The Register: Russia’s Sandworm caught snarfing credentials, data from American and Brit orgs

Source URL: https://www.theregister.com/2025/02/12/russias_sandworm_caught_stealing_credentials/
Source: The Register
Title: Russia’s Sandworm caught snarfing credentials, data from American and Brit orgs

Feedly Summary: ‘Near-global’ initial access campaign active since 2021
An initial-access subgroup of Russia’s Sandworm last year wriggled its way into networks within the US, UK, Canada and Australia, stealing credentials and data from “a limited number of organizations," according to Microsoft.…

AI Summary and Description: Yes

Summary: The text details the operations of the Russian cyber espionage group Sandworm, specifically its “Seashell Blizzard” subgroup, which has been executing a global campaign dubbed “BadPilot” since 2021. The subgroup compromises critical infrastructures across various sectors in multiple countries, utilizing legitimate remote management tools to maintain access and evade detection, showcasing a growing sophistication in cyber threats that security professionals must address.

Detailed Description:

The content revolves around the cyber threat landscape posed by the Russian military cyber operations group Sandworm, notably its subgroup known as “Seashell Blizzard.” The key points are as follows:

– **Initial Access Campaign**:
– The subgroup has been active since at least 2021 and has targeted critical sectors such as energy, telecommunications, and government institutions in the US, UK, Canada, and Australia, demonstrating a “near-global” approach.

– **Methodology**:
– This campaign, dubbed “BadPilot,” is characterized by its advanced initial access strategies, exploiting internet-facing infrastructure vulnerabilities.
– The subgroup not only establishes persistent access but also leverages this access to prepare for future disruptive attacks.

– **Use of Legitimate Tools**:
– Seashell Blizzard employs remote management and monitoring (RMM) tools, such as Atera Agent and Splashtop Remote Services, blending their malicious activities with normal network traffic to minimize detection risk.
– They exploit vulnerabilities in legitimate software (e.g., CVE-2024-1709 and CVE-2023-48788) to set up their operations.

– **Tactics for Persistence**:
– After gaining access, the subgroup installs RMM software and uses its capabilities to deploy secondary malicious payloads, exfiltrating data and managing further access through mechanisms like OpenSSH with actor-controlled accounts.
– They have developed a method known as ShadowLink, which configures victim systems as Tor hidden services, allowing access via a .onion address without the need for more recognizable Remote Access Trojans (RATs).

– **Implications for Cybersecurity**:
– The activities of the Seashell Blizzard subgroup exemplify a new level of sophistication in cyber strategy, prioritizing stealth, persistence, and strategic sector targeting.
– These developments present significant challenges for cybersecurity professionals who must enhance their security postures to defend against persistent threats and evolving attack methodologies.

Overall, the text highlights critical trends in cyber threat actors’ methods, emphasizing the importance of adaptive defense strategies in an increasingly complex threat landscape. Security professionals must be vigilant in monitoring for such activities and consider integrating advanced detection systems to mitigate these risks effectively.