ID | Votes | Profile Description |
---|---|---|
COLDRIVER | 5 | Coldriver, also known as Callisto Group and Star Blizzard, is a threat actor believed to originate from Russia. This entity is recognized for its malicious activities including disinformation campaigns, spear-phishing attacks, and the use of custom malware. The group has been associated with the Rus |
Seaborgium | 4 | Seaborgium, also known as Star Blizzard, Callisto Group, COLDRIVER, and TAG-53, is a threat actor linked to suspected Russian threat activity groups. Open-source reporting has enabled Insikt Group to profile the infrastructure used by this group, revealing significant overlaps with other known malic |
Calisto | 3 | Calisto, also known as BlueCharlie, Blue Callisto, TAG-53, COLDRIVER, Star Blizzard (formerly SEABORGIUM), TA446, and UNC4057, is a threat actor that has been active since 2019. This group targets a wide range of sectors and is particularly focused on individuals and organizations involved in intern |
TA446 | 2 | TA446, also known as the Callisto APT group, Seaborgium, Star Blizzard, ColdRiver, TAG-53, and BlueCharlie, is a threat actor that has been active since at least 2015. This cyberespionage entity has persistently targeted individuals and organizations involved in international affairs, defense, and l |
Callisto | 1 | Callisto, also known as Gossamer Bear, COLDRIVER, UNC4057, Star Blizzard, Blue Charlie, and SEABORGIUM, is a threat actor linked to the Russian state. This group, which has been tracked by various entities including Microsoft, Google's Threat Analysis Group (TAG), and Insikt Group, is known for its |
Tag-53 | 1 | None |
Blue Callisto | 1 | Blue Callisto, also known as COLDRIVER, BlueCharlie (or TAG-53), Calisto, Gossamer Bear, Star Blizzard (formerly SEABORGIUM), TA446, and UNC4057, is a malicious software program that has been active since 2019. This malware is designed to infiltrate computer systems and devices, often undetected, vi |
Star Blizzard | 1 | Star Blizzard, also known as Seaborgium or the Callisto Group, is a threat actor linked to Russia's intelligence service, the FSB. The group has been involved in sophisticated cyber-attacks worldwide, primarily using spear-phishing campaigns to steal account credentials and data. Microsoft, which tr |
Gossamer Bear | 1 | Gossamer Bear, also known as Callisto, Blue Callisto, BlueCharlie (or TAG-53), Calisto, Star Blizzard (formerly SEABORGIUM), TA446, and UNC4057, is a significant threat actor that has been active since 2019. The group primarily focuses on credential harvesting and conducts hack-and-leak campaigns ta |
ID | Type | Votes | Profile Description |
---|---|---|---|
No associations to display |
ID | Type | Votes | Profile Description |
---|---|---|---|
Starblizzard | Unspecified | 2 | None |
Unc4057 | Unspecified | 1 | UNC4057, also known as ColdRiver, Star Blizzard, Blue Charlie, and Callisto, is a Russian-backed advanced persistent threat (APT) group that has been active since 2019. This group, sponsored by the Federal Security Service (FSB), has been involved in various malicious activities on behalf of the Rus |
Callisto Group | Unspecified | 1 | The Callisto Group, a threat actor identified as part of the Russian Federal Security Service, has been exposed by the United States and the United Kingdom for its malicious cyber activities. This group, also known as Coldriver and formerly tracked by Microsoft under the moniker "Seaborgium," is com |
ID | Type | Votes | Profile Description |
---|---|---|---|
Star Blizzard/seaborgium | Unspecified | 2 | None |
Blizzard/seaborgium | Unspecified | 2 | None |
Source | CreatedAt | Title |
---|---|---|
CERT-EU | 6 months ago | Russian COLDRIVER Hackers Expand Beyond Phishing with Custom Malware |
CERT-EU | 7 months ago | Microsoft Alert: COLDRIVER Credential Theft Rising Again |
CERT-EU | 8 months ago | UK names Russian FSB agents behind political hacking campaign | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #hacker | National Cyber Security Consulting |
CERT-EU | 8 months ago | UK accuses Russia of cyber interference targeting elections and democracy |
DARKReading | 8 months ago | Russia's 'Star Blizzard' APT Upgrades its Stealth, Only to Be Unmasked Again |
CERT-EU | 8 months ago | US and British authorities sanction, indict Russian hackers | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #hacker | National Cyber Security Consulting |
CERT-EU | 8 months ago | US and British authorities sanction, indict Russian hackers |
CERT-EU | 8 months ago | Microsoft Warns of COLDRIVER's Evolving Evading and Credential-Stealing Tactics |
CERT-EU | 8 months ago | Advanced threat predictions for 2024 – GIXtools |
Securelist | 8 months ago | Kaspersky Security Bulletin: APT predictions 2024 |
CERT-EU | a year ago | Cyber Security Week in Review: August 4, 2023 |
CERT-EU | a year ago | Novel attack infrastructure established by Russian hackers to bypass detection |
CERT-EU | a year ago | BlueCharlie changes attack infrastructure in response to reports on its activity |
CERT-EU | a year ago | Russia-linked BlueCharlie APT evolves tactics as it adapts to public disclosures |
DARKReading | a year ago | Russian APT 'BlueCharlie' Swaps Infrastructure to Evade Detection |
Recorded Future | a year ago | BlueCharlie, Previously Tracked as TAG-53, Continues to Deploy New Infrastructure in 2023 | Recorded Future |
CERT-EU | a year ago | Russian Cyber Adversary BlueCharlie Alters Infrastructure in Response to Disclosures – GIXtools |
CERT-EU | a year ago | Russian Cyber Adversary BlueCharlie Alters Infrastructure in Response to Disclosures |