Welcome to the community hub built on top of the Sandworm (hacker group) Wikipedia article.
Here, you can discuss, collect, and organize anything related to Sandworm (hacker group). The
purpose of the hub...
On 3 September 2014 iSIGHT Partners (now Mandiant) discovered a spear-phishing campaign exploiting a zero-day vulnerability via weaponized Microsoft Office documents. The vulnerability, dubbed CVE-2014-4114, affected all versions of Windows from Vista to 8.1 and allowed attackers to execute arbitrary code on a target machine. Researchers were able to attribute the attack to the Sandworm group and observed that the Ukrainian government was one target of the campaign. Notably, this attack coincided with a NATO summit on Ukraine in Wales.[15]
On 23 December 2015, hackers launched a coordinated cyberattack against 3 energy companies in Ukraine and succeeded in temporarily disrupting the supply of electricity to about 230,000 Ukrainians for 1-6 hours.
In January, iSight Partners released a report linking the attack to Sandworm based on the usage of BlackEnergy 3. [16]
On 17 December 2016, a year after the previous power grid attack, hackers again disrupted the Ukrainian power grid with a cyber attack. About one fifth of Kyiv lost power for an hour. While the outage was ultimately short, a report released 3 years after the attack by security firm Dragos outlines a theory that the malware, known as Industroyer or CRASHOVERRIDE, was meant to destroy physical electrical equipment. By exploiting a known vulnerability in the protective relays, the malware may have been designed to obfuscate any safety issues such that when engineers worked to restore power, an overload of current would be sent to destroy transformers or power lines. Such destruction would have potentially harmed utility workers as well as led to a much longer power outage if it had succeeded. [17]
On 9 February 2018 during the opening ceremony of the Winter Olympics in Pyeongchang, South Korea hackers launched a cyberattack and successfully disrupted IT infrastructure including WiFi, televisions around the Pyeongchang Olympic Stadium showing the ceremony, RFID-based security gates, and the official Olympics app which was used for digital ticketing. Staff were able to restore most critical functions before the opening ceremony was over, but the entire network had to be rebuilt from scratch. Wiper malware had wormed through every domain controller and rendered them inoperable.[13]
3 days later Cisco Talos published a report dubbing the malware "Olympic Destroyer." The report listed similarities in the malware's propagation techniques to the "BadRabbit" and "Nyetya" malware strains and stated disruption of the games as the attack's objective.[18]
Attribution of the Olympic Destroyer malware proved difficult as it appeared the author(s) had included code samples belonging to multiple threat actors as false flags. Intezer published a report on 12 February showing code similarities to samples attributed to 3 Chinese threat actors while a follow-up Talos report noted a "weak" clue pointing to another wiper created by a spinoff of the Lazarus Group, a North Korean APT.[19][20]
The Kaspersky GReAT team on 8 March published 2 blog posts discussing the current industry theories and their own original research. In the technical article Kaspersky, a Russian company, showed in detail how they discovered file headers pointing to Lazarus Group were forged but stopped short of attributing the Olympic Destroyer malware to any non-North Korean group.[21][22]
Following his expulsion from the Netherlands in April 2018 on suspicion of preparing cyberattacks on the assets of the Organisation for the Prohibition of Chemical Weapons (OPCW), GRU Colonel Yevgeny Mikhailovich (or Mikhaylovich) Serebryakov (or Serebriakov) (Russian: Евгений Михайлович Серебряков born 26 July 1981, Kursk, USSR) allegedly later headed Sandworm.[23][24][25][26][27] On 4 October 2018, Evgenii Mikhaylovich Serebriakov was indicted for his support in numerous GRU operations.[28][a]
FBI wanted poster listing 6 Russian military officers indicted for cyber crimes.
On 19 October 2020, a US-based grand jury released an indictment charging six alleged Unit 74455 officers with cybercrimes.[29][30][31] The officers, Yuriy Sergeyevich Andrienko, Sergey Vladimirovich Detistov, Pavel Valeryevich Frolov, Anatoliy Sergeyevich Kovalev, Artem Valeryevich Ochichenko, and Petr Nikolayevich Pliskin, were all individually charged with conspiracy to conduct computer fraud and abuse, conspiracy to commit wire fraud, wire fraud, damaging protected computers, and aggravated identity theft. Five of the six were accused of overtly developing hacking tools, while Ochichenko was accused of participating in spearphishing attacks against the 2018 Winter Olympics and conducting technical reconnaissance on and attempting to hack the official domain of the Parliament of Georgia.[6][b]
Concurrent with the US indictment announcement, the UK's National Cyber Security Centre (NCSC) published a report which publicly associated Sandworm with the 2018 Winter Olympics attack.[2]
On 28 May 2020 the National Security Agency published a cybersecurity advisory warning that the Sandworm group was actively exploiting a remote code execution vulnerability (referred to as CVE-2019-10149) in Exim[38] to gain full control of mail servers.[39] At the time the advisory was published, an updated version of Exim had been available for a year and the NSA urged administrators to patch their mail servers.[citation needed]
In February 2022, Sandworm allegedly released the Cyclops Blink as malware. The malware is similar to VPNFilter.[40] The malware allows a botnet to be constructed, and affects Asus routers and WatchGuard Firebox and XTM appliances. CISA issued a warning about this malware.[41]
In April 2022, Sandworm attempted a power blackout in Ukraine.[43] It is said to be the first attack in five years to use an Industroyer malware variant called Industroyer2.[44]
On 31 August 2023, the cybersecurity agencies of the US, UK, Canada, Australia, and New Zealand (collectively known as Five Eyes) jointly published a report on a new malware campaign and attributed it to Sandworm. The malware, dubbed "Infamous Chisel", targeted Android devices used by the Ukrainian military. After initial infection, the malware establishes persistent access then periodically collects and exfiltrates data from the compromised device. Collected information includes:
finance - Binance, PayPal, Trust Wallet, Google Wallet
Applications specific to the Ukrainian military
The malware also periodically collects open ports and banners of services running on other hosts on the local network. Additionally, an SSH server is created and configured to run as a Tor hidden service. An attacker could then connect remotely to the infected device without revealing their true IP address.[46]
The name "Sandworm" was dubbed by researchers at iSight Partners (now Mandiant) due to references in the malware source code to Frank Herbert's novel Dune.[47]
In 2024, given the active and persistent threats Sandworm posed to governments and critical infrastructure operators globally, Mandiant "graduated" Sandworm into an APT group, dubbing it APT44.[4]
^GRU officers indicted by the United States Department of Justice on 4 October 2018 include Oleg Mikhaylovich Sotnikov, 46, and Alexey Valerevich Minin, 46 and Military Unit 26165 personel Aleksei Sergeyevich Morenets, 41, Evgenii Mikhaylovich Serebriakov, 37, Ivan Sergeyevich Yermakov, 32, Artem Andreyevich Malyshev, 30, and Dmitriy Sergeyevich Badin, 27.[28] Military Unit 26165 is also known the GRU headquarters and is located at 20 Komsomolsky Prospekt in Moscow.[24]
^ The United States Department of StateDiplomatic Security Service: Rewards for Justice is offering a reward of up to $10 million for information leading to the identification or location of the GRU officers Petr Nikolayevich Pliskin (Russian: Петр Николаевич Плискин), Artem Valeryevich Ochichenko (Russian: Артем Валерьевич Очиченко), Anatoliy Sergeyevich Kovalev (Russian: Анатолий Сергеевич Ковалев), Pavel Valeryevich Frolov (Russian: Павел Валерьевич Фролов), Sergey Vladimirovich Detistov (Russian: Сергей Владимирович Детистов) and Yuriy Sergeyevich Andrienko (Russian: Юрий Сергеевич Андриенко) of the Main Center for Technologies Special Forces of the GRU Russian Ground Forces (Unit 74455) which is associated with "Sandworm Team," Telebots," "Voodoo Bear," and "Iron Viking."[32][33][34][35][36][37]
^Greenberg, Andy (2019). Sandworm: a new era of cyberwar and the hunt for the Kremlin's most dangerous hackers. Knopf Doubleday. ISBN978-0-385-54441-2.