Shields Up Technical Guidance

Immediate Shields Up Actions
• Patch vulnerabilities.
• Use MFA.
• Run antivirus. 
• Enable strong spam filters to prevent phishing emails from reaching end users.
• Disable ports and protocols that are not essential.
• Strengthen controls for cloud services.

Summary

Note: CISA will continue to update this webpage as we have further guidance to impart and additional reporting to share. Information contained on this webpage is provided “as-is” for informational purposes only. CISA does not endorse any company, product, or service referenced below. See CISA's Shields Up webpage for further steps to reduce cybersecurity risk.

CISA and its Joint Cyber Defense Collaborative (JCDC) partners are responding to ongoing Russian state-sponsored cyber activity in connection with Russia's attack on Ukraine.

Timeline

February 25, 2022.

Conti ransomware actors threaten "retaliatory measures" targeting critical infrastructure in response to "a cyberattack or any war activities against Russia."

  • Joint Cybersecurity Advisory – Conti Ransomware (initial publication September 22, 2021) provides tactics, techniques, and procedures (TTPs) as well as indicators of compromise (IOCs) for Conti ransomware attacks. The advisory also provides mitigation guidance.
  • StopRansomware.gov provides guidance on ransomware protection, detection, and response; and includes ransomware advisories and resources from CISA and other federal partners.

February 23, 2022.

Distributed denial-of-service (DDoS) attack on Ukrainian organizations, including Ukrainian government agencies.

HermeticWiper malware used to attack Ukrainian organizations. Note: currently, the U.S. Government has not attributed this activity to a particular threat actor.

  • Joint Cybersecurity Advisory – Destructive Malware Targeting Organizations in Ukraine provides indicators of compromise (IOCs) and mitigation guidance for HermeticWiper and other destructive malware activity targeting Ukrainian organizations.
  • According to Broadcom, upon execution, "the wiper will damage the Master Boot Record (MBR) of the infected computer, rendering it inoperable."
  • According to SentinelOne, the wiper, which is deployed via a signed driver, "targets Windows devices, manipulating the MBR resulting in subsequent boot failure."

January 13, 2022. "WhisperGate" wiper activity targets Ukrainian organizations, including Ukrainian government agencies.

  • According to Microsoft, powering down the victim device executes the malware, which overwrites the MBR with a ransom note; however, the ransom note is a ruse because the malware actually destroys the MBR and the targeted files.

Mitigation Guidance and Resources from JCDC and Other Partners

HermeticWiper Malware

Related Resources