

China has exercised its increasingly sophisticated capabilities to illegitimately obtain U.S. national and economic interests: new energy vehicles, next generation information technology (IT), biotechnology, new materials, aerospace, maritime engineering and high-tech ships, railway, robotics, power equipment, and agricultural machinery. The “Made in China 2025” 10-year plan outlines China’s top-level policy priorities., China may seek to target the following industries deemed critical to U.S. Do they have the accesses they need? Do they know the processes? Are various data sources logging as expected? Ensure personnel are positioned to act in a calm and unified manner.Ĭhina has a history of using national military and economic resources to leverage offensive cyber tactics in pursuing its national interests. Ensure personnel are familiar with the key steps they need to take during an incident. Exercise organizational incident response plans.Consider reporting incidents to CISA to help serve as part of CISA’s early warning system (see the Contact Information section below). The well-being of an organization’s workforce and cyber infrastructure depends on awareness of threat activity. Ensure personnel know how and when to report an incident. Flag any known Chinese indicators of compromise (IOCs) and TTPs for immediate response. Ensure security personnel monitor key internal security capabilities and can identify anomalous behavior.
#COBALT STRIKE 3.10 DOWNLOAD UPDATE#
Minimize gaps in personnel availability, consistently consume relevant threat intelligence, and update emergency call trees. Adopt a state of heightened awareness.In addition to the recommendations listed in the Mitigations section of this Alert, CISA recommends organizations take the following actions.

In light of heightened tensions between the United States and China, the Cybersecurity and Infrastructure Security Agency (CISA) is providing specific Chinese government and affiliated cyber threat actor tactics, techniques, and procedures (TTPs) and recommended mitigations to the cybersecurity community to assist in the protection of our Nation’s critical infrastructure. This Alert has been updated to include information on vulnerabilities exploited by Chinese state-sponsored actors (see Table 4). Note: on October 20, 2020, the National Security Agency (NSA) released a cybersecurity advisory providing information on publicly known vulnerabilities exploited by Chinese state-sponsored cyber actors to target computer networks holding sensitive intellectual property, economic, political, and military information. See the ATT&CK for Enterprise framework for all referenced threat actor techniques. This Alert uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK®) framework.
