-sensitive-u-s-defense-information-and-technology\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Security","item":"https:\/\/www.infoblox.com\/blog\/category\/security\/"},{"@type":"ListItem","position":3,"name":"Sponsored Cyber Actors Target Cleared Defense Contractor Networks to Obtain Sensitive U.S. Defense Information and Technology"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/212816c17be869578ba1574b5fc7abf4","name":"Michael Zuckerman","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_324_1628613720-96x96.jpg","url":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_324_1628613720-96x96.jpg","contentUrl":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_324_1628613720-96x96.jpg","caption":"Michael Zuckerman"},"description":"Michael Zuckerman is a seasoned B2B product marketing and marketing strategy consultant with experience in the cybersecurity marketplace. Zuckerman\u2019s domain experience in cybersecurity over the past 10 years includes DNS security, threat intelligence, threat intelligence platforms (TIP), container security, mobile device security, moving target defense, network threat analysis (AI), sandbox, deception technology, cloud access security brokers (CASB), SASE, AI based SIEM, secure collaborative governance, and related technology sets to include data loss prevention (DLP), user and entity behavior analytics (UEBA), and encryption.","url":"https:\/\/www.infoblox.com\/blog\/author\/michael-zuckerman\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/7473","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/324"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=7473"}],"version-history":[{"count":4,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/7473\/revisions"}],"predecessor-version":[{"id":7485,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/7473\/revisions\/7485"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/2689"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=7473"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=7473"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=7473"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}