Anonymous ID: e2b6f9 Feb. 12, 2024, 10:39 a.m. No.20402430   🗄️.is 🔗kun   >>2636 >>2648 >>2789 >>2979 >>3112 >>3128 >>3137 >>3156 >>3176 >>3203

>>20401659 (lb) While Everyone Was Distracted With The Super Bowl The FBI & The Cybersecurity & Infrastructure Security Agency Quietly Published “Joint Guidance On How To Live Off The Land”

 

https://www.cisa.gov/sites/default/files/2024-02/Joint-Guidance-Identifying-and-Mitigating-LOTL_V3508c.pdf

 

https://www.cisa.gov/resources-tools/resources/identifying-and-mitigating-living-land-techniques

 

Identifying and Mitigating Living Off the Land Techniques

Publish Date

February 07, 2024

Related topics:

Critical Infrastructure Security and Resilience, Incident Detection, Response, and Prevention, Cyber Threats and Advisories

 

This Joint Guidance, Identifying and Mitigating Living Off the Land Techniques, was co-authored by CISA, the National Security Agency (NSA), the Federal Bureau of Investigation (FBI), and the following agencies:

 

U.S. Department of Energy (DOE)

U.S. Environmental Protection Agency (EPA)

U.S. Transportation Security Administration (TSA)

Australian Signals Directorate’s (ASD’s) Australian Cyber Security Centre (ACSC)

Canadian Centre for Cyber Security (CCCS) a part of the Communications Security Establishment (CSE)

United Kingdom National Cyber Security Centre (NCSC-UK)

New Zealand National Cyber Security Centre (NCSC-NZ)

 

Identifying and Mitigating Living Off the Land Techniques provides threat detection information and mitigations applicable to LOTL activity, regardless of threat actor. Many organizations do not implement security best practice capabilities that support detection of living off the land (LOTL), so this technique continues to be effective with little to no investment in tooling by malicious cyber actors. This guidance provides several observed network defense weaknesses that make it difficult for IT administrators to distinguish malicious activity from legitimate behavior, even for those organizations with more mature cyber postures.

 

This guidance is based on previously published products, red team assessments, and/or observations from incident response activities at critical infrastructure organizations, including those compromised by the PRC state-sponsored cyber group known as Volt Typhoon. For more on Volt Typhoon specifically, refer to our Joint Cybersecurity Advisory PRC State-Sponsored Actors Compromise and Maintain Persistent Access to U.S. Critical Infrastructure.

 

CISA and its partners strongly urge critical infrastructure organizations and technology manufacturers to read the joint advisory and guidance to defend against this threat.

Anonymous ID: e2b6f9 Feb. 12, 2024, 11:13 a.m. No.20402596   🗄️.is 🔗kun

>>20402580

It appears, based on this plans existence and release, that they are going to crash the internet infrastructure… and apparently blame China.

This is a multinational guide (AU, US, CAN, UK, but made by US agencies) to attempt to mitigate data loss and corruption, and how to attempt to continue some level of digital operations on the other side.

 

This is how they can 'change history' and disappear exabytes of inconvenient digital data and archives.

 

It is no accident that Microsoft is the most ubiquitous OS in the personal and business computing space, while being the most easily compromised, and that all of their chipsets and hardware are made in China. The takedown can occur in a nonlocal manner, so as to say unlike a fire spreading from an origin, many origins can occur simultaneously or independently, and appear as typical, expected processing… until it is not. The ability to detect, halt, and counter is minimal to none. This (Made in China) would also include wifi routers of nearly all brands, switches and hub routers (CISCO etc), NOCs (network operating centers) and servers (Oracle, SAP), cell towers, etc. And all Apple products. Probably AWS, IBM, etc too…

 

Check out 2013 movie Dragon Day for an example of what has been set up re: a digital takedown of America (in this movie, but the world at large would be effected dramatically).

Anonymous ID: e2b6f9 Feb. 12, 2024, 1:07 p.m. No.20403073   🗄️.is 🔗kun

>>20403021

no.

yes. overt master/slave dynamic is superior to covert master/slave dynamic. truth is always the superior route.

 

No slave/ master dynamic would obviously be most desirable