WaterISAC Navigation
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
Home Posts Russian State-Sponsored Actors Target Cleared Defense Contractor Networks
Become a Member

Log in

  • Upcoming Events
  • Resource Center
  • Tools
  • Webcasts
  • Contaminant Databases
  • Community Partners
  • About
  • Log in

  • My Account

  • Logout

  • Report Incident
  • Contact Us
  • NRWA Signup
  • WaterISAC Champions
More Resources

Russian State-Sponsored Actors Target Cleared Defense Contractor Networks

Author: Alec Davison

Created: Thursday, February 17, 2022 - 18:52

Categories: Cybersecurity, Intelligence

The Cybersecurity and Infrastructure Security Agency (CISA), the FBI, and the National Security Agency (NSA) have released a joint Cybersecurity Advisory (AA22-047A) highlighting ongoing targeting of U.S. cleared defense contractors (CDCs) by Russian state-sponsored cyber actors. According to the alert, over the last two years, both large and small CDCs and subcontractors supporting various defense industries have been observed being targeted for unclassified proprietary and export-controlled information such as weapons development, communications infrastructure, technological and scientific research, and other proprietary details.

The activities and tactics used by the Russian state-sponsored cyber actors discussed in the alert include: brute forcing techniques, spear phishing emails, harvesting credentials, mapping Active Directory, and maintaining persistent access, in multiple instances for at least six months. While this advisory highlights cyber actions targeting of a different sector, some of the TTPs might be utilized in other attacks and campaigns by Russian adversaries. The FBI, NSA, and CISA urge all critical infrastructure organizations to read the full advisory and investigate suspicious activity in their enterprise and cloud environments. Access the full advisory here.

Related Resources

Tip of the Week – May 14, 2026

May 14, 2026 in Cybersecurity, Security Preparedness
Members Only

(TLP:AMBER+STRICT) Situation Report: Heightened Threat Environment – Potential Retaliation by Iranian Threat Actors Following U.S. Strikes on Iran (Updated May 14, 2026)

May 14, 2026 in Cybersecurity, OT-ICS Security, Physical Security, Security Preparedness

(TLP:CLEAR) Non-Human Identities (NHIs) Are Growing Faster Than Most Security Programs

May 14, 2026 in Cybersecurity, Security Preparedness

Become a Member
FAQs
About
Report Incident

Terms & Conditions
Privacy Policy
AI Policy
Contact Us

LinkedIn

1250 I Street NW, Suite 350
Washington, DC 20005
1-866-H2O-ISAC (1-866-426-4722)
© 2026 WaterISAC. All Rights Reserved.

Toggle the Widgetbar