<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Christmas Eve &#8211; РИСК-АКАДЕМИЯ &#8211; АНО ДПО ИСАР</title>
	<atom:link href="https://risk-academy.ru/tag/christmas-eve/feed/" rel="self" type="application/rss+xml" />
	<link>https://risk-academy.ru</link>
	<description>Управление рисками, риск менеджмент, обучение по управлению рисками, тренинг риск менеджмент</description>
	<lastBuildDate>Sun, 26 Jul 2020 14:21:47 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://raruswebsite.s3.amazonaws.com/wp-content/uploads/2018/02/10213225/cropped-favicon-32x32.png</url>
	<title>Christmas Eve &#8211; РИСК-АКАДЕМИЯ &#8211; АНО ДПО ИСАР</title>
	<link>https://risk-academy.ru</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Fancy Bear snuffles at the US energy sector. US indicts two Chinese hackers. Threats to industrial control systems.</title>
		<link>https://risk-academy.ru/fancy-bear-snuffles-at-the-us-energy-sector-us-indicts-two-chinese-hackers-threats-to-industrial-control-systems/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Sun, 26 Jul 2020 14:21:44 +0000</pubDate>
				<category><![CDATA[Cyber Risks]]></category>
		<category><![CDATA[Joe Slowik]]></category>
		<category><![CDATA[Russia]]></category>
		<category><![CDATA[United States]]></category>
		<category><![CDATA[Federal Bureau of Investigation]]></category>
		<category><![CDATA[GRU]]></category>
		<category><![CDATA[energy entity]]></category>
		<category><![CDATA[threat actor]]></category>
		<category><![CDATA[energy sector]]></category>
		<category><![CDATA[Department of Energy]]></category>
		<category><![CDATA[Christmas Eve]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/fancy-bear-snuffles-at-the-us-energy-sector-us-indicts-two-chinese-hackers-threats-to-industrial-control-systems/</guid>

					<description><![CDATA[By the CyberWire staff Fancy Bear shows interest in the US energy sector. WIRED reports that APT28 (also known as Fancy Bear), a unit of Russia&#8217;s GRU military intelligence agency, [&#8230;]]]></description>
										<content:encoded><![CDATA[<div>
<p>By <!-- -->the CyberWire staff</p>
<div class="text" id="summary-text1">
<h3>Fancy Bear shows interest in the US energy sector.</h3>
<p>WIRED reports that APT28 (also known as Fancy Bear), a unit of Russia&#8217;s GRU military intelligence agency, has been running &#8220;a broad hacking campaign against US targets&#8221; from December 2018 until at least May 2020. An FBI notification obtained by WIRED stated that the threat actor has been targeting &#8220;a wide range of US based organizations, state and federal government agencies, and educational institutions.&#8221; The FBI didn&#8217;t disclose which entities were targeted, but researchers at Dragos observed that one of APT28&#8217;s IP addresses listed in the alert also appeared in a Department of Energy advisory issued earlier this year. That advisory said the IP address had been used to probe login portals belonging to a US energy entity on Christmas Eve last year.</p>
<p>WIRED notes that, while another GRU unit (tracked as &#8220;Sandworm&#8221;) has historically been very active against the energy sector, APT28 hasn&#8217;t previously focused on this area. Dragos&#8217;s Joe Slowik told the publication, &#8220;Just given what we understand about how APT28 operates and its typical victimology, identifying that group interacting with the US energy sector would&#8230;</p>
</div>
</div>
<p><a href="https://thecyberwire.com/newsletters/week-that-was/4/29">Read More&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
