WaterISAC Navigation
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
Home Community Partnerships Steps to Protect against Nation State Attacks
Become a Member

Log in

  • Upcoming Events
  • Resource Center
  • Tools
  • Webcasts
  • Contaminant Databases
  • Directory
  • About
  • Log in

  • My Account

  • Logout

  • Report Incident
  • Contact Us
  • NRWA Signup
  • WaterISAC Champions
More Resources

Steps to Protect against Nation State Attacks

Author: Charles Egli

Created: Tuesday, December 15, 2020 - 18:23

Categories: Cybersecurity

With the recent, high-profile cyber incidents involving FireEye and SolarWinds, Microsoft has shared information and issued guidance about increased activities from a sophisticated threat actor that is focused on high value targets such as government agencies and cybersecurity companies. It notes that while it isn’t sharing any details specific to individual organizations, it is important to share greater detail about some of the threat activity it has uncovered over the past weeks, along with guidance that security industry practitioners can use to find and mitigate potential malicious activity. Microsoft notes that while some elements aren’t present in every attack, they are generally part of the toolkit of the threat actor. These techniques include an attacker gaining a foothold in the network through malicious code and elevating credentials, using administrative permissions acquired through an on-premises compromise to gain access to an organization’s trusted SAML token- signing certificate, and adding their own credentials to existing application service principals, among other techniques and details. Microsoft adds it is also actively looking for indicators in the Microsoft environment and, to date, has not found evidence of a successful attack. Read the blog at Microsoft.

Related Resources

(TLP:CLEAR) FIRESTARTER Backdoor and Updated Emergency Directive for CISCO Firepower and Secure Firewall Devices

Apr 23, 2026 in Cybersecurity, Federal & State Resources, Security Preparedness
Members Only

(TLP:GREEN) FBI FLASH – Newly Observed Ransomware Variant Black Shrantac Threat to U.S. Entities

Apr 23, 2026 in Cybersecurity, Federal & State Resources, Security Preparedness
Members Only

(TLP:AMBER+STRICT) Likely PRC State-Sponsored Activity Observed in the Water Sector – DocuSign Phishing Tactics Identified

Apr 23, 2026 in Cybersecurity, Federal & State Resources, Security Preparedness

Become a Member
FAQs
About
Report Incident

Terms & Conditions
Privacy Policy
AI Policy
Contact Us

LinkedIn

1250 I Street NW, Suite 350
Washington, DC 20005
1-866-H2O-ISAC (1-866-426-4722)
© 2026 WaterISAC. All Rights Reserved.

Toggle the Widgetbar