• Menu
  • Skip to main content
  • Skip to primary sidebar

All Tech News

Latest Technology News

Ukraine Identifies Russian FSB Officers Hacking As Gamaredon Group

You are here: Home / Cyber Security News / Ukraine Identifies Russian FSB Officers Hacking As Gamaredon Group

Ukraine’s premier law enforcement and counterintelligence agency on Thursday disclosed the serious identities of 5 people allegedly included in cyberattacks attributed to a cyber-espionage team named Gamaredon, linking the members to Russia’s Federal Security Provider (FSB).

Contacting the hacker group “an FSB special undertaking, which precisely targeted Ukraine,” the Security Assistance of Ukraine (SSU) reported the perpetrators “are officers of the ‘Crimean’ FSB and traitors who defected to the enemy during the profession of the peninsula in 2014.”

The names of the 5 people the SSU alleges are component of the covert operation are Sklianko Oleksandr Mykolaiovych, Chernykh Mykola Serhiiovych, Starchenko Anton Oleksandrovych, Miroshnychenko Oleksandr Valeriiovych, and Sushchenko Oleh Oleksandrovych.

Because its inception in 2013, the Russia-joined Gamaredon team (aka Primitive Bear, Armageddon, Winterflounder, or Iron Tilden) has been dependable for a variety of malicious phishing campaigns, principally aimed at Ukrainian establishments, with the purpose of harvesting categorized info from compromised Windows techniques for geopolitical gains.

The risk actor is believed to have carried out no less than 5,000 cyberattacks towards community authorities and critical infrastructure positioned in the state, and attempted to infect above 1,500 government computer system techniques, with most attacks directed at security, defense, and law enforcement organizations to acquire intelligence facts.

“Opposite to other APT teams, the Gamaredon group appears to make no work in attempting to continue to be below the radar,” Slovak cybersecurity company ESET observed in an analysis published in June 2020. “Even even though their applications have the capability to down load and execute arbitrary binaries that could be much stealthier, it would seem that this group’s key emphasis is to unfold as significantly and rapid as doable in their target’s network while striving to exfiltrate details.”

Aside from its major reliance on social engineering strategies as an intrusion vector, Gamaredon is known to have invested in a selection of resources for scything through organizations’ defenses that are coded in a variety of programming languages such as VBScript, VBA Script, C#, C++, as nicely as applying CMD, PowerShell, and .NET command shells.

“The group’s things to do are characterised by intrusiveness and audacity,” the company pointed out in a complex report.

Chief amongst its malware arsenal is a modular distant administration software named Pterodo (aka Pteranodon) that will come with remote entry abilities, keystroke logging, the potential to just take screenshots, entry microphone, and also download extra modules from a remote server. Also set to use is a .NET-based mostly file stealer that’s developed to gather information with the adhering to extensions: *.doc, *.docx, *.xls, *.rtf, *.odt, *.txt, *.jpg, and *.pdf.

A third instrument concerns a malicious payload that’s engineered to distribute the malware via related detachable media, in addition to accumulating and siphoning data saved in those gadgets.

“The SSU is constantly getting techniques to have and neutralize Russia’s cyber aggression in opposition to Ukraine,” the company reported. “Established as a unit of the so-called ‘FSB Office environment of Russia in the Republic of Crimea and the metropolis of Sevastopol,’ this group of persons acted as an outpost […] from 2014 purposefully threatening the correct working of point out bodies and critical infrastructure of Ukraine.”

Located this article interesting? Follow THN on Fb, Twitter  and LinkedIn to study far more distinctive content material we put up.

Some parts of this article are sourced from:
thehackernews.com

Previous Post: «AllTech.News US Offers $10m Reward to Unmask DarkSide Leaders
Next Post: Feds Offer $10 Million Bounty for DarkSide Info »

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Recent Posts

  • WordPress Sites Turned Weapon: How VexTrio and Affiliates Run a Global Scam Network
  • New TokenBreak Attack Bypasses AI Moderation with Single-Character Text Changes
  • AI Agents Run on Secret Accounts — Learn How to Secure Them in This Webinar
  • Zero-Click AI Vulnerability Exposes Microsoft 365 Copilot Data Without User Interaction
  • Non-Human Identities: How to Address the Expanding Security Risk

Copyright © 2025 · AllTech.News, All Rights Reserved.