Article Details
Scrape Timestamp (UTC): 2024-04-17 17:10:27.304
Original Article Text
Click to Toggle View
Russian Sandworm hackers pose as hacktivists in water utility breaches. The Sandworm hacking group associated with Russian military intelligence has been hiding attacks and operations behind multiple online personas posing as hacktivist groups. According to Mandiant, the threat actor is linked to at least three Telegram channels that were used to amplify the group's activity by creating narratives in favor of Russia. Sandworm - a.k.a. BlackEnergy, Seashell Blizzard, Voodoo Bear, has been active since at least 2009, with multiple governments attributing its operations to Unit 74455, the Main Centre for Special Technologies (GTsST) within the Main Directorate of the General Staff of the Armed Forces of the Russian Federation (GU), better known as the Main Intelligence Directorate (GRU). The adversary is highly adaptive and relies on both common initial access methods like phishing and credential harvesting as well as exploiting known vulnerabilities and supply-chain compromise. Mandiant has started tracking the group as APT44 and notes that it "has established itself as Russia’s preeminent cyber sabotage unit." Since Russia invaded Ukraine a little over two years ago, Sandworm began using online personas for data leaks and disruptive operations. In a report today, Mandiant says that Sandworm relied on three main hacktivist-branded Telegram channels named XakNet Team, CyberArmyofRussia_Reborn, and Solntsepek, all operating in parallel and independently of one another. It is unclear how much control the threat actor had over these identities but Google's Threat Analysis Group found in the case of CyberArmyofRussia_Reborn the closest operational relationship. Google TAG found that the seemingly hacktivist group's YouTube channel had been created from infrastructure attributed to Sandworm/APT44. Additionally, "Mandiant has observed known APT44 infrastructure used to exfiltrate data from victims later leaked in the CyberArmyofRussia_Reborn Telegram channel, as well as egress to Telegram in close temporal proximity to the persona’s posted claims." At one point, an error on APT44's part resulted in CyberArmyofRussia_Reborn claiming on their channel an attack that APT44 had not yet carried out. Although most of the attack-and-leak activity that Mandiant attributed to the GRU and involved Telegram personas centered on Ukrainian entities, CyberArmyofRussia_Reborn claimed attacks on water utilities in the U.S. and Poland, and a hydroelectric facility in France. In both cases, the "hacktivists" published videos and screenshots showing control of operational technology assets. Mandiant notes that while it can't verify these intrusions, officials at the impacted utilities in the U.S. confirmed incidents and malfunctions at organizations that CyberArmyofRussia_Reborn claimed to have breached. The Solntsepek channel had leaked personally identifiable information from Ukrainian military and security personnel before a rebrand to "hacker group" in 2023, when it started to take credit for APT44 disruptive cyberattacks. "Beyond a crude attempt to maximize its operational impact, we assess that these follow-on information operations are likely intended by APT44 to serve multiple wartime objectives," explains Mandiant in the report. "These aims include priming the information space with narratives favorable to Russia, generating perceptions of popular support for the war for domestic and foreign audiences, and making the GRU’s cyber capabilities appear more potent through exaggerated claims of impact" - Mandiant The war in Ukraine made Sandworm notorious for launching multi-faceted attacks aimed at causing damage to the country's critical infrastructure and services, including state networks, telecommunications providers, news media, and the power grid. During that period, the Russian hackers employed a range of wiper malware to erase data beyond recovery. It appears that Sandworm has moved focus, if only temporary, from sabotage attacks in Ukraine to espionage and influence-focused operations to change domestic and foreign perception about Russian hacktivist's power and GRU's cyber capabilities. APT44's activity this year Mandiant's report elaborates on APT44's use of a rich malware set, phishing campaigns, and vulnerability exploitation for initial access and sustained operations within targeted networks, offering several specific case studies: Mandiant warns that based on APT44's patterns of activity, there's a very high chance that the group will attempt to interfere with upcoming national elections and other significant political events in various countries, including the U.S. However, researchers believe that Ukraine will continue to be the threat actor's primary focus for as long as the war continues. At the same time, Sandworm is versatile enough for running operations for global-level strategic objectives.
Daily Brief Summary
Sandworm, linked to Russian military intelligence, disguises its cyber activities under false hacktivist personas.
Mandiant identifies three associated Telegram channels utilized by Sandworm to amplify pro-Russia narratives.
The group, known for cyber sabotage since 2009, employs phishing, exploits, and supply chain attacks for initial access.
Recent shifts show Sandworm using fake online identities for data breaches and disruptive actions, notably since the onset of the Russia-Ukraine conflict.
Google's analysis indicates that the hacktivist group CyberArmyofRussia_Reborn shares infrastructure with Sandworm, enhancing credibility suspicions.
Reported breaches by this persona include attacks on utilities in the U.S., Poland, and a French hydroelectric facility, alongside leaking sensitive Ukrainian personnel data.
Mandiant suggests these operations aim to influence public perception and showcase exaggerated cyber capabilities of Russia's GRU.
APT44, another name for Sandworm, is poised to potentially disrupt upcoming elections and continue prioritizing Ukrainian targets amidst the ongoing war.