ABOUT NPCC Contact Us Governance & Corporate Membership News Careers Links PROGRAM AREAS Standards & Criteria Compliance RAPA SAIS COMMITTEES DER Forum Gov/Reg Affairs Reliability Coordinating Regional Standards LIBRARY About Publications Reports Resource Adequacy Miscellaneous Search SIGN IN
 

NPCC Security Bulletin: E-ISAC Ransomware Attack Techniques

Posted: 10/13/2021

TLP: WHITE

October 13, 2021

NPCC is publishing this security bulletin to engage and inform NPCC entities on aspects of Bulk Power System security and reliability.

E-ISAC Ransomware Attack Techniques

E-ISAC has released a TLP Green Ransomware Attack Techniques Document

Document Access:  To access the document login to the E-ISAC Portal

TRAFFIC LIGHT PROTOCOL (TLP) Green Restrictions: Recipients may share TLP: GREEN information with peers and partner organizations within their sector or community, but not via publicly accessible channels. Information in this category can be circulated widely within a particular community. TLP: GREEN information may not be released outside of the community.

Document Key Topics:

  • Reoccurring or common intrusion vulnerabilities
  • Threat classification and detection models
  • Adversary Tactics, Techniques, and Procedures (TTPs)
  • Analysis of software employed by identified Advanced Persistent Threats (APTs)
  • Ransomware References and Resources

DOWNLOAD ATTACHMENT


Security Notice

This is a Northeast Power Coordinating Council, Inc. (NPCC) information system. You have no reasonable expectation of privacy regarding communications or data transiting or stored on NPCC’s information system. At any time and for any lawful purpose, NPCC may monitor, intercept, record, and search any communications or data transiting or stored on this information system. At NPCC’s sole discretion, NPCC may disclose pertinent information to the U.S. Government and its authorized representatives to protect the security of critical infrastructure and key resources, ensure information security, or to comply with any applicable law, regulation, legal process, or enforceable governmental request. By continuing, you acknowledge that you understand and consent to the terms and conditions described in this notice. The actual or attempted unauthorized access, use, or modification of this system is strictly prohibited and may subject violators to criminal, civil, and/or administrative action.