<html xmlns:v="urn:schemas-microsoft-com:vml" xmlns:o="urn:schemas-microsoft-com:office:office" xmlns:w="urn:schemas-microsoft-com:office:word" xmlns:m="http://schemas.microsoft.com/office/2004/12/omml" xmlns="http://www.w3.org/TR/REC-html40">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=us-ascii">
<meta name="Generator" content="Microsoft Word 15 (filtered medium)">
<!--[if !mso]><style>v\:* {behavior:url(#default#VML);}
o\:* {behavior:url(#default#VML);}
w\:* {behavior:url(#default#VML);}
.shape {behavior:url(#default#VML);}
</style><![endif]--><style><!--
/* Font Definitions */
@font-face
{font-family:Wingdings;
panose-1:5 0 0 0 0 0 0 0 0 0;}
@font-face
{font-family:"Cambria Math";
panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
{font-family:Calibri;
panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
{font-family:"Franklin Gothic Book";
panose-1:2 11 5 3 2 1 2 2 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
{margin:0in;
font-size:11.0pt;
font-family:"Calibri",sans-serif;}
a:link, span.MsoHyperlink
{mso-style-priority:99;
color:blue;
text-decoration:underline;}
p.xmsonormal, li.xmsonormal, div.xmsonormal
{mso-style-name:x_msonormal;
margin:0in;
font-size:11.0pt;
font-family:"Calibri",sans-serif;}
p.xparagraph, li.xparagraph, div.xparagraph
{mso-style-name:x_paragraph;
margin:0in;
font-size:11.0pt;
font-family:"Calibri",sans-serif;}
p.xmsonospacing, li.xmsonospacing, div.xmsonospacing
{mso-style-name:x_msonospacing;
margin:0in;
font-size:11.0pt;
font-family:"Calibri",sans-serif;}
span.xcontentpasted0
{mso-style-name:x_contentpasted0;}
span.contentpasted0
{mso-style-name:contentpasted0;}
.MsoChpDefault
{mso-style-type:export-only;
font-size:10.0pt;}
@page WordSection1
{size:8.5in 11.0in;
margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
{page:WordSection1;}
/* List Definitions */
@list l0
{mso-list-id:1776557379;
mso-list-template-ids:-1536413184;}
@list l0:level1
{mso-level-number-format:bullet;
mso-level-text:\F0B7;
mso-level-tab-stop:.5in;
mso-level-number-position:left;
text-indent:-.25in;
mso-ansi-font-size:10.0pt;
font-family:Symbol;}
@list l0:level2
{mso-level-number-format:bullet;
mso-level-text:o;
mso-level-tab-stop:1.0in;
mso-level-number-position:left;
text-indent:-.25in;
mso-ansi-font-size:10.0pt;
font-family:"Courier New";
mso-bidi-font-family:"Times New Roman";}
@list l0:level3
{mso-level-number-format:bullet;
mso-level-text:\F0A7;
mso-level-tab-stop:1.5in;
mso-level-number-position:left;
text-indent:-.25in;
mso-ansi-font-size:10.0pt;
font-family:Wingdings;}
@list l0:level4
{mso-level-number-format:bullet;
mso-level-text:\F0A7;
mso-level-tab-stop:2.0in;
mso-level-number-position:left;
text-indent:-.25in;
mso-ansi-font-size:10.0pt;
font-family:Wingdings;}
@list l0:level5
{mso-level-number-format:bullet;
mso-level-text:\F0A7;
mso-level-tab-stop:2.5in;
mso-level-number-position:left;
text-indent:-.25in;
mso-ansi-font-size:10.0pt;
font-family:Wingdings;}
@list l0:level6
{mso-level-number-format:bullet;
mso-level-text:\F0A7;
mso-level-tab-stop:3.0in;
mso-level-number-position:left;
text-indent:-.25in;
mso-ansi-font-size:10.0pt;
font-family:Wingdings;}
@list l0:level7
{mso-level-number-format:bullet;
mso-level-text:\F0A7;
mso-level-tab-stop:3.5in;
mso-level-number-position:left;
text-indent:-.25in;
mso-ansi-font-size:10.0pt;
font-family:Wingdings;}
@list l0:level8
{mso-level-number-format:bullet;
mso-level-text:\F0A7;
mso-level-tab-stop:4.0in;
mso-level-number-position:left;
text-indent:-.25in;
mso-ansi-font-size:10.0pt;
font-family:Wingdings;}
@list l0:level9
{mso-level-number-format:bullet;
mso-level-text:\F0A7;
mso-level-tab-stop:4.5in;
mso-level-number-position:left;
text-indent:-.25in;
mso-ansi-font-size:10.0pt;
font-family:Wingdings;}
@list l1
{mso-list-id:2010865565;
mso-list-template-ids:-1084969762;}
@list l1:level1
{mso-level-number-format:bullet;
mso-level-text:\F0B7;
mso-level-tab-stop:.5in;
mso-level-number-position:left;
text-indent:-.25in;
mso-ansi-font-size:10.0pt;
font-family:Symbol;}
@list l1:level2
{mso-level-number-format:bullet;
mso-level-text:\F0B7;
mso-level-tab-stop:1.0in;
mso-level-number-position:left;
text-indent:-.25in;
mso-ansi-font-size:10.0pt;
font-family:Symbol;}
@list l1:level3
{mso-level-number-format:bullet;
mso-level-text:\F0B7;
mso-level-tab-stop:1.5in;
mso-level-number-position:left;
text-indent:-.25in;
mso-ansi-font-size:10.0pt;
font-family:Symbol;}
@list l1:level4
{mso-level-number-format:bullet;
mso-level-text:\F0B7;
mso-level-tab-stop:2.0in;
mso-level-number-position:left;
text-indent:-.25in;
mso-ansi-font-size:10.0pt;
font-family:Symbol;}
@list l1:level5
{mso-level-number-format:bullet;
mso-level-text:\F0B7;
mso-level-tab-stop:2.5in;
mso-level-number-position:left;
text-indent:-.25in;
mso-ansi-font-size:10.0pt;
font-family:Symbol;}
@list l1:level6
{mso-level-number-format:bullet;
mso-level-text:\F0B7;
mso-level-tab-stop:3.0in;
mso-level-number-position:left;
text-indent:-.25in;
mso-ansi-font-size:10.0pt;
font-family:Symbol;}
@list l1:level7
{mso-level-number-format:bullet;
mso-level-text:\F0B7;
mso-level-tab-stop:3.5in;
mso-level-number-position:left;
text-indent:-.25in;
mso-ansi-font-size:10.0pt;
font-family:Symbol;}
@list l1:level8
{mso-level-number-format:bullet;
mso-level-text:\F0B7;
mso-level-tab-stop:4.0in;
mso-level-number-position:left;
text-indent:-.25in;
mso-ansi-font-size:10.0pt;
font-family:Symbol;}
@list l1:level9
{mso-level-number-format:bullet;
mso-level-text:\F0B7;
mso-level-tab-stop:4.5in;
mso-level-number-position:left;
text-indent:-.25in;
mso-ansi-font-size:10.0pt;
font-family:Symbol;}
ol
{margin-bottom:0in;}
ul
{margin-bottom:0in;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext="edit" spidmax="1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext="edit">
<o:idmap v:ext="edit" data="1" />
</o:shapelayout></xml><![endif]-->
</head>
<body lang="EN-US" link="blue" vlink="purple" style="word-wrap:break-word">
<div class="WordSection1">
<p class="MsoNormal">FYSA<o:p></o:p></p>
<p class="MsoNormal"><o:p> </o:p></p>
<div>
<p class="xmsonormal" style="background:white"><span class="xcontentpasted0"><span style="font-family:"Franklin Gothic Book",sans-serif;color:black">Today, the</span></span><span class="contentpasted0"><span style="font-family:"Franklin Gothic Book",sans-serif;color:black"> </span></span><span class="xcontentpasted0"><span style="font-family:"Franklin Gothic Book",sans-serif;color:black">Cybersecurity
and Infrastructure Security Agency</span></span><span class="contentpasted0"><span style="font-family:"Franklin Gothic Book",sans-serif;color:black"> </span></span><span class="xcontentpasted0"><span style="font-family:"Franklin Gothic Book",sans-serif;color:black">(</span></span><span style="font-size:12.0pt;color:black"><a href="https://www.cisa.gov/known-exploited-vulnerabilities-catalog"><span style="font-size:11.0pt;font-family:"Franklin Gothic Book",sans-serif">CISA</span></a></span><span class="xcontentpasted0"><span style="font-family:"Franklin Gothic Book",sans-serif;color:black">),
Federal Bureau of Investigation (</span></span><span style="font-size:12.0pt;color:black"><a href="https://www.fbi.gov/"><span style="font-size:11.0pt;font-family:"Franklin Gothic Book",sans-serif;color:#0C64C0">FBI</span></a></span><span class="xcontentpasted0"><span style="font-family:"Franklin Gothic Book",sans-serif;color:black">),
Multi-State Information Sharing and Analysis Center (</span></span><span style="font-size:12.0pt;color:black"><a href="https://www.cisecurity.org/ms-isac"><span style="font-size:11.0pt;font-family:"Franklin Gothic Book",sans-serif;color:#0C64C0">MS-ISAC</span></a></span><span class="xcontentpasted0"><span style="font-family:"Franklin Gothic Book",sans-serif;color:black">),
and the cybersecurity authorities of</span></span><span class="contentpasted0"><span style="font-family:"Franklin Gothic Book",sans-serif;color:black"> </span></span><span style="font-size:12.0pt;color:black"><a href="https://www.cyber.gov.au/"><span style="font-size:11.0pt;font-family:"Franklin Gothic Book",sans-serif;color:#005B84;background:white">Australia</span></a></span><span class="xcontentpasted0"><span style="font-family:"Franklin Gothic Book",sans-serif;color:#1B1B1B;background:white">, </span></span><span style="font-size:12.0pt;color:black"><a href="https://www.cyber.gc.ca/en/"><span style="font-size:11.0pt;font-family:"Franklin Gothic Book",sans-serif;color:#005B84;background:white">Canada</span></a></span><span class="xcontentpasted0"><span style="font-family:"Franklin Gothic Book",sans-serif;color:#1B1B1B;background:white">, </span></span><span style="font-size:12.0pt;color:black"><a href="https://www.ncsc.gov.uk/"><span style="font-size:11.0pt;font-family:"Franklin Gothic Book",sans-serif;color:#005B84;background:white">United
Kingdom</span></a></span><span class="xcontentpasted0"><span style="font-family:"Franklin Gothic Book",sans-serif;color:#1B1B1B;background:white">, </span></span><span style="font-size:12.0pt;color:black"><a href="https://bsi.bund.de/"><span style="font-size:11.0pt;font-family:"Franklin Gothic Book",sans-serif;color:#005B84;background:white">Germany</span></a></span><span class="xcontentpasted0"><span style="font-family:"Franklin Gothic Book",sans-serif;color:#1B1B1B;background:white">, </span></span><span style="font-size:12.0pt;color:black"><a href="https://www.ssi.gouv.fr/"><span style="font-size:11.0pt;font-family:"Franklin Gothic Book",sans-serif;background:white">France</span></a></span><span class="xcontentpasted0"><span style="font-family:"Franklin Gothic Book",sans-serif;color:#1B1B1B;background:white">,
and New Zealand (</span></span><span style="font-size:12.0pt;color:black"><a href="https://www.cert.govt.nz/"><span style="font-size:11.0pt;font-family:"Franklin Gothic Book",sans-serif;color:#005B84;background:white">CERT NZ</span></a></span><span class="xcontentpasted0"><span style="font-family:"Franklin Gothic Book",sans-serif;color:#1B1B1B;background:white">, </span></span><span style="font-size:12.0pt;color:black"><a href="https://www.ncsc.govt.nz/"><span style="font-size:11.0pt;font-family:"Franklin Gothic Book",sans-serif;color:#005B84;background:white">NCSC-NZ</span></a></span><span class="xcontentpasted0"><span style="font-family:"Franklin Gothic Book",sans-serif;color:#1B1B1B;background:white">)</span></span><span class="contentpasted0"><span style="font-family:"Franklin Gothic Book",sans-serif;color:black"> </span></span><span class="xcontentpasted0"><span style="font-family:"Franklin Gothic Book",sans-serif;color:black">published
a joint Cybersecurity Advisory titled "</span></span><span style="font-size:12.0pt;color:black"><a href="https://cisa.gov/news-events/cybersecurity-advisories/aa23-165a"><span style="font-size:11.0pt;font-family:"Franklin Gothic Book",sans-serif">Understanding
Ransomware Threat Actors: LockBit</span></a></span><span class="xcontentpasted0"><span style="font-family:"Franklin Gothic Book",sans-serif;color:black">."</span></span><span class="contentpasted0"><span style="font-family:"Franklin Gothic Book",sans-serif;color:black"> </span></span><span style="font-size:12.0pt;color:black"><o:p></o:p></span></p>
<p class="xmsonormal" style="background:white"><span class="contentpasted0"><span style="font-family:"Franklin Gothic Book",sans-serif;color:black"> </span></span><span style="font-size:12.0pt;color:black"><o:p></o:p></span></p>
<p class="xparagraph" style="background:white"><span class="xcontentpasted0"><span style="font-family:"Franklin Gothic Book",sans-serif;color:#1B1B1B">Threat actors using LockBit, the most globally used and prolific Ransomware-as-a-Service (RaaS) in 2022 and
2023, have attacked organizations of various sizes across a wide array of critical infrastructure sectors. The LockBit RaaS attracts affiliates to use LockBit for conducting ransomware attacks, resulting in a large web of unconnected threat actors conducting
wildly varying attacks. </span></span><span style="font-size:12.0pt;font-family:"Times New Roman",serif;color:black"><o:p></o:p></span></p>
<p class="xparagraph" style="background:white"><span class="contentpasted0"><span style="font-family:"Franklin Gothic Book",sans-serif;color:#1B1B1B"> </span></span><span style="font-size:12.0pt;font-family:"Times New Roman",serif;color:black"><o:p></o:p></span></p>
<p class="xparagraph" style="background:white"><span class="xcontentpasted0"><span style="font-family:"Franklin Gothic Book",sans-serif;color:#1B1B1B">Affiliates have attacked organizations of various sizes across an array of critical infrastructure sectors
including financial services, food and agriculture, education, energy, government and emergency services, healthcare, manufacturing, and transportation. </span></span><span style="font-size:12.0pt;font-family:"Times New Roman",serif;color:black"><o:p></o:p></span></p>
<p class="xparagraph" style="background:white"><span class="contentpasted0"><span style="font-family:"Franklin Gothic Book",sans-serif;color:#1B1B1B"> </span></span><span style="font-size:12.0pt;font-family:"Times New Roman",serif;color:black"><o:p></o:p></span></p>
<p class="xparagraph" style="background:white"><span class="xcontentpasted0"><span style="font-family:"Franklin Gothic Book",sans-serif;color:#1B1B1B">LockBit has been successful through its innovation and continual development of the group’s administrative
panel (i.e., a simplified, point-and-click interface making ransomware deployment accessible to those with lower degrees of technical skill), affiliate supporting functions, and constant revision of tactics, techniques, and procedures (TTPs). </span></span><span style="font-size:12.0pt;font-family:"Times New Roman",serif;color:black"><o:p></o:p></span></p>
<p class="xparagraph" style="background:white"><span class="contentpasted0"><span style="font-family:"Franklin Gothic Book",sans-serif;color:#1B1B1B"> </span></span><span style="font-size:12.0pt;font-family:"Times New Roman",serif;color:black"><o:p></o:p></span></p>
<p class="xparagraph" style="background:white"><span class="xcontentpasted0"><span style="font-family:"Franklin Gothic Book",sans-serif;color:#1B1B1B">To help organizations understand and defend against this global threat and its large number of unconnected
LockBit affiliates, this advisory includes: </span></span><span style="font-size:12.0pt;font-family:"Times New Roman",serif;color:black"><o:p></o:p></span></p>
<ul type="disc">
<li class="MsoNormal" style="color:black;mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;mso-list:l0 level1 lfo3;background:white">
<span class="xcontentpasted0"><span style="font-family:"Franklin Gothic Book",sans-serif;color:#1B1B1B">A list of approximately 30 freeware and open-source tools used by LockBit actors; </span></span><span style="font-size:12.0pt"><o:p></o:p></span></li><li class="MsoNormal" style="color:black;mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;mso-list:l0 level1 lfo3;background:white">
<span class="xcontentpasted0"><span style="font-family:"Franklin Gothic Book",sans-serif;color:#1B1B1B">More than 40 of their TTPs mapped to MITRE ATT&CK; </span></span><span style="font-size:12.0pt"><o:p></o:p></span></li><li class="MsoNormal" style="color:black;mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;mso-list:l0 level1 lfo3;background:white">
<span class="xcontentpasted0"><span style="font-family:"Franklin Gothic Book",sans-serif;color:#1B1B1B">Observed common vulnerabilities and exposures (CVEs) used for exploitation; </span></span><span style="font-size:12.0pt"><o:p></o:p></span></li><li class="MsoNormal" style="color:black;mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;mso-list:l0 level1 lfo3;background:white">
<span class="xcontentpasted0"><span style="font-family:"Franklin Gothic Book",sans-serif;color:#1B1B1B">An evolution of LockBit RaaS along with worldwide trends and statistics; and </span></span><span style="font-size:12.0pt"><o:p></o:p></span></li><li class="MsoNormal" style="color:black;mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;mso-list:l0 level1 lfo3;background:white">
<span class="xcontentpasted0"><span style="font-family:"Franklin Gothic Book",sans-serif;color:#1B1B1B">Resources and services available from authoring agencies and recommended mitigations to help protect against the worldwide LockBit activity. </span></span><span style="font-size:12.0pt"><o:p></o:p></span></li></ul>
<p class="xmsonospacing" style="background:white"><span class="xcontentpasted0"><span style="font-family:"Franklin Gothic Book",sans-serif;color:black">For more on CISA’s work to help organizations strengthen their cybersecurity and mitigate the risk, visit </span></span><span style="font-size:12.0pt;color:black"><a href="https://cisa.gov/resources-tools/all-resources-tools"><span style="font-size:11.0pt;font-family:"Franklin Gothic Book",sans-serif">CISA.gov</span></a></span><span class="xcontentpasted0"><span style="font-family:"Franklin Gothic Book",sans-serif;color:black">. </span></span><span style="font-size:12.0pt;color:black"><o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-size:12.0pt;color:black"><o:p> </o:p></span></p>
</div>
<p class="MsoNormal"><o:p> </o:p></p>
<p class="MsoNormal"><b><span style="color:#1F497D">Theresa A. Masse<o:p></o:p></span></b></p>
<p class="MsoNormal"><span style="font-size:10.0pt;color:#1F497D">Cybersecurity State Coordinator/Advisor, Region 10 (Oregon)
<o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-size:10.0pt;color:#1F497D">Cybersecurity and Infrastructure Security Agency<o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-size:10.0pt;color:#1F497D">Department of Homeland Security<o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-size:10.0pt;color:#1F497D">Phone: (503) 930-5671
<o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-size:10.0pt;color:#1F497D">Email:</span><span style="font-size:10.0pt;color:#777777">
</span><a href="mailto:theresa.masse@cisa.dhs.gov"><span style="font-size:10.0pt;color:#0563C1">theresa.masse@cisa.dhs.gov</span></a><u><span style="font-size:10.0pt;color:#0760C1"><o:p></o:p></span></u></p>
<p class="MsoNormal"><span style="color:#1F497D"><o:p> </o:p></span></p>
<p class="MsoNormal"><img border="0" width="97" height="97" style="width:1.0138in;height:1.0138in" id="Picture_x0020_2" src="cid:image001.png@01D99E90.F53B3E40"><span style="color:#1F497D"><o:p></o:p></span></p>
<p class="MsoNormal"><o:p> </o:p></p>
<div>
<div>
<p class="MsoNormal"><span style="font-size:12.0pt;color:black"><o:p> </o:p></span></p>
</div>
</div>
</div>
</body>
</html>