{"id":157791,"date":"2022-03-29T12:00:42","date_gmt":"2022-03-29T19:00:42","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=157791"},"modified":"2022-03-30T06:18:08","modified_gmt":"2022-03-30T13:18:08","slug":"russia-ukraine-cyber-activity-best-practices","status":"publish","type":"post","link":"https:\/\/www2.paloaltonetworks.com\/blog\/2022\/03\/russia-ukraine-cyber-activity-best-practices\/","title":{"rendered":"Russia-Ukraine Cyber Activity Makes Security Best Practices Imperative"},"content":{"rendered":"<p>The <a href=\"https:\/\/www.whitehouse.gov\/briefing-room\/statements-releases\/2022\/03\/21\/statement-by-president-biden-on-our-nations-cybersecurity\/\" rel=\"nofollow,noopener\" >White House<\/a> and<a href=\"https:\/\/www.cisa.gov\/news\/2022\/03\/24\/cisa-fbi-and-doe-publish-advisory-historical-cyber-activity-used-indicted-russian\" rel=\"nofollow,noopener\" > U.S. Cybersecurity and Infrastructure Security Agency<\/a> (CISA) have recently warned that Russia could launch disruptive cyberattacks against organizations in the U.S., NATO member countries and allies that support Ukraine.<\/p>\n<p>Unit 42 <a href=\"https:\/\/unit42.paloaltonetworks.com\/tag\/ukraine\/\">has documented<\/a> related cyberattacks in Ukraine over the past month. Given that U.S. officials note that <a href=\"https:\/\/www.cisa.gov\/news\/2022\/03\/22\/readout-cisa-call-critical-infrastructure-partners-potential-russian-cyberattacks\" rel=\"nofollow,noopener\" >evolving intelligence<\/a> points to potentially destructive cyberattacks, we feel it is essential to encourage all organizations, as soon as possible, to review your cybersecurity policies and incident response plans, as well as to enhance your security posture.<\/p>\n<p>Below are recommendations that organizations can quickly employ to put protections in place now, as well as some long-term ongoing cyber hygiene best practices.<\/p>\n<p>You should consider how best to balance the needs of your organization with the potential cyber risk. It\u2019s important to avoid interruptions to your business while also implementing security tools and practices to improve your organization\u2019s vigilance and resilience. This can help head off the possibility of retaliatory cyberattacks, as well as help prevent any other attack activity that may be taking place.<\/p>\n<p>&nbsp;<\/p>\n<h2><a id=\"post-157791-_fxi8r4hqsmak\"><\/a>Phishing Attacks<\/h2>\n<p>It's very common that <a href=\"https:\/\/unit42.paloaltonetworks.com\/phishing-attacks\/\">newsworthy events<\/a> are leveraged by threat actors as topics and lures in phishing and spear-phishing attacks. Leading up to the military action commencing in Ukraine, Unit 42 saw <a href=\"https:\/\/unit42.paloaltonetworks.com\/ukraine-targeted-outsteel-saintbot\/\">spear-phishing attacks against Ukraine<\/a> organizations to deliver malware.<\/p>\n<p>&nbsp;<\/p>\n<h2><a id=\"post-157791-_hpvhh7e5f2y3\"><\/a>What You Can Quickly Do Now to Harden Your Defenses<\/h2>\n<ol>\n<li><strong>Follow best practices for <\/strong><a href=\"https:\/\/docs.paloaltonetworks.com\/pan-os\/10-2\/pan-os-admin\/url-filtering\/url-filtering-best-practices.html\"><strong>URL Filtering<\/strong><\/a>. Some examples:\n<ol style=\"list-style-type: lower-alpha;\">\n<li>Block all malicious categories and alert or consider blocking <a href=\"https:\/\/live.paloaltonetworks.com\/t5\/blogs\/url-filtering-category-recommendations\/ba-p\/325701\">threat-adjacent categories<\/a>.<\/li>\n<li>Consider switching to or enabling inline Advanced URL Filtering protection against \"<a href=\"https:\/\/unit42.paloaltonetworks.com\/patient-zero-web-threats\/\">patient zero<\/a>\" malicious URLs.<\/li>\n<li>Use the DNS Security subscription.<\/li>\n<li>Use WildFire URL analysis as modern attacks are multi-step.<\/li>\n<\/ol>\n<\/li>\n<li><strong>If subscribing to <\/strong><a href=\"https:\/\/docs.paloaltonetworks.com\/pan-os\/10-2\/pan-os-admin\/threat-prevention.html\"><strong>Threat Prevention<\/strong><\/a><strong>, <\/strong>make sure to create a profile and enable the signatures.<\/li>\n<li><strong>Strengthen phishing defenses. <\/strong>\n<ol style=\"list-style-type: lower-alpha;\">\n<li>Enable URL filtering on firewalls.<\/li>\n<li>Disable Microsoft Office macros.<\/li>\n<li>Train employees to spot suspicious emails, texts and fake aid websites.<\/li>\n<li>Follow best practices for password security, such as <a href=\"https:\/\/danielmiessler.com\/blog\/casmm-consumer-authentication-security-maturity-model\/\" rel=\"nofollow,noopener\" >CASMM<\/a> with a goal to reach level 6-8, and implement multi-factor authentication (MFA).<\/li>\n<li>Set up <a href=\"https:\/\/docs.paloaltonetworks.com\/pan-os\/10-2\/pan-os-admin\/url-filtering\/prevent-credential-phishing\/set-up-credential-phishing-prevention.html\">Credential Phishing Prevention<\/a> on your firewall to prevent credentials being used where they shouldn't.<\/li>\n<li>Don\u2019t open, click or run suspicious emails, files, links or programs when you do not recognize the sender or the domain \u2013 especially when you were not anticipating receiving the message. Before entering credentials, it\u2019s a good idea to pause and check that you\u2019re on the page you intended to visit. Pay close attention to random MFA popups, and when you do not recognize a login attempt, do not click \u201callow MFA.\u201d<\/li>\n<\/ol>\n<\/li>\n<li><strong>Keep all software up to date. <\/strong>Apply patches on any internet-facing services ASAP. Attackers are opportunistic and will leverage whatever they can to gain access to your systems. It is also important to update carefully and <a href=\"https:\/\/www.paloaltonetworks.com\/resources\/use-case\/cloud-native-security-across-th-software-development-lifecycle\">across the development lifecycle<\/a>, i.e., test first in an isolated development environment. Doing so ensures that the updates are free from sabotage or unintended behaviors. (In one recent example, updates for the <a href=\"https:\/\/securityboulevard.com\/2022\/03\/supply-chain-attack-node-ipc-sabotaged-as-anti-war-protestware\/\" rel=\"nofollow,noopener\" >node-ipc package<\/a> included modules that had unintended behaviors intended to protest the Ukraine and Russia conflict.) Whenever installing updates, do so from official websites only. Perform a software audit and remove software that you no longer use or can\u2019t trust as this reduces the risk of supply-chain attacks.<\/li>\n<li><strong>If you\u2019re using <\/strong><a href=\"https:\/\/www.paloaltonetworks.com\/cortex\/cortex-xdr\"><strong>Cortex XDR<\/strong><\/a><strong>, <\/strong>update to the latest agent version and content. Also, see our recent post on <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/security-operations\/cortex-xdr-protections-against-malware-associated-with-ukraine-and-russia-cyber-activity\/\">Cortex XDR protections<\/a> against Russia-Ukraine cyber activity.<\/li>\n<li><strong>Limit and restrict user privileges on your network.\u00a0<\/strong><span style=\"font-weight: 400;\">Limit access<\/span><span style=\"font-weight: 400;\"> using <a href=\"https:\/\/www.paloaltonetworks.com\/cyberpedia\/what-is-least-privilege-access\">least-privilege<\/a> principles to reduce any potential impact. Ensure critical systems on the network are isolated. For cloud environments, evaluate entitlements for all human and non-human <a href=\"https:\/\/www.paloaltonetworks.com\/prisma\/cloud\/cloud-identity-security\">identities<\/a>.<\/span><\/li>\n<li><strong>Review group policy settings for your domain.<\/strong> Ensure there are no suspicious or stale policies.<\/li>\n<li><strong>Invest time and resources in backups now<\/strong>. <a href=\"https:\/\/unit42.paloaltonetworks.com\/preparing-for-cyber-impact-russia-ukraine-crisis\/\">Wipers<\/a> and <a href=\"https:\/\/unit42.paloaltonetworks.com\/2022-ransomware-threat-report-highlights\/\">ransomware<\/a> are on the rise and can encrypt your data even in the cloud. The only thing worse than no backup is a backup that doesn\u2019t work. Make time to test restoring your backups. Consider encrypting backups, even those in the cloud.<\/li>\n<li><strong>Review <\/strong><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2021\/09\/cyber-resilience\/\"><strong>incident response<\/strong><\/a><strong> and business continuity plans. <\/strong>Do your scenarios include those that are destructive in nature? Is your chain of command current?<\/li>\n<li><strong>Have retainers in place. <\/strong>Have <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2021\/11\/incident-response-retainers\/\">retainers for incident response<\/a>, outside counsel and crisis communications teams negotiated in advance, so you are not caught off guard if an incident occurs. Have them already? Check in with your retainer vendors and advise them of heightened alert status.<\/li>\n<\/ol>\n<p>&nbsp;<\/p>\n<h2><a id=\"post-157791-_50343o6a6han\"><\/a>Long-term Cyber Hygiene Best Practices<\/h2>\n<p>Here are a few suggestions to strengthen your cybersecurity posture and harden your defenses:<\/p>\n<ol>\n<li><strong>Migrate to cloud solutions<\/strong> for small businesses: Follow cybersecurity <a href=\"https:\/\/unit42.paloaltonetworks.com\/cloud-threat-report-2h-2021\/\">best practices in the cloud<\/a> and protect websites with anti-DDoS protection.<\/li>\n<li><strong>Adopt a <a href=\"https:\/\/www.paloaltonetworks.com\/zero-trust\">Zero Trust<\/a> approach<\/strong> to securing your organization.<\/li>\n<li><strong>Avoid using <\/strong>the same laptop\/smartphone for work and personal needs.<\/li>\n<li><strong>Schedule <\/strong><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2022\/01\/threat-intel-informed-cybersecurity\/\"><strong>routine pen-testing<\/strong><\/a> (red teaming) of your networks.<\/li>\n<li><strong>Test disaster contingency plans <\/strong>including those involving failover sites, restoring backups, handling staff shortages, ensuring knowledge transfer, etc.<\/li>\n<li><strong>Continue to update all software<\/strong> and maintain logs of software versions, patches, and last updates applied.<\/li>\n<li><strong>Continue to train staff <\/strong>on basic security practices \u2013 test staff with phishing emails.<\/li>\n<li><strong>Embed security from the start <\/strong>for any new products and projects, including <a href=\"https:\/\/www.paloaltonetworks.com\/prisma\/cloud\/cloud-code-security\">source code security<\/a>, data encryption, pen testing, etc.<\/li>\n<\/ol>\n<p>&nbsp;<\/p>\n<h2><a id=\"post-157791-_c5aeltcmv5gp\"><\/a>The Time to Follow Cybersecurity Best Practices Is Now<\/h2>\n<p>This isn\u2019t a time to panic, but it is a time of heightened alert and awareness of credible threats, which is exactly when we should all be reviewing security policies, exercising contingency plans and being aware of potential threats against our organizations and industries. The best we can do is to position ourselves for what might come, and this is achieved by practicing.<\/p>\n<p>&nbsp;<\/p>\n<h2><a id=\"post-157791-_uha59e8efzqy\"><\/a>Additional Resources<\/h2>\n<p><a href=\"https:\/\/unit42.paloaltonetworks.com\/preparing-for-cyber-impact-russia-ukraine-crisis\/\">Russia-Ukraine Cyberattacks: How to Protect Against Related Cyberthreats Including DDoS, Hermetic Wiper, Gamaredon and Website Defacement<\/a><\/p>\n<p><em>Updated March 29, 2022, at 1 p.m. PT.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>U.S. officials note that evolving intelligence points to potentially destructive cyberattacks. We encourage organizations to review best practices now<\/p>\n","protected":false},"author":133,"featured_media":157792,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[6724,6717,6769],"tags":[3967,6737,6669,208,3531,4626,29,5031,586,506,69],"coauthors":[1222],"class_list":["post-157791","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-points-of-view","category-products-and-services","category-public-sector","tag-best-practices","tag-cortex-xdr","tag-incident-response","tag-phishing","tag-russia","tag-spear-phishing","tag-threat-prevention","tag-ukraine","tag-unit-42","tag-url-filtering","tag-wildfire","net_sec_category-next-generation-firewalls","net_sec_category-zero-trust-security","sec_ops_category-must-read-articles"],"jetpack_featured_media_url":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2022\/03\/NetSec-Adhoc-Updated-Blog-Image-Resize-543362794.png","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/157791","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/133"}],"replies":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=157791"}],"version-history":[{"count":7,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/157791\/revisions"}],"predecessor-version":[{"id":158430,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/157791\/revisions\/158430"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media\/157792"}],"wp:attachment":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=157791"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=157791"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=157791"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=157791"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}