Alias Description | Votes |
---|---|
APT28 is a possible alias for Sednit. APT28, also known as Fancy Bear, Forest Blizzard, and Unit 26165 of the Russian Main Intelligence Directorate, is a Russia-linked threat actor that has been active since at least 2007. This group has targeted governments, militaries, and security organizations worldwide with a particular focus on th | 9 |
Sofacy is a possible alias for Sednit. Sofacy is a threat actor group that has been observed using multiple languages to create variants of the Zebrocy Trojan and Cannon. In one campaign, they relied heavily on filenames to lure victims into launching weaponized documents. The group packed only Delphi variants in an attempt to increase e | 4 |
Pawn Storm is a possible alias for Sednit. Pawn Storm, also known as APT28, Fancy Bear, Sofacy Group, Sednit, BlueDelta, and STRONTIUM, is a threat actor that has been active since at least 2007. The group is notorious for its complex operations that steal victims' credentials to enable surveillance or intrusion operations. It has targeted g | 3 |
Forest Blizzard is a possible alias for Sednit. Forest Blizzard, also known as APT28, Fancy Bear, and Strontium, is a threat actor linked to the Russian General Staff Main Intelligence Directorate (GRU) and the 85th Main Special Service Center (GTsSS). The group has been involved in persistent espionage campaigns against European countries, which | 2 |
Fancy Bear is a possible alias for Sednit. Fancy Bear is a sophisticated Russian-based threat actor, also known as Sofacy or APT 28, that has been active since the mid-2000s. Fancy Bear is responsible for targeted intrusion campaigns against the Aerospace, Defense, Energy, Government and Media sectors. At the DNC, both Cozy Bear and Fancy Be | 2 |
STRONTIUM is a possible alias for Sednit. Strontium, also known as APT28, Fancy Bear, Forest Blizzard, and several other names, is a threat actor linked to Russia's General Staff Main Intelligence Directorate (GRU). Active since at least 2007, the group has targeted governments, militaries, and security organizations worldwide. Strontium's | 2 |
Sofacy Group is a possible alias for Sednit. The Sofacy Group, also known as APT28, Fancy Bear, Pawn Storm, Sednit, BlueDelta, and STRONTIUM, is a well-established threat actor that has been active since at least 2007. This group, which could be an individual, a private company, or part of a government entity, has targeted governments, militar | 2 |
Alias Description | Association Type | Votes |
---|---|---|
The LoJax Malware is associated with Sednit. LoJax is a unique and sophisticated piece of malware that targets the Unified Extensible Firmware Interface (UEFI) of a computer. First detected in 2018, LoJax was attributed to the Sednit group, also known as Fancy Bear, and it represented a significant leap in malware technology by being the first | Unspecified | 4 |
The Zebrocy Malware is associated with Sednit. Zebrocy is a malicious software (malware) known for its capability to exploit and damage computer systems. It infiltrates the system through suspicious downloads, emails, or websites and can steal personal information, disrupt operations, or hold data hostage for ransom. The Zebrocy Trojan, a varian | Unspecified | 2 |
Alias Description | Association Type | Votes |
---|---|---|
The Sandworm Threat Actor is associated with Sednit. Sandworm, also known as APT44, is a Russia-linked threat actor that has been implicated in several major cyberattacks. This group has been particularly active against targets in Ukraine and Poland, with significant operations including the compromise of 11 Ukrainian telecommunications providers, whi | Unspecified | 3 |
The The Dukes Threat Actor is associated with Sednit. The Dukes, also known as APT29, Cozy Bear, Midnight Blizzard, and Nobelium, is a threat actor associated with the Russian government that has been active since at least 2008. Notably, this group was implicated in the 2015 attack on the American Democratic National Committee (DNC). The FBI alerted th | Unspecified | 2 |
Preview | Source Link | CreatedAt | Title |
---|---|---|---|
Securityaffairs | 2 months ago | ||
Securityaffairs | 5 months ago | ||
ESET | 5 months ago | ||
Securityaffairs | 5 months ago | ||
Securityaffairs | 6 months ago | ||
Securityaffairs | 6 months ago | ||
CERT-EU | 8 months ago | ||
CERT-EU | 8 months ago | ||
CERT-EU | 8 months ago | ||
CERT-EU | 8 months ago | ||
CERT-EU | 8 months ago | ||
Flashpoint | 8 months ago | ||
DARKReading | 8 months ago | ||
Unit42 | 8 months ago | ||
Securityaffairs | 8 months ago | ||
Securityaffairs | a year ago | ||
Unit42 | a year ago | ||
Securityaffairs | a year ago | ||
InfoSecurity-magazine | a year ago | ||
CERT-EU | a year ago |