Itg05

Threat Actor updated 25 days ago (2024-08-14T09:20:12.569Z)
Download STIX
Preview STIX
ITG05, also known as Fancy Bear, Forest Blizzard, and APT28, among other aliases, is a sophisticated threat actor that has been involved in several cyber operations with malicious intent. The group has been leveraging the Israel-Hamas conflict to deliver Headlace malware, targeting non-governmental organizations (NGOs) through phishing lures. They have shown adaptability by delivering new infection methodologies and evolving their malware capabilities. In a recent change to their methods, ITG05 utilized the freely available hosting provider, firstcloudit[.]com to stage payloads for ongoing operations. Their elaborate scheme culminates in the execution of MASEPIE, OCEANMAP, and STEELHOOK, which are designed to exfiltrate files, run arbitrary commands, and steal browser data. The attackers impersonate government and NGO organizations across Europe, South Caucasus, Central Asia, North and South America, reaching victims via email. Their modus operandi involves deploying multiple lure documents disguised as authentic materials from entities in various countries including Argentina, Ukraine, Georgia, Belarus, Kazakhstan, Poland, Armenia, Azerbaijan, and the United States. Despite this wide-reaching operation, IBM X-Force does not currently have insight into whether ITG05 has successfully compromised the impersonated organizations. ITG05 is expected to continue leveraging attacks against world governments and political apparatus to provide Russia with advanced insights into emerging policy decisions. For instance, after Argentina rejected an invitation to join the BRICS trade organization, it was suggested that ITG05 might seek to gain access to insights into Argentine government priorities. Given the group's adaptability and persistent evolution of their techniques, cybersecurity researchers warn of the continuous threat posed by ITG05.
Description last updated: 2024-08-14T08:42:05.685Z
What's your take? (Question 1 of 2)
Help tune the shared Cybergeist dataset, assist your peers, and earn karma. Expand the panel to get started.
Possible Aliases / Cluster overlaps
It's hard to track cluster overlaps and naming conventions between vendors, so here are some possible overlapping names / profiles you also may want to look at.
IDVotesProfile Description
Forest Blizzard
2
Forest Blizzard, also known as APT28, Fancy Bear, and Strontium, is a threat actor linked to the Russian General Staff Main Intelligence Directorate (GRU) and the 85th Main Special Service Center (GTsSS). The group has been involved in persistent espionage campaigns against European countries, which
APT28
2
APT28, also known as Fancy Bear, Pawn Storm, Sofacy Group, Sednit, BlueDelta, and STRONTIUM, is a threat actor linked to Russia that has been active since at least 2007. The group has targeted governments, militaries, and security organizations worldwide, including the German Social Democratic Party
Miscellaneous Associations
Other elements of context that could aid in the identification of relevance
Malware
Analyst Notes & Discussion
Be the first to leave your mark here! Log in to share your views and vote.
Source Document References
Information about the Itg05 Threat Actor was read from the documents corpus below. This display is limited to 20 results, create a free account to see more
PreviewSource LinkCreatedAtTitle
Unit42
a month ago
Fighting Ursa Luring Targets With Car for Sale
CERT-EU
6 months ago
Russian hackers unleash sophisticated phishing campaigns across the globe
SecurityIntelligence.com
4 months ago
Threat intelligence to protect vulnerable communities
DARKReading
6 months ago
Russian Intelligence Targets Victims Worldwide in Rapid-Fire Cyberattacks
CERT-EU
6 months ago
APT28 Hacker Group Targeting Europe, Americas, Asia in Widespread Phishing Scheme | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #hacker | National Cyber Security Consulting
CERT-EU
6 months ago
Russian hacker group exploits Microsoft Windows feature in worldwide phishing attack | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #hacker | National Cyber Security Consulting