<html xmlns:v="urn:schemas-microsoft-com:vml" xmlns:o="urn:schemas-microsoft-com:office:office" xmlns:w="urn:schemas-microsoft-com:office:word" xmlns:m="http://schemas.microsoft.com/office/2004/12/omml" xmlns="http://www.w3.org/TR/REC-html40">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=us-ascii">
<meta name="Generator" content="Microsoft Word 15 (filtered medium)">
<!--[if !mso]><style>v\:* {behavior:url(#default#VML);}
o\:* {behavior:url(#default#VML);}
w\:* {behavior:url(#default#VML);}
.shape {behavior:url(#default#VML);}
</style><![endif]--><style><!--
/* Font Definitions */
@font-face
{font-family:"Cambria Math";
panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
{font-family:Calibri;
panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
{font-family:"Franklin Gothic Book";
panose-1:2 11 5 3 2 1 2 2 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
{margin:0in;
font-size:11.0pt;
font-family:"Calibri",sans-serif;}
a:link, span.MsoHyperlink
{mso-style-priority:99;
color:blue;
text-decoration:underline;}
p.xxmsonormal, li.xxmsonormal, div.xxmsonormal
{mso-style-name:x_x_msonormal;
margin:0in;
font-size:11.0pt;
font-family:"Calibri",sans-serif;}
span.xxcontentpasted0
{mso-style-name:x_x_contentpasted0;}
span.xcontentpasted0
{mso-style-name:x_contentpasted0;}
span.contentpasted0
{mso-style-name:contentpasted0;}
span.xxcontentpasted4
{mso-style-name:x_x_contentpasted4;}
span.xxcontentpasted5
{mso-style-name:x_x_contentpasted5;}
.MsoChpDefault
{mso-style-type:export-only;
font-size:10.0pt;}
@page WordSection1
{size:8.5in 11.0in;
margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext="edit" spidmax="1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext="edit">
<o:idmap v:ext="edit" data="1" />
</o:shapelayout></xml><![endif]-->
</head>
<body lang="EN-US" link="blue" vlink="purple" style="word-wrap:break-word">
<div class="WordSection1">
<p class="MsoNormal">FYSA<o:p></o:p></p>
<div>
<p class="xxmsonormal" style="background:white"><span class="xcontentpasted0"><span style="font-family:"Franklin Gothic Book",sans-serif;color:black"> </span></span><span style="font-size:12.0pt;color:black"><o:p></o:p></span></p>
<p class="xxmsonormal" style="background:white"><span class="xxcontentpasted0"><span style="font-family:"Franklin Gothic Book",sans-serif;color:black">The Cybersecurity and Infrastructure Security Agency (CISA), the National Security Agency (NSA), Federal Bureau
of Investigation (FBI), and the U</span></span><span class="xxcontentpasted4"><span style="font-family:"Franklin Gothic Book",sans-serif;color:black;background:white">K National Cyber Security Centre (NCSC)</span></span><span class="xcontentpasted0"><span style="font-family:"Franklin Gothic Book",sans-serif;color:black"> </span></span><span class="xxcontentpasted0"><span style="font-family:"Franklin Gothic Book",sans-serif;color:black">released
a</span></span><span class="xcontentpasted0"><span style="font-family:"Franklin Gothic Book",sans-serif;color:black"> </span></span><span class="xxcontentpasted0"><span style="font-family:"Franklin Gothic Book",sans-serif;color:black"><a href="https://www.cisa.gov/news-events/alerts/2023/04/18/apt28-exploits-known-vulnerability-carry-out-reconnaissance-and-deploy-malware-cisco-routers" title="https://www.cisa.gov/news-events/alerts/2023/04/18/apt28-exploits-known-vulnerability-carry-out-reconnaissance-and-deploy-malware-cisco-routers">joint
advisory</a></span></span><span class="xcontentpasted0"><span style="font-family:"Franklin Gothic Book",sans-serif;color:black"> </span></span><span class="xxcontentpasted0"><span style="font-family:"Franklin Gothic Book",sans-serif;color:black">to provide
details of tactics, techniques and procedures (TTPs) associated with Advanced Persistent Threat (APT28) exploitation of Cisco routers in 2021. </span></span><span class="xcontentpasted0"><span style="font-family:"Franklin Gothic Book",sans-serif;color:black"> </span></span><span class="xxcontentpasted0"><span style="font-family:"Franklin Gothic Book",sans-serif;color:black"> </span></span><span style="font-size:12.0pt;color:black"><o:p></o:p></span></p>
<p class="xxmsonormal" style="background:white"><span class="xcontentpasted0"><span style="font-family:"Franklin Gothic Book",sans-serif;color:black"> </span></span><span style="font-size:12.0pt;color:black"><o:p></o:p></span></p>
<p class="xxmsonormal" style="background:white"><span class="xxcontentpasted0"><span style="font-family:"Franklin Gothic Book",sans-serif;color:black">APT28 – a threat group attributed to Russia’s military intelligence service the GRU – has been observed taking
advantage of poorly configured networks and exploiting a known vulnerability to deploy malware and access Cisco routers worldwide. In 2021, a series of attacks were carried out against a small number of US government institutions, </span></span><span class="xxcontentpasted5"><span style="font-family:"Franklin Gothic Book",sans-serif;color:black;background:white">organizations
based in Europe</span></span><span class="xxcontentpasted0"><span style="font-family:"Franklin Gothic Book",sans-serif;color:black"> and around 250 Ukrainian victims for reconnaissance, with malware called “Jaguar Tooth” being deployed against some targeted
devices to enable unauthenticated access. </span></span><span style="font-size:12.0pt;color:black"><o:p></o:p></span></p>
<p class="xxmsonormal" style="background:white"><span class="xcontentpasted0"><span style="font-family:"Franklin Gothic Book",sans-serif;color:black"> </span></span><span style="font-size:12.0pt;color:black"><o:p></o:p></span></p>
<p class="xxmsonormal" style="background:white"><span class="xxcontentpasted0"><span style="font-family:"Franklin Gothic Book",sans-serif;color:black">The authoring agencies strongly recommends organizations follow the mitigation advice to defend against this
activity. This includes applying the security update released by Cisco to address the vulnerability CVE-2017-6742. </span></span><span class="xxcontentpasted0"><span style="font-family:"Franklin Gothic Book",sans-serif"><o:p></o:p></span></span></p>
<p class="xxmsonormal" style="background:white"><o:p> </o:p></p>
</div>
<p class="MsoNormal"><b><span style="color:#1F497D">Theresa A. Masse<o:p></o:p></span></b></p>
<p class="MsoNormal"><span style="font-size:10.0pt;color:#1F497D">Cybersecurity State Coordinator/Advisor, Region 10 (Oregon)
<o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-size:10.0pt;color:#1F497D">Cybersecurity and Infrastructure Security Agency<o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-size:10.0pt;color:#1F497D">Department of Homeland Security<o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-size:10.0pt;color:#1F497D">Phone: (503) 930-5671
<o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-size:10.0pt;color:#1F497D">Email:</span><span style="font-size:10.0pt;color:#777777">
</span><a href="mailto:theresa.masse@cisa.dhs.gov"><span style="font-size:10.0pt;color:#0563C1">theresa.masse@cisa.dhs.gov</span></a><u><span style="font-size:10.0pt;color:#0760C1"><o:p></o:p></span></u></p>
<p class="MsoNormal"><span style="color:#1F497D"><o:p> </o:p></span></p>
<p class="MsoNormal"><img border="0" width="97" height="97" style="width:1.0138in;height:1.0138in" id="Picture_x0020_1" src="cid:image001.png@01D971D2.864B4150"><span style="color:#1F497D"><o:p></o:p></span></p>
<p class="MsoNormal"><o:p> </o:p></p>
<p class="xxmsonormal" style="background:white"><o:p> </o:p></p>
<p class="MsoNormal" style="background:white"><span class="contentpasted0"><span style="font-family:"Franklin Gothic Book",sans-serif;color:black"> </span></span><span style="font-size:12.0pt;color:black"><o:p></o:p></span></p>
<div>
<div>
<div>
<p class="xxmsonormal" style="background:white"><span style="font-size:12.0pt;color:black"><o:p> </o:p></span></p>
</div>
</div>
</div>
</div>
</body>
</html>