Куда я попал?
SECURITM это SGRC система, ? автоматизирующая процессы в службах информационной безопасности. SECURITM помогает построить и управлять ИСПДн, КИИ, ГИС, СМИБ/СУИБ, банковскими системами защиты.
А еще SECURITM это место для обмена опытом и наработками для служб безопасности.

Star Blizzard

Star Blizzard is a cyber espionage and influence group originating in Russia that has been active since at least 2019. Star Blizzard campaigns align closely with Russian state interests and have included persistent phishing and credential theft against academic, defense, government, NGO, and think tank organizations in NATO countries, particularly the US and the UK.(Citation: Microsoft Star Blizzard August 2022)(Citation: CISA Star Blizzard Advisory December 2023)(Citation: StarBlizzard)(Citation: Google TAG COLDRIVER January 2024)
ID: G1033
Associated Groups: Callisto Group, TA446, COLDRIVER, SEABORGIUM
Created: 14 Jun 2024
Last Modified: 14 Jun 2024

Associated Group Descriptions

Name Description
Callisto Group (Citation: CISA Star Blizzard Advisory December 2023)
TA446 (Citation: CISA Star Blizzard Advisory December 2023)
COLDRIVER (Citation: Google TAG COLDRIVER January 2024)
SEABORGIUM (Citation: Microsoft Star Blizzard August 2022)

Techniques Used

Domain ID Name Use
Enterprise T1583 .001 Acquire Infrastructure: Domains

Star Blizzard has registered domains using randomized words and with names resembling legitimate organizations.(Citation: CISA Star Blizzard Advisory December 2023)(Citation: StarBlizzard)

Enterprise T1059 .007 Command and Scripting Interpreter: JavaScript

Star Blizzard has used JavaScript to redirect victim traffic from an adversary controlled server to a server hosting the Evilginx phishing framework.(Citation: StarBlizzard)

Enterprise T1586 .002 Compromise Accounts: Email Accounts

Star Blizzard has used compromised email accounts to conduct spearphishing against contacts of the original victim.(Citation: CISA Star Blizzard Advisory December 2023)

Enterprise T1114 .002 Email Collection: Remote Email Collection

Star Blizzard has remotely accessed victims' email accounts to steal messages and attachments.(Citation: CISA Star Blizzard Advisory December 2023)

.003 Email Collection: Email Forwarding Rule

Star Blizzard has abused email forwarding rules to monitor the activities of a victim, steal information, and maintain persistent access after compromised credentials are reset.(Citation: Microsoft Star Blizzard August 2022)(Citation: CISA Star Blizzard Advisory December 2023)

Enterprise T1585 .001 Establish Accounts: Social Media Accounts

Star Blizzard has established fraudulent profiles on professional networking sites to conduct reconnaissance.(Citation: Microsoft Star Blizzard August 2022)(Citation: CISA Star Blizzard Advisory December 2023)

.002 Establish Accounts: Email Accounts

Star Blizzard has registered impersonation email accounts to spoof experts in a particular field or individuals and organizations affiliated with the intended target.(Citation: Microsoft Star Blizzard August 2022)(Citation: CISA Star Blizzard Advisory December 2023)(Citation: Google TAG COLDRIVER January 2024)

Enterprise T1588 .002 Obtain Capabilities: Tool

Star Blizzard has incorporated the open-source EvilGinx framework into their spearphishing activity.(Citation: CISA Star Blizzard Advisory December 2023)(Citation: StarBlizzard)

Enterprise T1566 .001 Phishing: Spearphishing Attachment

Star Blizzard has sent emails with malicious .pdf files to spread malware.(Citation: Google TAG COLDRIVER January 2024)

Enterprise T1598 .002 Phishing for Information: Spearphishing Attachment

Star Blizzard has sent emails to establish rapport with targets eventually sending messages with attachments containing links to credential-stealing sites.(Citation: Microsoft Star Blizzard August 2022)(Citation: CISA Star Blizzard Advisory December 2023)(Citation: StarBlizzard)(Citation: Google TAG COLDRIVER January 2024)

.003 Phishing for Information: Spearphishing Link

Star Blizzard has sent emails to establish rapport with targets eventually sending messages with links to credential-stealing sites.(Citation: Microsoft Star Blizzard August 2022)(Citation: CISA Star Blizzard Advisory December 2023)(Citation: StarBlizzard)(Citation: Google TAG COLDRIVER January 2024)

Enterprise T1608 .001 Stage Capabilities: Upload Malware

Star Blizzard has uploaded malicious payloads to cloud storage sites.(Citation: Google TAG COLDRIVER January 2024)

Enterprise T1550 .004 Use Alternate Authentication Material: Web Session Cookie

Star Blizzard has bypassed multi-factor authentication on victim email accounts by using session cookies stolen using EvilGinx.(Citation: CISA Star Blizzard Advisory December 2023)

Enterprise T1204 .002 User Execution: Malicious File

Star Blizzard has lured targets into opening malicious .pdf files to deliver malware.(Citation: Google TAG COLDRIVER January 2024)

Мы используем cookie-файлы, чтобы получить статистику, которая помогает нам улучшить сервис для вас с целью персонализации сервисов и предложений. Вы может прочитать подробнее о cookie-файлах или изменить настройки браузера. Продолжая пользоваться сайтом, вы даёте согласие на использование ваших cookie-файлов и соглашаетесь с Политикой обработки персональных данных.