The Sandworm team that began activity in 2009.
AKA – Voodoo Bear, Black Energy, Quedagh, TeleBots, Electrum
Pro-Russia hackers, either state sponsored, state-motivated
Targets:
Ukrainian Government
Energy
Media
Telecom Companies
Academic Institutions
Industrial Control Systems
Supervisory Control and Data Acquisition (SCADA)
Defense Industry, Govt in US, POLAND, other NATO
OBJECTIVES:
Gather Intelligence-Harvest SSL Keys
NOTABLE EVENTS
2010 – BlackEnergy2 used against industrial control networks in Ukraine
2014 – BlackEnergy2 U.S. critical infrastructure
2015-2016 – Two cyberattacks resulting in blackouts-BlackEnergy3
Prykarpattyaoblenergo
2015 – Attacks on new companies during Ukrainian 2015 elections
2015 – Attacks on Ukrainian government organizations, railway firms, media outlets,
2017 – malware, disguised as ransomware named NotPetya, infrastructure and attack patterns matched previous Sandworms.
Sandworm works closely with APT28 yet APT28 makes its own malware and 0DayE, Sandworm uses open purchase items.
TURLA
Another group associated with APT28 is Turla
Also known as Snake, Uroburos, Venomous Bear, Waterbug
Targets:
Government
Military
Education
Research
Pharmaceutical Sectors
Windows environment, but sometimes Linux targets
METHODS/TACTICS
Watering Hole sites
Spear Phishing
Know victims:
U.S. Department of Defense, 2008
Two European Foreign Offices
Defense Contractors
Germany’s Federal Foreign Office
Germany’s Federal College and Public Administration
CYBERBERKUT
Pro-Russian Ukrainian hactivists, supposedly – UK thinks it is really GRU