STRONTIUM

Threat Actor updated 9 days ago (2024-09-05T13:17:42.738Z)
Download STIX
Preview STIX
Strontium, also known as APT28, Fancy Bear, Forest Blizzard, and several other names, is a threat actor linked to Russia's General Staff Main Intelligence Directorate (GRU). Active since at least 2007, the group has targeted governments, militaries, and security organizations worldwide. Strontium's activities range from cyber espionage operations against European countries, which have been condemned by NATO and the European Union, to the exploitation of various vulnerabilities in widespread software systems. The group's tactics have evolved over time, demonstrating a sophisticated understanding of cyber warfare. In one instance, Microsoft attributed Strontium's brute-forcing of Office365 credentials over Tor. This indicates an advanced capability for credential harvesting, a common but effective technique in cyber-espionage. Moreover, Palo Alto Networks’ Unit 42 reported that the group exploited the CVE-2023-23397 vulnerability in attacks aimed at European NATO members, further showcasing their technical prowess and strategic targeting. Recently, Strontium has been observed utilizing the Moobot botnet, a tool often used for distributed denial-of-service (DDoS) attacks, data theft, and delivering malware. Additionally, the group has been linked to a previously unknown tool named GooseEgg, which was used to exploit the Windows Print Spooler flaw CVE-2022-38028. These activities highlight the ongoing threat posed by Strontium, necessitating constant vigilance and robust cybersecurity measures from potential target entities.
Description last updated: 2024-09-05T13:16:23.706Z
What's your take? (Question 1 of 5)
Help tune the shared Cybergeist dataset, assist your peers, and earn karma. Expand the panel to get started.
Possible Aliases / Cluster overlaps
It's hard to track cluster overlaps and naming conventions between vendors, so here are some possible overlapping names / profiles you also may want to look at.
IDVotesProfile Description
APT28
6
APT28, also known as Fancy Bear, Forest Blizzard, and Unit 26165 of the Russian Main Intelligence Directorate, is a threat actor linked to Russia. Active since at least 2007, this group has targeted governments, militaries, and security organizations worldwide. Notably, APT28 was responsible for the
Fancy Bear
4
Fancy Bear is a sophisticated Russian-based threat actor, also known as Sofacy or APT 28, that has been active since the mid-2000s. Fancy Bear is responsible for targeted intrusion campaigns against the Aerospace, Defense, Energy, Government and Media sectors. At the DNC, both Cozy Bear and Fancy Be
Forest Blizzard
4
Forest Blizzard, also known as APT28, Fancy Bear, and Strontium, is a threat actor linked to the Russian General Staff Main Intelligence Directorate (GRU) and the 85th Main Special Service Center (GTsSS). The group has been involved in persistent espionage campaigns against European countries, which
Pawn Storm
2
Pawn Storm, also known as APT28, Fancy Bear, Sofacy Group, Sednit, BlueDelta, and STRONTIUM, is a threat actor that has been active since at least 2007. This group is notorious for targeting governments, militaries, and security organizations worldwide. The cybersecurity industry identifies Pawn Sto
Fancybear
2
Fancybear, also known as APT28, Forest Blizzard, or Strontium, is a threat actor linked to Russia that has been involved in various cyber espionage operations. These operations have targeted European countries and have been condemned by both NATO and the European Union. This group has demonstrated a
Sofacy
2
Sofacy is a threat actor group that has been observed using multiple languages to create variants of the Zebrocy Trojan and Cannon. In one campaign, they relied heavily on filenames to lure victims into launching weaponized documents. The group packed only Delphi variants in an attempt to increase e
Sednit
2
Sednit, also known as APT28, Fancy Bear, Pawn Storm, Sofacy Group, BlueDelta, and Strontium, is a threat actor associated with Russia's military intelligence. The group has been active since at least 2007, primarily targeting governments, militaries, and security organizations worldwide. Notably, Se
Miscellaneous Associations
Other elements of context that could aid in the identification of relevance
Russia
Apt
Microsoft
Exploit
Ukraine
Outlook
Vulnerability
russian
State Sponso...
Phishing
Blizzard
Analyst Notes & Discussion
Be the first to leave your mark here! Log in to share your views and vote.
Associated Threat Actors
To see the evidence that has resulted in these threatActor associations, create a free account
IDTypeVotesProfile Description
Cadet BlizzardUnspecified
2
Cadet Blizzard, a threat actor group associated with Russia's GRU military intelligence unit, has been identified by Microsoft as the perpetrator of destructive cyber attacks in Ukraine using wiper malware. The group has been active since at least 2020 and has recently gained some success, according
Source Document References
Information about the STRONTIUM Threat Actor was read from the documents corpus below. This display is limited to 20 results, create a free account to see more
PreviewSource LinkCreatedAtTitle
Securityaffairs
9 days ago
Is Russian group APT28 behind the cyber attack on the German air traffic control agency (DFS)?
Securityaffairs
3 months ago
APT28 targets key networks in Europe with HeadLace malware
Securityaffairs
4 months ago
Pro-Russia hackers targeted Kosovo government websites
Securityaffairs
4 months ago
Russia-linked APT28 targets government Polish institutions
Securityaffairs
4 months ago
NATO and the EU formally condemned APT28 cyber espionage
Securityaffairs
4 months ago
Russia-linked APT28 and crooks are still using the Moobot botnet
Securityaffairs
5 months ago
CISA adds Microsoft Windows Print Spooler flaw to its Known Exploited Vulnerabilities catalog
DARKReading
5 months ago
Russia's Fancy Bear Pummels Windows Print Spooler Bug
Securityaffairs
5 months ago
Russia-linked APT28 used tool GooseEgg for to exploit Win bug
CERT-EU
6 months ago
LoJax: the malware that can survive operating systems being reinstalled 
CERT-EU
6 months ago
Russian hackers are exploiting edge routers to launch major new cyberattacks | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #hacker | National Cyber Security Consulting
CERT-EU
6 months ago
Cyber Security Week in Review: March 1, 2024
CERT-EU
7 months ago
Down, Not Out: Russian Hacktivists Claiming DDoS Disruptions
BankInfoSecurity
7 months ago
Down, Not Out: Russian Hacktivists Claiming DDoS Disruptions
CERT-EU
7 months ago
APT28 is recruiting Ubiquiti EdgeRouters into botnets
BankInfoSecurity
7 months ago
Moscow Military Hackers Used Microsoft Outlook Vulnerability
CERT-EU
8 months ago
Russia-linked APT28 used new malware in a recent phishing campaign
Securityaffairs
8 months ago
Russia's APT28 used new malware in a recent phishing campaign
CERT-EU
9 months ago
Microsoft Warns of Kremlin-Backed APT28 Exploiting Critical Outlook Vulnerability
CERT-EU
9 months ago
Les vulnérabilités critiques à suivre (11 décembre 2023)