This joint advisory is the result of a collaborative research effort by the cybersecurity authorities of five nations: Australia, Canada, New Zealand, the United Kingdom, and the United States. It highlights technical approaches to uncovering malicious activity and includes mitigation steps according to best practices.
When addressing potential incidents and applying best practice incident response procedures:
First, collect and remove for further analysis:
- relevant artifacts
- logs, and
Next, implement mitigation steps that avoid tipping off the adversary that their presence in the network has been discovered.
Finally, consider soliciting incident response support from a third-party IT security organisation to:
- provide subject matter expertise and technical support to the incident response
- ensure that the actor is eradicated from the network, and
- avoid residual issues that could result in follow-up compromises once the incident is closed.