#APT44

2025-12-16

🔐 🖥️ 🌐 🛡️ Russian state-sponsored hackers are moving away from security vulnerabilities and breaking into critical infrastructure through misconfigured devices, warns Amazon Threat Intelligence. ⚠️ 🏭 🔍

Read: hackread.com/amazon-russia-gru

#CyberSecurity #Russia #Sandworm #APT44 #Amazon

2025-11-06

Russia’s notorious Sandworm group isn’t just hitting power grids anymore—they’re now targeting Ukraine’s grain sector and food security. How deep does this cyber siege go?

thedefendopsdiaries.com/sandwo

#sandworm
#apt44
#cyberwarfare
#ukraine
#criticalinfrastructure
#databreach
#malware
#ransomware
#cyberattacks

2025-04-04

The russian-backed Seashell Blizzard aka #APT44 or #Sandworm is behind a stealthy “BadPilot” campaign focused on gaining persistent network access. Detect adversary activity targeting critical sectors with #Sigma rules from SOC Prime Platform.
socprime.com/blog/seashell-bli

CyberEd :verified:ebcovert3@infosec.exchange
2025-02-13

#G0034 #apt44 #seashellblizzard > The #BadPilot campaign: Seashell Blizzard subgroup conducts multiyear global access operation | Microsoft Security Blog

Just Another Blue TeamerLeeArchinal@ioc.exchange
2024-04-29

Happy Monday everyone!

I know this was posted a week or two back, but I wanted to bring it up again in another light. The first time I read it from a technical level looking for the usual TTPs and behaviors but while I was mowing my yard and listening to The Cybersecurity Defender's Podcast by @limacharlieio the participants mentioned something that I didn't even realize the first time I read it. They mentioned that #APT44, or Sandworm, is a very serious adversary due to the amount of capabilities they have and on so many different levels. From espionage to persistence to destructive activity, they are a very refined group and should be taken seriously. Thanks for the great insight! I hope you enjoy and Happy Hunting!

Unearthing APT44: Russia’s Notorious Cyber Sabotage Unit Sandworm
cloud.google.com/blog/topics/t

#CyberSecurity #ITSecurity #InfoSec #BlueTeam #ThreatIntel #ThreatHunting #ThreatDetection #HappyHunting #readoftheday #gethunting

2024-04-20

It’s increasingly alarming the public at large continues to have no idea about many state sponsored operators active on US soil and the lack of federal law around privacy here in the United States. The ignorance of our law body around this is even more concerning #intel #security #apt44 #sanctionedoperators

services.google.com/fh/files/m

Just Another Blue TeamerLeeArchinal@ioc.exchange
2024-04-18

Good day everyone!

I haven't finished this one yet, and if you check it out you will see why, but so far it is a wonderful resource on #APT44. Mandiant (now part of Google Cloud) researches put together what is years of knowledge and research on the group into a single, complete document. I really do wish more of these existed (and if they do please drop them in the comments!) simply due to the amount of information contained within. I hope you enjoy and Happy Hunting!

services.google.com/fh/files/m

#CyberSecurity #ITSecurity #InfoSec #BlueTeam #ThreatIntel #ThreatHunting #ThreatDetection #HappyHunting #readoftheday

2024-04-17

Mandiant graduates the Russian cyberespionage Sandworm to APT44. Sandworm is publicly attributed to Unit 74455 of the Russian Main Intelligence Directorate (GRU) by the US Government. APT44 conducts missions like collecting intelligence, sabotaging networks, or conducting information operations. Mandiant's threat actor profile (40 page report) of APT44 offers a look at how cyberwarfare will be played out in future conflicts. IOC included. 🔗 cloud.google.com/blog/topics/t

#Sandworm #cyberespionage #Russia #APT #APT44 #threatintel #RussiaUkraineWar #IOC

Erik JonkerErikJonker
2024-04-17
Org chart of GRU and APT44 / Sandworm

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst