Security Experts:

Connect with us

Hi, what are you looking for?



Microsoft Disrupts Infrastructure Used by Russia’s Hackers in Ukraine Attacks

Microsoft on Thursday said it has attempted to disrupt cyberattacks launched by the Russian government against Ukraine by seizing some of the domains leveraged by a notorious state-sponsored threat group.

Microsoft on Thursday said it has attempted to disrupt cyberattacks launched by the Russian government against Ukraine by seizing some of the domains leveraged by a notorious state-sponsored threat group.

Microsoft said it seized seven domains used by the group known as Strontium, APT28, Fancy Bear, Pawn Storm, Sednit, and Tsar Team. The cyberespionage group, linked to Russia’s GRU military intelligence service, has conducted operations targeting many organizations around the world over the past years.

The tech giant obtained a court order on April 6 that allowed it to sinkhole the domains, which had allegedly been used to target media and other organizations in Ukraine. Government institutions and think tanks in the US and the EU — particularly ones involved in foreign policy — were also targeted, the company said.

“We believe Strontium was attempting to establish long-term access to the systems of its targets, provide tactical support for the physical invasion and exfiltrate sensitive information,” Microsoft explained.

The company has observed nearly all of Russia’s state-sponsored groups launching what it described as a “full-scale offensive against Ukraine’s government and critical infrastructure.”

Microsoft claims to have seized more than 100 domains used by Strontium since 2016, after establishing a legal process that enables it to quickly obtain court orders.

The news comes just days after the US government announced that it had neutralized Cyclops Blink, a massive botnet believed to be controlled by Russia’s GRU. The botnet, powered by hacked firewall appliances and SOHO networking devices, was allegedly disabled in March, when authorities targeted its command and control (C&C) infrastructure.

The US government has issued several warnings regarding Russian cyber threats since the conflict with Ukraine started to escalate in late 2021.

Fears of Russian attacks have also resulted in new legislation aimed at strengthening the cybersecurity of US critical infrastructure and government networks.

Related: Russian Cyberspies Again Target Sporting, Anti-Doping Organizations

Related: Russian Military Hackers Targeted Credentials at Hundreds of Organizations in US, UK

Related: Sophisticated Threat Actor Targets Governments, Defense Industry in Western Asia

Related: Russians Used Brute Force Attacks Against Hundreds of Orgs

Written By

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.


Zendesk is informing customers about a data breach that started with an SMS phishing campaign targeting the company’s employees.


The release of OpenAI’s ChatGPT in late 2022 has demonstrated the potential of AI for both good and bad.

Data Breaches

GoTo said an unidentified threat actor stole encrypted backups and an encryption key for a portion of that data during a 2022 breach.


Websites of German airports, administration bodies and banks were hit by DDoS attacks attributed to Russian hacker group Killnet


A new study by McAfee and the Center for Strategic and International Studies (CSIS) named a staggering figure as the true annual cost of...

Malware & Threats

Microsoft plans to improve the protection of Office users by blocking XLL add-ins from the internet.


The FBI dismantled the network of the prolific Hive ransomware gang and seized infrastructure in Los Angeles that was used for the operation.