{"id":25781,"date":"2025-02-28T10:45:05","date_gmt":"2025-02-28T18:45:05","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2025\/02\/28\/news-19502\/"},"modified":"2025-02-28T10:45:05","modified_gmt":"2025-02-28T18:45:05","slug":"news-19502","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2025\/02\/28\/news-19502\/","title":{"rendered":"A Hacker Group Within Russia\u2019s Notorious Sandworm Unit Is Breaching Western Networks"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.wired.com\/photos\/67aba991b2d9721f7e44160c\/master\/pass\/putin-tussia-hackers-sec-%202195701776.jpg\"\/><\/p>\n<p><strong>Credit to Author: Andy Greenberg| Date: Wed, 12 Feb 2025 17:00:00 +0000<\/strong><\/p>\n<p class=\"paywall\"><span class=\"lead-in-text-callout\">Over the last<\/span> decade, the Kremlin&#x27;s most aggressive cyberwar unit, known as <a href=\"https:\/\/www.wired.com\/story\/sandworm-kremlin-most-dangerous-hackers\/\">Sandworm<\/a>, has focused its hacking campaigns on tormenting Ukraine, even more so since Russian president Vladimir Putin&#x27;s full-scale invasion of Russia&#x27;s neighbor. Now Microsoft is warning that a team within that notorious hacking group has shifted its targeting, indiscriminately working to breach networks worldwide\u2014and, in the last year, has seemed to show a particular interest in networks in English-speaking Western countries.<\/p>\n<p class=\"paywall\">On Wednesday, Microsoft&#x27;s threat intelligence team published new research into a group within Sandworm that the company\u2019s analysts are calling BadPilot. Microsoft describes the team as an \u201cinitial access operation\u201d focused on breaching and gaining a foothold in victim networks before handing off that access to other hackers within Sandworm\u2019s larger organization, which security researchers have for years identified as a unit of Russia\u2019s GRU military intelligence agency. After BadPilot&#x27;s initial breaches, other Sandworm hackers have used its intrusions to move within victim networks and carry out effects such as stealing information or launching cyberattacks, Microsoft says.<\/p>\n<p class=\"paywall\">Microsoft describes BadPilot as initiating a high volume of intrusion attempts, casting a wide net and then sorting through the results to focus on particular victims. Over the last three years, the company says, the geography of the group&#x27;s targeting has evolved: In 2022, it set its sights almost entirely on Ukraine, then broadened its hacking in 2023 to networks worldwide, and then shifted again in 2024 to home in on victims in the US, the UK, Canada and Australia.<\/p>\n<p class=\"paywall\">\u201cWe see them spraying out their attempts at initial access, seeing what comes back, and then focusing on the targets they like,\u201d says Sherrod DeGrippo, Microsoft\u2019s director of threat intelligence strategy. \u201cThey\u2019re picking and choosing what makes sense to focus on. And they are focusing on those Western countries.\u201d<\/p>\n<p class=\"paywall\">Microsoft didn&#x27;t name any specific victims of BadPilot&#x27;s intrusions, but broadly stated that the hacker group&#x27;s targets have included \u201cenergy, oil and gas, telecommunications, shipping, arms manufacturing,\u201d and \u201cinternational governments.\u201d On at least three occasions, Microsoft says, its operations have led to data-destroying cyberattacks carried out by Sandworm against Ukrainian targets.<\/p>\n<p class=\"paywall\">As for the more recent focus on Western networks, Microsoft&#x27;s DeGrippo hints that the group&#x27;s interests have likely been more related to politics. \u201cGlobal elections are probably a reason for that,\u201d DeGrippo says. \u201cThat changing political landscape, I think, is a motivator to change tactics and to change targets.\u201d<\/p>\n<p class=\"paywall\">Over the more than three years that Microsoft has tracked BadPilot, the group has sought to gain access to victim networks using known but unpatched vulnerabilities in internet-facing software, exploiting hackable flaws in Microsoft Exchange and Outlook, as well as applications from OpenFire, JetBrains, and Zimbra. In its targeting of Western networks over the last year in particular, Microsoft warns that BadPilot has specifically exploited a vulnerability in the remote access tool Connectwise ScreenConnect and Fortinet FortiClient EMS, another application for centrally managing Fortinet&#x27;s security software on PCs.<\/p>\n<p class=\"paywall\">After exploiting those vulnerabilities, Microsoft found that BadPilot typically installs software that gives it persistent access to a victim machine, often with legitimate remote access tools like Atera Agent or Splashtop Remote Services. In some cases, in a more unique twist, it also sets up a victim&#x27;s computer to run as so-called onion service on the Tor anonymity network, essentially turning it into a server that communicates via Tor&#x27;s collection of proxy machines to hide its communications.<\/p>\n<p class=\"paywall\">Another, separate report Tuesday from the cybersecurity firm EclecticIQ <a data-offer-url=\"https:\/\/blog.eclecticiq.com\/sandworm-apt-targets-ukrainian-users-with-trojanized-microsoft-kms-activation-tools-in-cyber-espionage-campaigns\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/blog.eclecticiq.com\/sandworm-apt-targets-ukrainian-users-with-trojanized-microsoft-kms-activation-tools-in-cyber-espionage-campaigns&quot;}\" href=\"https:\/\/blog.eclecticiq.com\/sandworm-apt-targets-ukrainian-users-with-trojanized-microsoft-kms-activation-tools-in-cyber-espionage-campaigns\" rel=\"nofollow noopener\" target=\"_blank\">pointed to an entirely distinct hacking campaign<\/a> that firm also ties to Sandworm. Since late 2023, EclecticIQ found the hacker group has used a malware-infected Windows piracy tool, distributed via Bittorrent, to breach Ukrainian government networks. In those cases, EclecticIQ found, the hackers have installed a remote access tool called Dark Crystal RAT to carry out cyberespionage.<\/p>\n<p class=\"paywall\">Any sign of Sandworm, which Microsoft refers to by the name Seashell Blizzard, raises alarms in part because the group has a history of hacking operations that go far beyond mere spying. Over the last decade, the group has caused at least three blackouts by <a href=\"https:\/\/www.wired.com\/story\/russian-hackers-attack-ukraine\/\">targeting electric utilities<\/a> in Ukraine\u2014still the only such hacker-induced blackouts in history. The group also <a href=\"https:\/\/www.wired.com\/story\/notpetya-cyberattack-ukraine-russia-code-crashed-the-world\/\">released the NotPetya malware<\/a> that spread worldwide and did at least $10 billion in damage, and it used wiper malware to <a href=\"https:\/\/www.wired.com\/story\/russia-ukraine-cyberattacks-mandiant\/\">destroy countless networks<\/a> in more targeted attacks across Ukraine both before and after the 2022 invasion.<\/p>\n<p class=\"paywall\">Microsoft has so far found no evidence that, in BadPilot&#x27;s targeting of Western networks specifically, Sandworm has shown any intention to carry out anything other than espionage. \u201cThis seems very early in terms of initial resource gathering, trying to get this much persistent access,\u201d says Microsoft&#x27;s DeGrippo. \u201cThen we would have to wait to see what they do with it.\u201d<\/p>\n<p class=\"paywall\">But she notes that BadPilot is nonetheless tied to a larger group that has a history of highly disruptive cyberattacks. \u201cTherefore,&quot; says DeGrippo, &quot;the potential actions that they could take next is of deep concern.\u201d<\/p>\n<p><a href=\"https:\/\/www.wired.com\/story\/russia-sandworm-badpilot-cyberattacks-western-countries\/\" target=\"bwo\" >https:\/\/www.wired.com\/category\/security\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.wired.com\/photos\/67aba991b2d9721f7e44160c\/master\/pass\/putin-tussia-hackers-sec-%202195701776.jpg\"\/><\/p>\n<p><strong>Credit to Author: Andy Greenberg| Date: Wed, 12 Feb 2025 17:00:00 +0000<\/strong><\/p>\n<p>A team Microsoft calls BadPilot is acting as Sandworm&#8217;s \u201cinitial access operation,\u201d the company says. And over the last year it&#8217;s trained its sights on the US, the UK, Canada, and Australia.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10607],"tags":[714,21358,21465,21357],"class_list":["post-25781","post","type-post","status-publish","format-standard","hentry","category-security","category-wired","tag-security","tag-security-cyberattacks-and-hacks","tag-security-national-security","tag-security-security-news"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/25781","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=25781"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/25781\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=25781"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=25781"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=25781"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}