Cyber Army of Russia

Threat Actor updated 23 days ago (2024-11-29T13:59:33.718Z)
Download STIX
Preview STIX
The Cyber Army of Russia, a threat actor believed to be linked to the notorious Sandworm group, has been active in carrying out malicious cyber activities since 2022. The group, also known as the Cyber Army of Russia Reborn (CARR), has been particularly involved in a series of low-impact distributed denial of service (DDoS) attacks against entities in Ukraine and other countries that have shown support for Ukraine. This group often collaborates with other pro-Russian hacker groups, such as NoName057(16), which was identified as the most active hacktivist threat actor during H1 2024. A significant development occurred when Ukraine's Security Service (SBU) managed to arrest a member of this pro-Russian hackers group. Despite this setback, the group continued its operations, including launching an attack against a wastewater treatment plant in the US in April 2024. Furthermore, the group claimed responsibility for DDoS attacks on the Telegram channel of the Cyber Army of Russia, citing Japan’s upcoming joint military exercise with the U.S. as motivation. In response to these escalating threats, the US government took action by sanctioning key members of the Cyber Army of Russia Reborn. Despite these measures, the group remains active, participating in campaigns involving major hacking groups like the pro-Islamic RipperSec. These collaborative efforts resulted in DDoS attacks against over 50 targets in France, further showcasing the persistent and global nature of the threat posed by the Cyber Army of Russia and its affiliates.
Description last updated: 2024-10-22T17:43:20.163Z
What's your take? (Question 1 of 5)
Help tune the shared Cybergeist dataset, assist your peers, and earn karma. Expand the panel to get started.
Possible Aliases / Cluster overlaps
It's hard to track cluster overlaps and naming conventions between vendors, so here are some possible overlapping names / profiles you also may want to look at. Create a free account to see the source evidence for each alias, and help fix any errors.
Alias DescriptionVotes
Anonymous Russia is a possible alias for Cyber Army of Russia. Anonymous Russia, a malicious software (malware), has been associated with significant cyber-attacks, accounting for more than 30% of such incidents. This malware is affiliated with other hacktivist groups including Killnet, MIRAI, Venom, and has been involved in promoting Passion. Anonymous Russia,
2
XakNet is a possible alias for Cyber Army of Russia. XakNet is a notable threat actor, potentially aligned with Russian interests, that has been implicated in various cyber attacks. This group emerged prominently during Russia's conflict with Ukraine and the subsequent ban on Russia from the 2022 FIFA World Cup. The Russian government was suspected of
2
Miscellaneous Associations
Other elements of context that could aid in the identification of relevance
Russia
Hacktivist
Ddos
Telegram
Analyst Notes & Discussion
Be the first to leave your mark here! Log in to share your views and vote.
Associated Threat Actors
To see the evidence that has resulted in these threatActor associations, create a free account
Alias DescriptionAssociation TypeVotes
The KillNet Threat Actor is associated with Cyber Army of Russia. Killnet is a threat actor or group with potential ties to the Russian government, known for its disruptive cyber-attacks. This group has been linked to several politically motivated attacks, including a significant assault on the Israeli government's website leading to its paralysis. Killnet has alsis related to
3
Source Document References
Information about the Cyber Army of Russia Threat Actor was read from the documents corpus below. This display is limited to 20 results, create a free account to see more
PreviewSource LinkCreatedAtTitle
Checkpoint
2 months ago
BankInfoSecurity
3 months ago
Checkpoint
3 months ago
InfoSecurity-magazine
4 months ago
InfoSecurity-magazine
4 months ago
Securityaffairs
4 months ago
Securityaffairs
5 months ago
Securityaffairs
5 months ago
InfoSecurity-magazine
5 months ago
BankInfoSecurity
a year ago
Securityaffairs
a year ago
BankInfoSecurity
a year ago
DARKReading
a year ago
CERT-EU
2 years ago
Flashpoint
2 years ago
CERT-EU
a year ago
CERT-EU
a year ago
CERT-EU
a year ago
CERT-EU
a year ago