CISA Issues Alert Warning Against Russian State-Sponsored Attacks on Cleared Defense Contractors
Client Alert | 2 min read | 02.18.22
On February 16, 2022, the Cybersecurity & Infrastructure Security Agency (CISA), which is part of the U.S. Department of Homeland Security (DHS), issued Alert (AA22-047A), “Russian State-Sponsored Cyber Actors Target Cleared Defense Contractor Networks to Obtain Sensitive U.S. Defense Information Technology.” The Alert contains useful background on the situation and the following guidance for companies on response and risk mitigation efforts:
- CISA and U.S. intelligence and law enforcement agencies have observed an increase in targeting of U.S. cleared defense contractors (CDCs) by Russian state-sponsored cyber threat actors. The targeted CDCs support contracts for the U.S. Department of Defense (DoD) and the U.S. intelligence community. Intrusions to date have given the threat actors access to sensitive, unclassified information and also to CDC-proprietary and export-controlled technology
- The Russia state-sponsored threat actors are using common but effective tactics to gain access to targeted networks. These tactics are also used by many other cyber threat actors, potentially making them difficult to identify as part of these attacks, such as: spearphishing, credential harvesting, brute force/password spraying, and targeting known vulnerabilities in widely used platforms like Microsoft 365 (M365). Both enterprise and cloud networks have been targeted.
- The Alert provides additional, detailed information on threat actor activity and tactics, techniques and procedures (TTPs) known to have been associated with these attacks. The Alert also provides guidance to aid companies’ detection efforts to identify such attacks. Companies will be well-served to review this information and incorporate it into their preventative measures, as well as threat hunting and incident investigations.
- The Alert also provides suggested measures companies may consider for immediate response to and mitigation against these threats. While discussed here in the context of these attacks, such measures are also helpful more broadly because they respond to the common but effective tactics in use not only by these Russian attackers but also by many other threat actors. Suggested measures include:
- resetting passwords in the event of a suspected attack;
- implementing credential hardening;
- establishing centralized log management;
- initiating a software and patch management program;
- employing antivirus (AV) programs;
- using endpoint detection and response (EDR) tools;
- maintaining rigorous configuration management programs;
- enforcing the principle of least privilege;
- reviewing trust relationships;
- encouraging remote work environment best practices;
- establishing user awareness best practices and applying additional best practice mitigations.
Companies should consider using this threat intelligence as an opportunity to review their cybersecurity incident response plans (IRPs); ensure they understand and are prepared to meet applicable legal, regulatory, and contractual reporting obligations; and evaluate their ability to detect and respond to attacks such as these.
Crowell & Moring LLP is highly experienced at advising companies that are navigating cybersecurity issues such as these. We can provide guidance regarding this Alert and assist with privileged investigations, mitigation efforts, or other related activities.
Insights
Client Alert | 4 min read | 09.12.25
SBA’s OHA Further Defines Extraordinary Action in SDVOSB Appeal
On September 4, 2025, the Small Business Administration’s (SBA) Office of Hearings and Appeals (OHA) granted an appeal challenging SBA’s determination that a service-disabled veteran did not control an entity applying for Service-Disabled Veteran-Owned Small Business (SDVOSB) status based on a minority owner’s ability to block certain actions in the matter of VSBC Appeal of: Blue Skye Foods, LLC, SBA No. VSBC-442-A.
Client Alert | 6 min read | 09.11.25
U.S. Department of Commerce Partially Relaxes Export Controls on Syria
Client Alert | 9 min read | 09.11.25
Client Alert | 1 min read | 09.10.25