15 June 2023

New Russia’s GRU-affiliated APT group linked to destructive wiper attacks on Ukraine


New Russia’s GRU-affiliated APT group linked to destructive wiper attacks on Ukraine

Microsoft’s threat intelligence team has released a report linking destructive WisperGate wiper attacks that targeted Ukrainian government organizations to Cadet Blizzard (formerly DEV-0586), a Russian state-sponsored threat actor associated with the Russian General Staff Main Intelligence Directorate (GRU).

Besides WisperGate data-wiping attacks that started on January 13, 2022, more than a month before Russia invaded Ukraine, the group was also behind a series of defacements of several Ukrainian organization websites, as well as multiple operations, including the hack-and-leak forum known as “Free Civilian.”

Microsoft says that Cadet Blizzard’s operations are separate from other known and well-established GRU-linked hacker groups like Forest Blizzard (Strontium) and Seashell Blizzard (Iridium). It also notes that the group’s campaigns are less prolific in both scale and scope with a lower degree of operational security.

The threat actor is said to have been active since at least 2020, mainly focusing on destructive attacks, espionage, and information operations in regionally significant areas.

“Cadet Blizzard’s operations are global in scope but consistently affect regional hotspots in Ukraine, Europe, Central Asia, and, periodically, Latin America. Cadet Blizzard likely prioritizes target networks based on requirements consistent with Russian military or intelligence objectives such as geolocation or perceived impact,” Microsoft said.

The threat actor breaches and maintains a foothold on affected networks for months, often exfiltrating data prior to disruptive actions. The group uses living-off-the-land techniques after gaining initial access to move laterally through the network, collect credentials and other data, and deploy persistence mechanisms and techniques that allow them to evade detection.

The group gains initial access by exploiting vulnerabilities in web servers commonly found on network perimeters. Cadet Blizzard is also known for exploiting Confluence servers via the CVE-2021-26084 flaw, Exchange servers through multiple bugs including CVE-2022-41040 and ProxyShell (CVE-2021-34473, CVE-2021-34523 and CVE-2021-31207), and security issues in various open-source platforms such as content management systems.

While other Russia-linked state-backed hacker groups prefer to remain undetected, Cadet Blizzard’s operations are extremely disruptive likely meant to be public signals to their targets to achieve the larger objective of destruction, disruption, and possibly, intimidation, Microsoft noted.

Back to the list

Latest Posts

Cyber Security Week in Review: September 6, 2024

Cyber Security Week in Review: September 6, 2024

In brief: the US charges Russian GRU hackers for attacks on Ukraine, Apache, Cisco, Zyxel patch high-risk flaws, Google fixes Android zero-day, and more.
6 September 2024
Threat actors using MacroPack Red Team framework to deploy Brute Ratel, Havoc and PhantomCore

Threat actors using MacroPack Red Team framework to deploy Brute Ratel, Havoc and PhantomCore

Some of the documents appeared to be part of legitimate Red Team exercises, while other were intended for malicious purposes.
5 September 2024
US seizes 32 domains linked to Russian Doppelganger influence campaign

US seizes 32 domains linked to Russian Doppelganger influence campaign

The domains, used to disseminate propaganda, were seized as part of a broader effort to disrupt Russia’s attempts to interfere in the 2024 US Presidential Election.
5 September 2024