Fighting Ursa

Threat Actor updated 3 months ago (2024-08-14T09:38:54.448Z)
Download STIX
Preview STIX
Fighting Ursa, also known as APT28, Fancy Bear, and Sofacy, is a highly active Russian cyber threat actor with a notorious history of carrying out high-profile attacks. The group has been linked to significant cyber offensives including US election interference in 2016, the NotPetya attacks, the Olympic Destroyer effort, and more. Their tactics are consistent across campaigns, and they exclusively use the HeadLace backdoor, which further validates their attribution. One of their key strategies involves disguising malicious files by exploiting Windows' default setting of hiding file extensions, a tactic adopted from other Russian threat actors. In March 2024, Fighting Ursa launched a campaign that leveraged a unique approach: a used car sale phishing scheme aimed at diplomats. This scheme involved the distribution of the HeadLace backdoor malware via a fake car advertisement, demonstrating the group's innovative methods of attack. The attribution of this campaign to Fighting Ursa was made with medium to high confidence by cybersecurity experts. Earlier in May, the threat actor exploited Webhook.site, a legitimate service, to initiate the infection chain by hosting a malicious HTML page. Fighting Ursa continues to be a persistent threat, particularly due to its innovative use of legitimate web services in its attack infrastructure. Cybersecurity experts predict that the group will maintain this strategy in future campaigns. The group's consistent tactics, motivation, and the exclusive use of the HeadLace backdoor indicate that Fighting Ursa remains a significant threat to global cybersecurity.
Description last updated: 2024-08-14T08:41:40.291Z
What's your take? (Question 1 of 5)
Help tune the shared Cybergeist dataset, assist your peers, and earn karma. Expand the panel to get started.
Possible Aliases / Cluster overlaps
It's hard to track cluster overlaps and naming conventions between vendors, so here are some possible overlapping names / profiles you also may want to look at. Create a free account to see the source evidence for each alias, and help fix any errors.
Alias DescriptionVotes
APT28 is a possible alias for Fighting Ursa. APT28, also known as Fancy Bear and Unit 26165 of the Russian Main Intelligence Directorate, is a threat actor linked to Russia with a history of cyber-espionage activities. The group has been involved in several high-profile attacks, including the hacking of the Democratic National Committee (DNC)
5
Ursa is a possible alias for Fighting Ursa. Ursa is a highly active and motivated malware threat actor, also known as APT28, Fancy Bear, and Sofacy, which has been linked to various high-profile cyberattacks, including the US election interference in 2016 and the NotPetya attacks. The group is known for its use of the HeadLace backdoor malwar
3
Miscellaneous Associations
Other elements of context that could aid in the identification of relevance
Vulnerability
Exploit
Malware
Outlook
Backdoor
Microsoft
Apt
Analyst Notes & Discussion
Be the first to leave your mark here! Log in to share your views and vote.
Associated Vulnerabilities
To see the evidence that has resulted in these vulnerability associations, create a free account
Alias DescriptionAssociation TypeVotes
The vulnerability CVE-2023-233397 is associated with Fighting Ursa. Unspecified
2
Source Document References
Information about the Fighting Ursa Threat Actor was read from the documents corpus below. This display is limited to 20 results, create a free account to see more
PreviewSource LinkCreatedAtTitle
DARKReading
4 months ago
Securityaffairs
4 months ago
Securityaffairs
4 months ago
Unit42
4 months ago
Securityaffairs
7 months ago
CERT-EU
8 months ago
CERT-EU
a year ago
DARKReading
a year ago
CERT-EU
a year ago
CERT-EU
a year ago
Securityaffairs
a year ago
CERT-EU
a year ago
CERT-EU
a year ago
CERT-EU
a year ago
Unit42
a year ago