Solntsepek

Malware updated 4 months ago (2024-05-04T16:21:29.742Z)
Download STIX
Preview STIX
Solntsepek is a notorious malware associated with the Russian state-sponsored threat actor, Seashell Blizzard, which is affiliated with the GRU. The group has been identified by Microsoft as one of the three hacktivist groups that regularly interact with Seashell Blizzard, alongside InfoCentr and the Cyber Army of Russia. Solntsepek has also been linked to Sandworm, another group tied to Russia's military intelligence. Notably, following the Russian invasion in February 2022, there have been observable changes in tactics from these groups, including greater coordination and attention given to hacking groups serving as fronts, such as Zarya Hacknet and Solntsepek. The Ukrainian Cyber Alliance, a collective of hackers and various hacking groups in Ukraine, reported a noticeable uptick in cyber activities from Solntsepek since the invasion. Solntsepek claimed responsibility for a major cyber attack against Ukraine's largest telecommunications provider, disrupting operations and causing significant damage. The group reportedly destroyed 10 thousand computers, over 4 thousand servers, all cloud storage, and backup systems. This attack was focused primarily on entities providing services to Ukrainian government agencies and armed forces. CrowdStrike, a cybersecurity firm, believes that Sandworm and its affiliate Solntsepek were responsible for the attack. Solntsepek has previously claimed responsibility for the Kyivstar attack, and CrowdStrike tracks Sandworm under the alias VooDoo Bear. The group has used pro-Russian Telegram channels, including XakNet Team and Solntsepek, to claim responsibility for hacks and leak stolen information. Despite Solntsepek claiming responsibility, experts point to the strong likelihood of Sandworm group activities due to their historical connection.
Description last updated: 2024-04-17T15:15:36.824Z
What's your take? (Question 1 of 2)
Help tune the shared Cybergeist dataset, assist your peers, and earn karma. Expand the panel to get started.
Possible Aliases / Cluster overlaps
It's hard to track cluster overlaps and naming conventions between vendors, so here are some possible overlapping names / profiles you also may want to look at.
IDVotesProfile Description
Sandworm
3
Sandworm is a threat actor group, believed to be linked to Russia, known for executing actions with malicious intent. The group has been involved in numerous high-profile cybersecurity breaches over the years. In one significant incident, Sandworm compromised 11 Ukrainian telecommunications provider
Miscellaneous Associations
Other elements of context that could aid in the identification of relevance
Russia
Telegram
Analyst Notes & Discussion
Be the first to leave your mark here! Log in to share your views and vote.
Source Document References
Information about the Solntsepek Malware was read from the documents corpus below. This display is limited to 20 results, create a free account to see more
PreviewSource LinkCreatedAtTitle
BankInfoSecurity
5 months ago
The Global Menace of the Russian Sandworm Hacking Team
Checkpoint
6 months ago
25th March – Threat Intelligence Report - Check Point Research
DARKReading
8 months ago
Microsoft Threat Report: How Russia’s War on Ukraine Is Impacting the Global Cybersecurity Community
CERT-EU
8 months ago
Russian Hackers Orchestrate Ukrainian Telecom Giant Attack
CERT-EU
a year ago
Pro-Russian hackers remain active amid Ukraine counteroffensive
Checkpoint
9 months ago
18th December – Threat Intelligence Report - Check Point Research
CERT-EU
8 months ago
Russia's Sandworm blamed for Kyivstar telecom cyberattack
CERT-EU
8 months ago
Russian hackers wiped thousands of systems in KyivStar attack
CERT-EU
8 months ago
Russian hackers reportedly breached telecom network months before attack
CERT-EU
8 months ago
Russian Hackers Breached Ukraine Telecoms Giant Months Before Major Cyberattack: Report | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #hacker | National Cyber Security Consulting
CERT-EU
8 months ago
Critical Infrastructure Remains the Brass Ring for Cyber Attackers in 2024
CERT-EU
9 months ago
Kyivstar Restores Full Services After Massive Hacker Attack | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #hacker | National Cyber Security Consulting
CERT-EU
9 months ago
Cyberattack on Ukraine’s Kyivstar Seems to Be Russian Hacktivists
CERT-EU
9 months ago
Ukraine’s Largest Telecommunication Provider Paralysed by a Massive Cyberattack