Now on Demand Ransomware Resilience & Recovery Summit - All Sessions Available
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cybercrime

Microsoft Disrupts Infrastructure Used by Russia’s Hackers in Ukraine Attacks

Microsoft on Thursday said it has attempted to disrupt cyberattacks launched by the Russian government against Ukraine by seizing some of the domains leveraged by a notorious state-sponsored threat group.

Microsoft on Thursday said it has attempted to disrupt cyberattacks launched by the Russian government against Ukraine by seizing some of the domains leveraged by a notorious state-sponsored threat group.

Microsoft said it seized seven domains used by the group known as Strontium, APT28, Fancy Bear, Pawn Storm, Sednit, and Tsar Team. The cyberespionage group, linked to Russia’s GRU military intelligence service, has conducted operations targeting many organizations around the world over the past years.

The tech giant obtained a court order on April 6 that allowed it to sinkhole the domains, which had allegedly been used to target media and other organizations in Ukraine. Government institutions and think tanks in the US and the EU — particularly ones involved in foreign policy — were also targeted, the company said.

“We believe Strontium was attempting to establish long-term access to the systems of its targets, provide tactical support for the physical invasion and exfiltrate sensitive information,” Microsoft explained.

The company has observed nearly all of Russia’s state-sponsored groups launching what it described as a “full-scale offensive against Ukraine’s government and critical infrastructure.”

Microsoft claims to have seized more than 100 domains used by Strontium since 2016, after establishing a legal process that enables it to quickly obtain court orders.

The news comes just days after the US government announced that it had neutralized Cyclops Blink, a massive botnet believed to be controlled by Russia’s GRU. The botnet, powered by hacked firewall appliances and SOHO networking devices, was allegedly disabled in March, when authorities targeted its command and control (C&C) infrastructure.

The US government has issued several warnings regarding Russian cyber threats since the conflict with Ukraine started to escalate in late 2021.

Advertisement. Scroll to continue reading.

Fears of Russian attacks have also resulted in new legislation aimed at strengthening the cybersecurity of US critical infrastructure and government networks.

Related: Russian Cyberspies Again Target Sporting, Anti-Doping Organizations

Related: Russian Military Hackers Targeted Credentials at Hundreds of Organizations in US, UK

Related: Sophisticated Threat Actor Targets Governments, Defense Industry in Western Asia

Related: Russians Used Brute Force Attacks Against Hundreds of Orgs

Written By

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

MSSP Dataprise has appointed Nima Khamooshi as Vice President of Cybersecurity.

Backup and recovery firm Keepit has hired Kim Larsen as CISO.

Professional services company Slalom has appointed Christopher Burger as its first CISO.

More People On The Move

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Cybercrime

A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...

Cybercrime

The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.

Cybercrime

As it evolves, web3 will contain and increase all the security issues of web2 – and perhaps add a few more.

CISO Strategy

SecurityWeek spoke with more than 300 cybersecurity experts to see what is bubbling beneath the surface, and examine how those evolving threats will present...

Cybercrime

Luxury retailer Neiman Marcus Group informed some customers last week that their online accounts had been breached by hackers.

CISO Conversations

Joanna Burkey, CISO at HP, and Kevin Cross, CISO at Dell, discuss how the role of a CISO is different for a multinational corporation...