Seaborgium

Threat Actor updated a month ago (2024-10-17T13:02:13.931Z)
Download STIX
Preview STIX
Seaborgium, also known by various names such as Star Blizzard, Callisto Group, COLDRIVER, and TAG-53, is a threat actor believed to be linked to Russia's Federal Security Service (FSB). The group has been active since at least 2015, targeting government officials, military personnel, journalists, and think tanks with a sophisticated spear-phishing campaign. Notably, this group was responsible for a nearly decade-long spear-phishing operation against British lawmakers across multiple political parties, resulting in the leak of classified documents. On August 15, 2022, Microsoft, Google’s Threat Analysis Group, and Proofpoint’s Threat Research Team collectively published a report detailing Seaborgium's phishing operations. Insikt Group used intelligence from open-source reporting to profile the infrastructure used by TAG-53, which bears significant overlap with public reporting on Callisto Group, COLDRIVER, and SEABORGIUM. The group's consistent setup of its infrastructure has been identified as a hallmark of their operations. In an effort to combat this cyber espionage, the U.S. Department of Justice and Microsoft's Digital Crimes Unit disrupted a spear-phishing campaign orchestrated by Star Blizzard, seizing a total of 107 internet domains linked to the group. This action followed the unsealing of a warrant to seize 41 domains used by the Russia-linked Callisto Group for computer fraud in the United States. Despite these measures, the threat actor continues to successfully execute spear-phishing attacks against targeted organizations and individuals in the UK and other regions.
Description last updated: 2024-10-17T12:33:46.914Z
What's your take? (Question 1 of 5)
Help tune the shared Cybergeist dataset, assist your peers, and earn karma. Expand the panel to get started.
Possible Aliases / Cluster overlaps
It's hard to track cluster overlaps and naming conventions between vendors, so here are some possible overlapping names / profiles you also may want to look at. Create a free account to see the source evidence for each alias, and help fix any errors.
Alias DescriptionVotes
COLDRIVER is a possible alias for Seaborgium. Coldriver, also known as Star Blizzard, Callisto, and Seaborgium, is a Russia-based cyber-espionage group believed to be backed by the Federal Security Service (FSB). This threat actor has been active since at least 2015, targeting government officials, military personnel, journalists, think tanks,
7
Callisto Group is a possible alias for Seaborgium. The Callisto Group, also known as 'Star Blizzard', 'SEABORGIUM', and 'COLDRIVER', is a threat actor linked to Russia's Federal Security Service (FSB), Center 18. This group has been involved in sophisticated spear-phishing campaigns aimed at unauthorized access and information theft from protected c
6
Star Blizzard is a possible alias for Seaborgium. Star Blizzard, a threat actor group with ties to Russia's FSB, has been conducting sophisticated spear-phishing campaigns predominantly targeting Western think tanks, government officials, defense contractors, journalists, and nongovernmental organizations (NGOs). The group uses spear-phishing techn
6
Callisto is a possible alias for Seaborgium. Callisto, also known as Star Blizzard, COLDRIVER, TAG-53, and BlueCharlie, is a threat actor group likely based in Russia that has been linked to malicious cyber activities. The group is notorious for its sophisticated spear-phishing attacks targeting organizations and individuals in the UK and othe
6
Bluecharlie is a possible alias for Seaborgium. BlueCharlie, also known as TAG-53, Blue Callisto, Callisto (or Calisto), COLDRIVER, Star Blizzard (formerly SEABORGIUM), and TA446, is a threat actor that has been linked to Russia and has reportedly been active since 2019. The group has been involved in various malicious activities including cybere
4
TA446 is a possible alias for Seaborgium. TA446, also known as the Callisto APT group, Seaborgium, Star Blizzard, ColdRiver, TAG-53, and BlueCharlie, is a significant threat actor that has been active since at least 2015. The group has persistently targeted government officials, military personnel, journalists, and think tanks, focusing on
3
Calisto is a possible alias for Seaborgium. Calisto, also known as BlueCharlie, Blue Callisto, TAG-53, COLDRIVER, Star Blizzard (formerly SEABORGIUM), TA446, and UNC4057, is a threat actor that has been active since 2019. This group targets a wide range of sectors and is particularly focused on individuals and organizations involved in intern
2
Starblizzard is a possible alias for Seaborgium.
2
Miscellaneous Associations
Other elements of context that could aid in the identification of relevance
Phishing
Blizzard
Domains
Apt
Uk
NCSC
Microsoft
Russia
Analyst Notes & Discussion
Be the first to leave your mark here! Log in to share your views and vote.
Associated Threat Actors
To see the evidence that has resulted in these threatActor associations, create a free account
Alias DescriptionAssociation TypeVotes
The TA453 Threat Actor is associated with Seaborgium. TA453, also known as Charming Kitten, APT35, Phosphorus, Newscaster, and Ajax Security Team, is a threat actor group suspected to be linked with the Iranian government. Researchers from Proofpoint have attributed cyberattacks on affiliates of former National Security Adviser John Bolton and nuclear Unspecified
2
The threatActor Callisto Apt Group is associated with Seaborgium. Unspecified
2
Source Document References
Information about the Seaborgium Threat Actor was read from the documents corpus below. This display is limited to 20 results, create a free account to see more
PreviewSource LinkCreatedAtTitle
Flashpoint
a month ago
Flashpoint
2 months ago
Securityaffairs
2 months ago
CISA
a year ago
BankInfoSecurity
5 months ago
Krebs on Security
6 months ago
CERT-EU
10 months ago
BankInfoSecurity
10 months ago
Securityaffairs
10 months ago
CERT-EU
a year ago
CERT-EU
a year ago
CERT-EU
a year ago
CERT-EU
a year ago
CERT-EU
a year ago
CERT-EU
a year ago
CERT-EU
a year ago
CERT-EU
a year ago
CERT-EU
a year ago
CERT-EU
a year ago
CERT-EU
a year ago