New Blog Post | ACTINIUM targets Ukrainian organizations

%3CLINGO-SUB%20id%3D%22lingo-sub-3131064%22%20slang%3D%22en-US%22%3ENew%20Blog%20Post%20%7C%20ACTINIUM%20targets%20Ukrainian%20organizations%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-3131064%22%20slang%3D%22en-US%22%3E%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22picture.png%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F345925iA0DB5AAD23099B36%2Fimage-size%2Flarge%3Fv%3Dv2%26amp%3Bpx%3D999%22%20role%3D%22button%22%20title%3D%22picture.png%22%20alt%3D%22picture.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fsecurity%2Fblog%2F2022%2F02%2F04%2Factinium-targets-ukrainian-organizations%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EACTINIUM%20targets%20Ukrainian%20organizations%20-%20Microsoft%20Security%20Blog%3C%2FA%3E%3C%2FP%3E%0A%3CP%3EThe%20Microsoft%20Threat%20Intelligence%20Center%20(MSTIC)%20is%20sharing%20information%20on%20a%20threat%20group%20named%20ACTINIUM%2C%20which%20has%20been%20operational%20for%20almost%20a%20decade%20and%20has%20consistently%20pursued%20access%20to%20organizations%20in%20Ukraine%20or%20entities%20related%20to%20Ukrainian%20affairs.%20MSTIC%20previously%20tracked%20ACTINIUM%20activity%20as%20DEV-0157%2C%20and%20this%20group%20is%20also%20referred%20to%20publicly%20as%20Gamaredon.%3C%2FP%3E%0A%3CP%20class%3D%22%22%3EIn%20the%20last%20six%20months%2C%20MSTIC%20has%20observed%20ACTINIUM%20targeting%20organizations%20in%20Ukraine%20spanning%20government%2C%20military%2C%20non-government%20organizations%20(NGO)%2C%20judiciary%2C%20law%20enforcement%2C%20and%20non-profit%2C%20with%20the%20primary%20intent%20of%20exfiltrating%20sensitive%20information%2C%20maintaining%20access%2C%20and%20using%20acquired%20access%20to%20move%20laterally%20into%20related%20organizations.%20MSTIC%20has%20observed%20ACTINIUM%20operating%20out%20of%20Crimea%20with%20objectives%20consistent%20with%20cyber%20espionage.%20The%20Ukrainian%20government%20has%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3CA%20href%3D%22https%3A%2F%2Fssu.gov.ua%2Fuploads%2Ffiles%2FDKIB%2FTechnical%2520report%2520Armagedon.pdf%22%20target%3D%22_blank%22%20rel%3D%22nofollow%20noopener%20noreferrer%22%3Epublicly%20attributed%20this%20group%3C%2FA%3E%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3Eto%20the%20Russian%20Federal%20Security%20Service%20(FSB).%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-LABS%20id%3D%22lingo-labs-3131064%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3ECloud%20Security%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EThreat%20Protection%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E
Microsoft

picture.png

ACTINIUM targets Ukrainian organizations - Microsoft Security Blog

The Microsoft Threat Intelligence Center (MSTIC) is sharing information on a threat group named ACTINIUM, which has been operational for almost a decade and has consistently pursued access to organizations in Ukraine or entities related to Ukrainian affairs. MSTIC previously tracked ACTINIUM activity as DEV-0157, and this group is also referred to publicly as Gamaredon.

In the last six months, MSTIC has observed ACTINIUM targeting organizations in Ukraine spanning government, military, non-government organizations (NGO), judiciary, law enforcement, and non-profit, with the primary intent of exfiltrating sensitive information, maintaining access, and using acquired access to move laterally into related organizations. MSTIC has observed ACTINIUM operating out of Crimea with objectives consistent with cyber espionage. The Ukrainian government has publicly attributed this group to the Russian Federal Security Service (FSB).

0 Replies