“Energetic since not less than 2021, this subgroup inside Seashell Blizzard has leveraged opportunistic entry strategies and stealthy types of persistence to gather credentials, obtain command execution, and help lateral motion that has at occasions led to substantial regional community compromises,” Microsoft stated within the report.
Seashell Blizzard’s actions align with these tracked by different safety distributors beneath numerous names, together with BE2, UAC-0133, Blue Echidna, Sandworm, PHANTOM, BlackEnergy Lite, and APT44.
Russian cyber warfare expands past Ukraine
The hacking subgroup tracked because the “BadPilot marketing campaign,” has been energetic since not less than 2021, initially specializing in Ukraine and Europe. Microsoft experiences that the operation has now prolonged its attain into North America, Central Asia, and the Center East.