JAR said:
DISCLAIMER: This report is provided “as is” for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within
Page 1: https://www.us-cert.gov/sites/default/files/publications/JAR_16-20296A_GRIZZLY%20STEPPE-2016-1229.pdf
The report begins by stating that they don't stand by the information contained in the report. They're not confident in the assessment and/or they're unwilling to guarantee the accuracy of the information presented.
JAR said:
RIS actors conducted damaging and/or disruptive cyber-attacks, including attacks on critical infrastructure
Page 1: https://www.us-cert.gov/sites/default/files/publications/JAR_16-20296A_GRIZZLY%20STEPPE-2016-1229.pdf
This is significant in that such an interpretation allows the US government to strike against Russia as though the Russians had attacked and damaged any other "critical infrastructure" of the United States.
JAR said:
Yara Signature rule PAS_TOOL_PHP_WEB_KIT { meta: description = "PAS TOOL PHP WEB KIT FOUND" strings: $php = "<?php" $base64decode = /\='base'\.\(\d+\*\d+\)\.'_de'\.'code'/ $strreplace = "(str_replace(" $md5 = ".substr(md5(strrev(" $gzinflate = "gzinflate" $cookie = "_COOKIE" $isset = "isset" condition: (filesize > 20KB and filesize < 22KB) and #cookie == 2 and #isset == 3 and all of them }
Page 5: https://www.us-cert.gov/sites/default/files/publications/JAR_16-20296A_GRIZZLY%20STEPPE-2016-1229.pdf
The report indicates that this tool was detected on the machines in question following investigation. Further, the suggestion is that this adds weight to the probability of Russian involvement, because that tool is very popular among Russian hackers. However, that tool is also very popular among Ukrainian hackers. Where, Ukraine has spent the past several years attempting to gain western and especially American support in its competition with Russia. One might then conclude that Ukraine infiltrated the machines in question, and utilized this tool specifically for the purpose of incriminating Russia, in order to gain additional support from America and to apply additional pressure to its nemesis, Russia. After all, western and also American support for Kiev was waning. Kiev was concerned western sanctions against Russia may cease in the near future, which Biden directly suggested to them, where now we observe the continuance of western and American sanctions, as well as the addition of new sanctions and new pressures against Russia.
Still, that's dubious. It doesn't matter whether or not that tool is popular in Russia or Ukraine. Anyone can acquire and utilize that tool. This incriminates no party. Yet if you wish to conclude the probability of Russian involvement is high because that tool is popular among Russian hackers, to be reasonable, one must also acknowledge that the probability of Ukrainian involvement is high because it's also popular in Ukraine. What's more: the tool isn't exclusive to government operatives. It's popularized by civilian hackers. The alleged discovery of this tool's usage soonest suggests civilian hackers, not government operatives, because civilian hackers utilize this tool regularly, and certainly more frequently than any government organization. Again, that's dubious as well. Any argument based in the demographics of the popularity of this tool is obviously fallacious, and proves nothing.
No further "evidence" was presented by JAR.