text
stringlengths
0
2.18k
--------------------------------------------------- Unstructured Plain Text Format 1
--------------------------------------------------- Unstructured Page Header Begin
--------------------------------------------------- Unstructured Title Begin
JOINT CYBERSECURITY ADVISORY
--------------------------------------------------- Unstructured Title End
--------------------------------------------------- Unstructured Image Begin
--------------------------------------------------- Unstructured Image End
--------------------------------------------------- Unstructured Page Header End
Co-Authored by:
--------------------------------------------------- Unstructured Image Begin
CYBERSECURITY & INFRASTRUCTURE CISA SECURITY AGENCY
--------------------------------------------------- Unstructured Image End
--------------------------------------------------- Unstructured Image Begin
DEPARTMENT OF JUSTICE FEDERAL BUREAU OF INVESTIGATION
--------------------------------------------------- Unstructured Image End
--------------------------------------------------- Unstructured Page Header Begin
TLP:WHITE Product ID: AA22-O76A
--------------------------------------------------- Unstructured Page Header End
March 17, 2022
--------------------------------------------------- Unstructured Sub-Title Begin
Strengthening Cybersecurity of SATCOM Network Providers and Customers
--------------------------------------------------- Unstructured Sub-Title End
Updated May 10, 2022: The U.S. government attributes this threat activity to Russian state-sponsored malicious cyber actors. Additional information may be found in a statement from the State Department. For more information on Russian malicious cyber activity, refer to cisa.gov/uscert/russia.
--------------------------------------------------- Unstructured Sub-Title Begin
SUMMARY
--------------------------------------------------- Unstructured Sub-Title End
The Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI) are aware of possible threats to U.S. and international satellite communication (SATCOM) networks. Successful intrusions into SATCOM networks could create risk in SATCOM network providers’ customer environments.
Actions to Take Today:
Use secure methods for authentication.
Enforce principle of least privilege.
Review trust relationships.
Implement encryption.
Ensure robust patching and system configuration audits.
Monitor logs for suspicious activity.
Ensure incident response, resilience, and continuity of operations plans are in place.
Given the current geopolitical situation, CISA’s Shields Up initiative requests that all organizations significantly lower their threshold for reporting and sharing indications of malicious cyber activity. To that end, CISA and FBI will update this joint Cybersecurity Advisory (CSA) as new information becomes available so that SATCOM providers and their customers can take additional mitigation steps pertinent to their environments.
CISA and FBI strongly encourages critical infrastructure organizations and other organizations that are either SATCOM network providers or customers to review and implement the mitigations outlined in this CSA to strengthen SATCOM network cybersecurity.
To report suspicious or criminal activity related to information found in this Joint Cybersecurity Advisory, contact your local FBI field office at www.fbi.gov/contact-us/field-offices, or the FBI’s 24/7 Cyber Watch (CyWatch) at (855) 292-3937 or by e-mail at [email protected]. When available, please include the following information regarding the incident: date, time, and location of the incident; type of activity; number of people affected; type of equipment used for the activity; the name of the submitting company or organization; and a designated point of contact. To request incident response resources or technical assistance related to these threats, contact CISA at [email protected]
This document is marked TLP:WHITE. Disclosure is not limited. Sources may use TLP:WHITE when information carries minimal or no foreseeable risk of misuse, in accordance with applicable rules and procedures for public release. Subject to standard copyright rules, TLP:WHITE information may be distributed without restriction. For more information on the Traffic Light Protocol, see https://www.cisa.gov/tlp.
--------------------------------------------------- Unstructured Page Footer Begin
TLP:WHITE
--------------------------------------------------- Unstructured Image Begin
--------------------------------------------------- Unstructured Image End
--------------------------------------------------- Unstructured Page Footer End
--------------------------------------------------- Unstructured Plain Text Format 1
--------------------------------------------------- Unstructured Page Header Begin
--------------------------------------------------- Unstructured Title Begin
JOINT CYBERSECURITY ADVISORY
--------------------------------------------------- Unstructured Title End
--------------------------------------------------- Unstructured Image Begin
--------------------------------------------------- Unstructured Image End
CISA | FBI
TLP:WHITE
--------------------------------------------------- Unstructured Page Header End
--------------------------------------------------- Unstructured Sub-Title Begin
RESOURCES
--------------------------------------------------- Unstructured Sub-Title End
National Security Agency (NSA) Cybersecurity Advisory: Protecting VSAT Communications
NSA Cybersecurity Technical Report: Network Infrastructure Security Guidance
Office of the Director of National Intelligence (ODNI): Annual Threat Assessment of the U.S. Intelligence Community, February 2022
CISA Tip: Choosing and Protecting Passwords
CISA Capacity Enhancement Guide: Implementing Strong Authentication
--------------------------------------------------- Unstructured Page Footer Begin
--------------------------------------------------- Unstructured Page Number Block Begin
Page 4 of 4
--------------------------------------------------- Unstructured Page Number Block End
| Product ID: AA22-076A
TLP:WHITE
--------------------------------------------------- Unstructured Image Begin
--------------------------------------------------- Unstructured Image End
--------------------------------------------------- Unstructured Page Footer End
--------------------------------------------------- Unstructured Plain Text Format 1.0.4
--------------------------------------------------- Unstructured Table Begin
State 1. Any Agency utilizing FRS 2. Intend to deploy FRS in 2011 3. Agencies utilizing FRS 4. Purpose of FRS 5. Compliance with REAL ID 6. Refuse to comply with Real ID 7. Relevant and/or interesting information relating to FRS
Nebraska Yes DL photos are maintained exclusively by the Nebraska Department of Motor Vehicles. Access of these photos is restricted to law enforcement and is available through the Nebraska Criminal Justice Information System, NCJIS. Reduce issuance of multiple ID cards for the same person. Unknown There are strict dissemination restrictions on releasing DL photos in Nebraska per state statute. The Nebraska Department of Motor Vehicles safeguards the data and provides it for law enforcement purposes only. There are connectivity factors that perhaps could be explored. For addition information contact the Nebraska DMV.
Nevada Yes Used by the Department of Motor Vehicles Reduce issuance of multiple ID cards for the same person. Unknown Nevada is in the process of implementing Real ID. The current status is unknown; the Department of Motor Vehicles is a separate Department from Public Safety. It appears that the DMV has had success using facial recognition technology.
New Hampshire No No State regulations currently in place will substantially limit any ability to pursue this kind of technology. It does not appear that any consideration is being given to relax these restrictions. If anything, there will be additional limitations put in place to protect an individual's right to privacy.
New Jersey Yes Used by the NJ State Police Regional Operations Intelligence Center, R.O.I.C. Law enforcement purpose can call the R.O. I C. for FRS. Unknown what DMV is using Unknown Currently funds have been frozen and future direction is unknown.
New Mexico Yes Used by the Motor Vehicle Department (MVD) MVD for security and DL issuance reasons. No, decision made by Executive Government Yes
New York Yes Used by the NYS Department of Motor Vehicles Contact DMV Yes