Microsoft on Thursday said it has attempted to disrupt cyberattacks launched by the Russian government against Ukraine by seizing some of the domains leveraged by a notorious state-sponsored threat group.
Microsoft said it seized seven domains used by the group known as Strontium, APT28, Fancy Bear, Pawn Storm, Sednit, and Tsar Team. The cyberespionage group, linked to Russia’s GRU military intelligence service, has conducted operations targeting many organizations around the world over the past years.
The tech giant obtained a court order on April 6 that allowed it to sinkhole the domains, which had allegedly been used to target media and other organizations in Ukraine. Government institutions and think tanks in the US and the EU — particularly ones involved in foreign policy — were also targeted, the company said.
“We believe Strontium was attempting to establish long-term access to the systems of its targets, provide tactical support for the physical invasion and exfiltrate sensitive information,” Microsoft explained.
The company has observed nearly all of Russia’s state-sponsored groups launching what it described as a “full-scale offensive against Ukraine’s government and critical infrastructure.”
Microsoft claims to have seized more than 100 domains used by Strontium since 2016, after establishing a legal process that enables it to quickly obtain court orders.
The news comes just days after the US government announced that it had neutralized Cyclops Blink, a massive botnet believed to be controlled by Russia’s GRU. The botnet, powered by hacked firewall appliances and SOHO networking devices, was allegedly disabled in March, when authorities targeted its command and control (C&C) infrastructure.
The US government has issued several warnings regarding Russian cyber threats since the conflict with Ukraine started to escalate in late 2021.
Fears of Russian attacks have also resulted in new legislation aimed at strengthening the cybersecurity of US critical infrastructure and government networks.
Related: Russian Cyberspies Again Target Sporting, Anti-Doping Organizations
Related: Russian Military Hackers Targeted Credentials at Hundreds of Organizations in US, UK
Related: Sophisticated Threat Actor Targets Governments, Defense Industry in Western Asia
Related: Russians Used Brute Force Attacks Against Hundreds of Orgs

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.
More from Eduard Kovacs
- ChatGPT Hallucinations Can Be Exploited to Distribute Malicious Code Packages
- AntChain, Intel Create New Privacy-Preserving Computing Platform for AI Training
- Several Major Organizations Confirm Being Impacted by MOVEit Attack
- Verizon 2023 DBIR: Human Error Involved in Many Breaches, Ransomware Cost Surges
- Google Patches Third Chrome Zero-Day of 2023
- Ransomware Group Used MOVEit Exploit to Steal Data From Dozens of Organizations
- Cybersecurity M&A Roundup: 36 Deals Announced in May 2023
- In Other News: Government Use of Spyware, New Industrial Security Tools, Japan Router Hack
Latest News
- BBC, British Airways, Novia Scotia Among First Big-Name Victims in Global Supply-Chain Hack
- Sysdig Introduces CNAPP With Realtime CDR
- Stay Focused on What’s Important
- VMware Plugs Critical Flaws in Network Monitoring Product
- Hackers Issue ‘Ultimatum’ Over Payroll Data Breach
- US, Israel Provide Guidance on Securing Remote Access Software
- OWASP’s 2023 API Security Top 10 Refines View of API Risks
- Android’s June 2023 Security Update Patches Exploited Arm GPU Vulnerability
