2026 Futuriom 50: Highlights →Explore

Executive Summary

Between 2021 and 2026, Russia's cyber apparatus executed the most operationally diverse state-sponsored campaign of the period — spanning espionage, critical infrastructure sabotage, cloud identity exploitation, and destructive operations simultaneously across multiple theaters.

The defining shift: Russia's cyber operations shifted from SolarWinds‑style supply‑chain compromises to a permanent multi‑front offensive against US government, cloud providers, defense contractors, critical infrastructure, and major tech firms, repurposing Ukraine‑era wipers, ICS sabotage, and satellite disruption for global pre‑positioning, with Sandworm active across at least a dozen Western countries by 2025.

However, effective defense in 2026 requires understanding how Russian cyber tradecraft evolved from 2021 onward, not just reacting to current headlines.

The most important defensive insight:

Russia operates three distinct cyber doctrines simultaneously: GRU (Russia’s military intelligence service) units conduct destruction and critical infrastructure pre-positioning, SVR (Russia’s external/civilian intelligence agency) conducts patient strategic espionage through cloud and identity exploitation, and FSB (Russia’s main internal security and counterintelligence service) conducts targeted credential theft and influence operations. Each requires a fundamentally different detection approach. The techniques battle-tested during regional conflicts have been operationalized for use against US and Western enterprise targets.

This article analyzes that progression and translates it into concrete detection and defensive strategy guidance.

Detection & Strategy DisclaimerThe thresholds and detection logic in this document are illustrative, not prescriptive. Values such as replay windows, exfil size limits, burst timing, or file modification rates must be tuned to your environment. Network design, workforce geography, cloud setup, logging depth, and normal user behavior all affect what is "anomalous." There is no universal threshold — only environment-calibrated detection.


Strategic Context: Why It Matters to Defenders

Russia's cyber operations are not opportunistic — they are doctrinally integrated with intelligence objectives, executed by organizationally distinct units with different mandates, risk tolerances, and tradecraft profiles.

Understanding which Russian organization is operating against you fundamentally changes your detection strategy: GRU operations are faster, louder, and destructive; SVR operations are patient, cloud-native, and designed for long-duration collection; FSB operations are targeted, credential-focused, and paired with influence objectives.

Strategic Shift

Russian cyber operations transitioned from the SolarWinds-era supply chain model (patient, singular, high-value) to a permanent multi-front operational tempo — conducting strategic espionage against US cloud infrastructure, pre-positioning in Western critical infrastructure, targeting US defense and technology sectors, and conducting credential theft campaigns against policy influencers and research institutions.

The trajectory is clear: Russia's cyber units are now permanently operating at elevated tempo against US and Western targets, with tradecraft refined through years of high-intensity operations now applied globally.


Part I — Strategic Pattern (2021 → 2026)

Russian cyber operations from 2021–2026 show four consistent characteristics:

  • Organizational specialization — GRU (destruction/pre-positioning), SVR (strategic espionage), FSB (targeted collection/influence) operate with distinct mandates and tradecraft

  • Global pre-positioning — destructive capabilities developed and refined during regional conflicts are now being pre-positioned across US and Western critical infrastructure

  • Cloud identity pivot — SVR shifted from on-premises supply chain attacks to cloud-native identity exploitation (OAuth abuse, token theft, password spray)

  • Destructive capability industrialization — GRU demonstrated the ability to produce 9+ distinct wiper families in 12 months, an industrial-scale destructive malware development pipeline now available for future use against any target

The tactical stack evolved dramatically, but the doctrine remained consistent:

  1. Gain access through identity exploitation, edge device compromise, or supply chain

  2. Persist through cloud infrastructure embedding, legitimate tooling, or firmware-level access

  3. Collect intelligence at scale (SVR) or pre-position for disruption (GRU)

  4. Execute destruction when geopolitically or militarily useful

What Changed in Russian Cyber Operations (2021–2026)

  1. Destructive Operations Became Industrialized

Between January and December 2022, GRU units deployed at minimum 9 distinct wiper malware families: WhisperGate, HermeticWiper, IsaacWiper, CaddyWiper, DoubleZero, AcidRain, Industroyer2, SwiftSlicer, and ZEROLOT. This was not a single weapon fired once — it was an industrial malware production line. AcidRain alone disrupted satellite internet across Europe, demonstrating that these capabilities are not regionally contained. By 2025, Sandworm attacked Poland's energy grid — the largest cyber attack on Polish infrastructure in years.

Defensive takeaway: Russia has demonstrated the capability to produce and deploy novel destructive malware at a pace that exceeds signature-based detection cycles. This industrial capacity can be redirected to US targets. Behavioral detection of pre-destruction staging (VSS deletion, backup destruction, mass file access) is the only reliable defense against novel wipers.

  1. Cloud Identity Became the Primary Espionage Vector

Midnight Blizzard (APT29/SVR) compromised Microsoft's own corporate environment in January 2024 using a password spray attack against a legacy test tenant lacking MFA. The SVR didn't break encryption or exploit a zero-day — they guessed the password to a forgotten test account. From that foothold, they pivoted via a legacy OAuth application to access senior leadership email, source code repositories, and internal systems.

Defensive takeaway: Legacy OAuth applications, dormant service accounts, and test tenants without MFA are the SVR's preferred initial access vector. Your cloud identity hygiene is your Russia defense posture. Audit all OAuth app registrations, enforce MFA on every account including service principals, and eliminate legacy test environments.

  1. Critical Infrastructure Pre-Positioning Became Global

Russia's ICS and OT capabilities — demonstrated through Industroyer2 (power grid targeting), AcidRain (satellite communications disruption across Europe), and coordinated wiper deployments against energy facilities — represent a proven playbook that has since expanded beyond its original theater. Sandworm's BadPilot campaign (disclosed February 2025) confirmed active targeting of energy, telecommunications, and government organizations in the US, UK, Canada, and Australia.

Defensive takeaway: Organizations in energy, telecommunications, and critical infrastructure should treat US-Russia geopolitical tensions as a direct trigger for elevated monitoring of OT/ICS systems, satellite communications infrastructure, and network edge devices. The capabilities are proven; the targeting is now global.

  1. Infrastructure Parasitism as Operational Model

Turla (Secret Blizzard/FSB) didn't just build its own C2 infrastructure — it hijacked C2 belonging to other threat actors. In 2024, Microsoft documented Turla compromising Storm-0156 (a Pakistan-based espionage group), deploying its own implants (TinyTurla, TwoDash) through the compromised group's existing access and confiscating their tools (CrimsonRAT, Wainscot) for its own use.

Defensive takeaway: Finding a known APT's implant does not mean you have fully scoped the intrusion. If Turla is riding on another group's access, your IOC-based detection will identify the wrong actor, and your remediation will miss the deeper compromise.

  1. Credential Phishing Became AI-Enhanced and Platform-Diverse

Star Blizzard (FSB/COLDRIVER) conducted sustained credential phishing campaigns against academia, defense, NGOs, and think tanks — evolving from email-based spear-phishing to WhatsApp-based social engineering by late 2024. The campaigns use extensive pre-attack research, establish rapport over weeks before delivering credential harvesting links, and deploy EvilGinx2 to defeat MFA.

Defensive takeaway: Star Blizzard's social engineering is slow, personalized, and increasingly platform-diverse (email → Teams → WhatsApp). Detection must extend beyond email gateway to cover collaboration platforms. Phishing-resistant MFA (FIDO2) is the definitive control.

  1. AI-Enabled Malware and Rapid Exploit Weaponization Arrived

In 2026, LAMEHUG — the first confirmed Russian APT malware leveraging a large language model (Qwen2.5-Coder via Hugging Face API) for dynamic command generation. Separately, APT28's Operation Neusploit weaponized CVE-2026-21509 (Microsoft Office/MSHTML) within 24 hours of public disclosure. CrowdStrike's 2026 Global Threat Report documented an 89% increase in AI-enabled attacks and noted 82% of intrusions in 2025 were malware-free.

Defensive takeaway: The combination of AI-assisted malware and near-zero-day weaponization timelines compresses the defender's response window dramatically. Patch SLAs for internet-facing Microsoft products must be measured in hours, not days. Behavioral detection for anomalous LLM API calls (Hugging Face, OpenAI, etc.) from endpoint processes should be investigated as potential AI-enabled C2.


Current Target Prioritization

Priority Tier

Target Category

Rationale

Tier 1

US government agencies, diplomatic communications, defense contractors

Strategic intelligence collection (SVR); demonstrated via Microsoft breach, TeamViewer breach

Tier 1

US/Western cloud service providers (Microsoft, Google, AWS infrastructure)

Upstream access to government and enterprise tenants

Tier 1

US/Western energy and critical infrastructure

Pre-positioning for crisis-time disruption (Sandworm BadPilot expansion)

Tier 2

NATO member governments and military organizations

Military intelligence, alliance monitoring

Tier 2

US technology companies, MSPs, IT service providers

Supply chain and downstream access to high-value targets

Tier 2

Telecommunications and satellite infrastructure

Communications intelligence and disruption capability

Tier 3

Think tanks, NGOs, academia, journalists

Policy intelligence, influence operations (FSB/Star Blizzard)

Tier 3

Defense-adjacent industries (aerospace, advanced manufacturing)

Technology and military intelligence

Detection Posture Adjustment

The following priorities should be elevated for any organization in Tier 1 or Tier 2:

  • Cloud identity hygiene audit — Enumerate all OAuth application registrations, service principals, and legacy test tenants. Any account without MFA is an SVR target. Midnight Blizzard's Microsoft breach began with a password spray against a single unprotected test account.

  • Edge device vulnerability management — Sandworm's BadPilot campaign exploits known vulnerabilities in Exchange, Fortinet, ConnectWise, and Outlook. Any unpatched internet-facing application is an active target for initial access.

  • OT/ICS network segmentation verification — If you operate energy, water, or telecommunications infrastructure, verify OT/IT segmentation and monitor for any IT-to-OT lateral movement. Sandworm has confirmed targeting of US energy and telecom sectors; Industroyer2 demonstrated ICS-specific attack capability.

  • Destructive malware pre-staging detection — Monitor for VSS deletion (vssadmin delete shadows), backup destruction (wbadmin delete), and mass file access patterns. Russia's wiper deployments are preceded by hours-to-days of pre-staging activity.

  • Residential proxy awareness — SVR operations route through residential proxy infrastructure to blend with legitimate traffic. Long-duration HTTPS connections to residential ISP IP ranges warrant investigation.

  • Collaboration platform credential theft — Star Blizzard now operates across email, Teams, and WhatsApp. Extend phishing detection beyond email to all collaboration platforms used by high-value targets.


Threat Actor Landscape

CrowdStrike Name

Microsoft Name

Common Name

Linked To

Primary Mission

Primary Targets

COZY BEAR

Midnight Blizzard

APT29 / NOBELIUM

SVR (Foreign Intelligence Service)

Strategic espionage, cloud exploitation

Government, cloud providers, tech, diplomatic

FANCY BEAR

Forest Blizzard

APT28 / Sofacy

GRU Unit 26165 (85th GTsSS)

Military intelligence, NATO espionage

Government, military, defense, energy, media

VOODOO BEAR

Seashell Blizzard

Sandworm / APT44

GRU Unit 74455

Destruction, ICS sabotage, pre-positioning

Energy, telecom, critical infrastructure (US, EU, global)

Cadet Blizzard

DEV-0586

GRU Unit 29155 (161st SpTsN)

Sabotage, espionage, reputational harm

Government, NATO, critical infrastructure

VENOMOUS BEAR

Secret Blizzard

Turla / Snake

FSB (Center 16)

Deep persistent espionage

Government, military, diplomatic (global)

PRIMITIVE BEAR

Aqua Blizzard

Gamaredon / Armageddon

FSB (Crimea-based, 5th Service)

High-volume espionage

Government and military (regionally focused)

GOSSAMER BEAR

Star Blizzard

COLDRIVER / Callisto

FSB (Center 18)

Credential theft, influence operations

Think tanks, academia, defense, NGOs, journalists

Key distinction: Russia operates cyber units across three intelligence agencies with fundamentally different mandates:

  • GRU units (APT28, Sandworm, Cadet Blizzard): Military intelligence — willing to conduct destructive operations, ICS sabotage, and high-tempo offensive campaigns against Western targets. Multiple distinct units (26165, 74455, 29155) with different specializations, now operating at sustained elevated tempo.

  • SVR (APT29/Midnight Blizzard): Foreign intelligence collection — patient, technically sophisticated, focused on cloud infrastructure and identity exploitation for long-duration access to government and technology targets.

  • FSB units (Turla, Gamaredon, Star Blizzard): Security service operations — ranging from sophisticated persistent espionage (Turla) to high-volume targeted collection (Gamaredon) to credential theft and influence targeting US/Western policy circles (Star Blizzard).

Attribution note: GRU Unit 29155 (Cadet Blizzard) was only formally attributed in 2023, despite being active since at least 2020. This unit operates with less technical sophistication than Sandworm or APT28 but compensates with high operational aggression — it deployed WhisperGate with no attempt at stealth. The US Department of State has offered a $10 million reward for information on Unit 29155 operatives.


Part II — Campaign Evolution Analysis (2021–2026)

2021: SolarWinds Aftermath and Federated Auth Targeting

  • Characteristic: SVR continued exploitation of SolarWinds-era access against US government and technology targets; development of AD FS persistence techniques

  • Tooling: NOBELIUM custom tooling, FoggyWeb (AD FS backdoor), MagicWeb (authentication bypass)

  • Detection profile: LOW for SVR (cloud-native, legitimate API abuse); MEDIUM for GRU (traditional tooling)

  • Defining campaign: APT29 FoggyWeb — backdoor targeting AD FS servers to extract token-signing certificates and deploy additional payloads; enabled persistent access to US federated authentication infrastructure

2022: Industrial-Scale Destructive Capability Demonstrated

  • Characteristic: Unprecedented deployment of destructive malware; 9+ wiper families in 12 months; ICS targeting; satellite communications disruption extending across Europe

  • Tooling: WhisperGate, HermeticWiper, IsaacWiper, CaddyWiper, AcidRain, Industroyer2, SwiftSlicer, DoubleZero, ZEROLOT

  • Detection profile: VARIED — wipers are detectable in pre-staging phase but novel at deployment; ICS malware requires specialized OT monitoring

  • Defining campaigns: AcidRain (Viasat satellite modem wiper affecting internet service across Europe — not regionally contained); Industroyer2 (ICS-specific malware targeting power grid IEC-104 protocol); HermeticWiper and WhisperGate (destructive operations attributed to distinct GRU units 74455 and 29155 respectively)

2023: Cloud Identity Exploitation and Zero-Day Campaigns

  • Characteristic: SVR pivoted to cloud-native attacks targeting US organizations; APT28 exploited Outlook zero-day for 20+ months across 14 NATO nations; attribution clarity improved

  • Tooling: OAuth application abuse, password spray infrastructure, CVE-2023-23397 (Outlook NTLM relay), CVE-2023-42793 (JetBrains TeamCity)

  • Detection profile: LOW for SVR cloud operations (legitimate API usage); MEDIUM for APT28 (NTLM relay detectable)

  • Defining campaigns: Midnight Blizzard Teams social engineering against US targets (August 2023); APT28 Outlook NTLM relay exploitation against 30+ organizations in 14 nations (April 2022–October 2023, disclosed March 2023); Cadet Blizzard formally attributed to GRU Unit 29155

2024: US Corporate Breach Escalation and Global Expansion

  • Characteristic: SVR breached Microsoft and TeamViewer corporate environments — demonstrating direct targeting of US technology providers; Sandworm expanded to 15+ countries; Turla hijacked rival APT infrastructure

  • Tooling: Password spray + OAuth pivot (Midnight Blizzard); CVE-2024-1709 (ConnectWise), CVE-2023-48788 (Fortinet); TinyTurla, TwoDash (Turla via hijacked C2)

  • Detection profile: LOW for SVR (legitimate credential use from residential proxies); MEDIUM for Sandworm BadPilot (known CVE exploitation)

  • Defining campaigns: Midnight Blizzard Microsoft breach (January 2024 — accessing senior leadership email, source code, and internal systems; 10x escalation in February); TeamViewer corporate breach (June 2024); Midnight Blizzard large-scale RDP file spear-phishing (October 2024); Turla hijacking Storm-0156 C2 infrastructure; Star Blizzard WhatsApp pivot (November 2024)

2025–2026: Persistent Access at Scale, AI-Enabled Operations, and Rapid Exploit Weaponization

  • Characteristic: Sandworm BadPilot campaign confirmed targeting US, UK, Canada, and Australia; SVR watering-hole campaigns exploiting device code authentication against US organizations; APT28 weaponizing CVEs within 24 hours of disclosure; Star Blizzard adopted iOS exploit kits; LLM-enabled malware appeared; pro-Russia hacktivist groups coordinated OT attacks on US critical infrastructure

  • Tooling: ZeroLot wiper, device code authentication abuse, EvilGinx2, residential proxy networks, LAMEHUG (LLM-enabled malware using Hugging Face API), DarkSword iOS exploit kit, BadPaw/MeowMeow malware families, CVE-2026-21509 (MSHTML zero-day)

  • Detection profile: LOW for SVR (cloud-native, device code auth abuse); MEDIUM for Sandworm (known CVE exploitation at scale); HIGH velocity for APT28 (zero-day weaponized within 24 hours)

  • Defining campaigns:

    • APT28 Operation Neusploit (February 2026): Exploited CVE-2026-21509 (Microsoft Office/MSHTML zero-day) within 24 hours of public disclosure, targeting Central/Eastern European government and defense entities — demonstrating near-zero delay between vulnerability disclosure and weaponization

    • APT28 LAMEHUG malware (CrowdStrike 2026 GTR): Deployed LLM-enabled malware leveraging Qwen2.5-Coder-32B-Instruct via Hugging Face API for dynamic command generation — first confirmed Russian APT use of generative AI in operational malware

    • Star Blizzard DarkSword iOS exploit kit (March 2026): Adopted commercial iOS exploit kit targeting government, academia, financial, and legal entities — marking a shift from credential theft to full endpoint compromise including mobile devices

    • Sandworm Poland energy grid attack (January 2026): Data-wiping malware deployed against Polish energy systems — the largest cyber attack on Polish infrastructure in years, confirming continued willingness to target NATO member critical infrastructure

    • APT29 device code authentication abuse (2025–2026): Watering-hole campaigns tricking US government and enterprise users into authorizing attacker-controlled devices via Microsoft device code authentication flow

    • Pro-Russia hacktivist OT attacks (CISA advisory December 2025): CARR, Z-Pentest, NoName057(16), and Sector16 conducting coordinated attacks on US water/wastewater, food & agriculture, and energy OT systems via exposed VNC connections

    • Mandiant M-Trends 2026: 500,000+ hours of incident investigations in 2025 confirm resurgence of Russian cyber operations and information operations supporting Russian strategic interests


Part III — Full Kill Chain: Phase-by-Phase TTPs with Detection Logic

Phase 1 – Reconnaissance

Phase

TTP

MITRE ID

Derived From

Detection Logic

Tooling Category

Recon

Social Media Profiling and Rapport Building

T1591

Star Blizzard extended impersonation campaigns

Detection limited for OSINT. Compensating control: Brief high-value targets (researchers, policy staff, executives) on slow-burn social engineering. Star Blizzard establishes rapport over weeks before delivering payload.

Security Awareness Training / DRP

Recon

Scanning for Unpatched Edge Services

T1595.002

Sandworm BadPilot campaign

>10 probes against Exchange, Fortinet, ConnectWise management interfaces in 60 sec from single IP. Whitelist known vulnerability scanners.

NGFW / WAF / IDS / SIEM

Recon

Cloud Tenant Enumeration

T1589.001

Midnight Blizzard pre-breach recon

Enumeration of Azure AD tenant configurations, OAuth app registrations, and service principal discovery from external IPs.

Cloud SIEM / ITDR

Phase 2 – Initial Access

Phase

TTP

MITRE ID

Derived From

Detection Logic

Tooling

Initial Access

Password Spray via Residential Proxies

T1110.003

Midnight Blizzard Microsoft breach

Low-volume, distributed password spray against cloud accounts. Key indicator: auth failures from residential ISP IP ranges distributed across many IPs with <5 attempts per IP. Correlation across the full tenant required.

Cloud SIEM / ITDR / IAM Auditing

Initial Access

Forged/Stolen OAuth Tokens

T1078.004

Midnight Blizzard (post-initial-access pivot)

OAuth application with elevated permissions accessing mailboxes/repos without corresponding interactive sign-in. Audit: legacy OAuth apps with Mail.Read, Mail.ReadWrite, or full_access_as_app permissions.

Cloud SIEM / CASB

Initial Access

Outlook NTLM Relay (CVE-2023-23397)

T1187

APT28 20-month campaign

Exchange: Calendar/task items with UNC path in extended properties (\\attacker-IP\share). Network: SMB (445) or WebDAV outbound to external IP triggered by Outlook rendering.

EDR / NDR / Email Gateway

Initial Access

Exploitation of Edge Applications

T1190

Sandworm BadPilot (Exchange, Fortinet, ConnectWise)

VPN/Edge logs: Auth bypass from external IP. Management interface accessed externally. POST to authenticated endpoint without valid session. Known CVE exploitation indicators for ConnectWise (CVE-2024-1709), Fortinet (CVE-2023-48788), Exchange (CVE-2021-34473).

Network Syslog / WAF / SIEM

Initial Access

Spear-Phishing with RDP Configuration Files

T1566.001

Midnight Blizzard October 2024 campaign

Email gateway: .rdp attachment from external sender. Endpoint: mstsc.exe launched from Outlook/browser context with remote resource redirection enabled.

Email Security Gateway / EDR

Initial Access

Device Code Authentication Phishing

T1078.004

APT29 2025 watering-hole

Entra ID: Device code flow auth (urn:ietf:params:oauth:grant-type:device_code) from IP/device not associated with the user's profile. Unusually high volume of device code requests.

Cloud SIEM / ITDR

Key CVEs Exploited (2021–2026):

  • CVE-2021-34473 / CVE-2021-34523 / CVE-2021-31207 (ProxyShell — Exchange)

  • CVE-2022-41352 (Zimbra)

  • CVE-2022-26318 (WatchGuard Firebox)

  • CVE-2023-23397 (Outlook NTLM relay — APT28)

  • CVE-2023-42793 (JetBrains TeamCity — APT29)

  • CVE-2023-38831 (WinRAR — APT28)

  • CVE-2023-48788 (Fortinet FortiClient EMS — Sandworm)

  • CVE-2024-1709 (ConnectWise ScreenConnect — Sandworm)

  • CVE-2022-38028 (Windows Print Spooler — APT28, GooseEgg tool)

  • CVE-2026-21509 (Microsoft Office/MSHTML — APT28, Operation Neusploit, weaponized within 24h of disclosure)

Phase 3 – Execution & Persistence

Phase

TTP

MITRE ID

Derived From

Detection Logic

Tooling

Persistence

OAuth Application Registration/Abuse

T1098.003

Midnight Blizzard

Entra ID Audit: New OAuth app registration with Mail.Read/Mail.ReadWrite/full_access_as_app. App consent granted by non-admin. Legacy app with delegated permissions accessing resources outside expected scope.

Cloud SIEM / ITDR

Persistence

AD FS Backdoor (FoggyWeb/MagicWeb)

T1556.001

APT29 post-SolarWinds

AD FS: Unexpected DLL loaded by AD FS service. Token-signing certificate access from non-AD FS process. Modified configuration in AD FS database.

EDR / FIM / SIEM

Persistence

Scheduled Task / Registry Run Key

T1053.005 / T1547.001

APT28, Gamaredon

Sysmon 1: schtasks.exe creating task with encoded PowerShell or external URL callback. Sysmon 13: Run/RunOnce key modified by non-installer process. WinSec 4698: Scheduled task created.

EDR / SIEM

Persistence

Web Shell Deployment

T1505.003

Sandworm (post-Exchange exploitation)

Sysmon 11: w3wp.exe creates .aspx/.php in web root. Sysmon 1: w3wp.exe spawns cmd/powershell. IIS logs: POST to non-standard path with no Referer header.

EDR / FIM / WAF

Persistence

Group Policy Modification

T1484.001

Sandworm (ZEROLOT wiper distribution)

WinSec 5136: GPO modification outside change window. New GPO linking to OU containing servers/DCs. SYSVOL file creation (scripts, executables) by non-admin.

SIEM / AD Monitoring

Phase 4 – Privilege Escalation & Defense Evasion

Phase

TTP

MITRE ID

Derived From

Detection Logic

Tooling

Priv Esc

GooseEgg Print Spooler Exploit (CVE-2022-38028)

T1068

APT28 custom tool

Sysmon 1: Execute process with suspicious command line modifying Windows Print Spooler components. DLL load from user-writable path by spoolsv.exe.

EDR / SIEM

Defense Evasion

DLL Side-Loading

T1574.002

APT29, APT28

Sysmon 7: Legitimate signed application loads DLL from AppData/Downloads/Temp. Hash mismatch between expected and loaded DLL.

EDR (Behavioral Engine)

Defense Evasion

Timestomping and Log Clearing

T1070.001 / T1070.006

All Russian operators

WinSec 1102: Audit log cleared. WinSec 4719: Audit policy changed. Sysmon 2: File creation time modified.

SIEM

Defense Evasion

Use of Legitimate Cloud APIs

T1550.001

APT29 cloud operations

OAuth token used from IP/device inconsistent with registration. Graph API calls at unusual hours or volumes. Mail access via EWS/Graph without corresponding interactive login.

Cloud SIEM / CASB

Defense Evasion

Living-off-the-Land (LOLBins)

T1218

APT28, Sandworm

Sysmon 1: Unusual parent-child process chains involving mshta.exe, certutil.exe, rundll32.exe, regsvr32.exe from non-admin context or with external URL parameters.

EDR / SIEM

Phase 5 – Credential Access

Phase

TTP

MITRE ID

Derived From

Detection Logic

Tooling

Cred Access

LSASS Dumping

T1003.001

APT28, Sandworm

Sysmon 10: TargetImage=lsass.exe, GrantedAccess 0x1fffff, SourceImage not in AV/EDR whitelist.

EDR / Credential Guard

Cred Access

DCSync

T1003.006

Sandworm, APT28

WinSec 4662: DS-Replication-Get-Changes-All by non-DC account. ANY non-DC machine or user account = CRITICAL.

ITDR / SIEM

Cred Access

Kerberoasting

T1558.003

APT28

WinSec 4769: TGS request with RC4 encryption (0x17) for service account from workstation. High volume of TGS requests from single source.

ITDR / SIEM

Cred Access

Token-Signing Certificate Theft

T1552.004

APT29 (AD FS targeting)

AD FS: Export of token-signing certificate. Access to AD FS configuration database from unexpected process. DKM container access in AD.

FIM / ITDR / SIEM

Cred Access

AiTM Session Cookie Theft

T1557

Star Blizzard EvilGinx2

Entra ID: MFA-complete sign-in followed by same session token from geo-distinct IP within short window. Session ID + changed user-agent/device fingerprint.

Cloud SIEM / ITDR

Phase 6 – Lateral Movement

Phase

TTP

MITRE ID

Derived From

Detection Logic

Tooling

Lateral Movement

Pass-the-Hash / Pass-the-Ticket

T1550.002

APT28, Sandworm

WinSec 4624 (LogonType 3, NtLmSsp) with Key_Length=0, absent corresponding TGT request (4768). Alert on workstation-to-Tier-0 access patterns.

EDR / ITDR / SIEM

Lateral Movement

RDP with Stolen Credentials

T1021.001

Multiple Russian groups

WinSec 4624 (LogonType 10) from unexpected source. RDP from workstation to server segment. RDP outside business hours from non-admin account.

SIEM / NDR

Lateral Movement

SMB/WMI Remote Execution

T1021.002 / T1021.006

Sandworm, APT28

WinSec 4624 + 4648: Logon Type 3 NTLM from workstation → server. Sysmon 1: WmiPrvSE.exe/services.exe spawns unexpected child process.

EDR / SIEM

Lateral Movement

OAuth Lateral Pivot (Cloud)

T1550.001

Midnight Blizzard

OAuth app accessing resources in tenant B after initial compromise in tenant A. Cross-tenant app consent. Service principal activity from unexpected IP.

Cloud SIEM / CASB

Phase 7 – Collection & Exfiltration

Phase

TTP

MITRE ID

Derived From

Detection Logic

Tooling

Collection

Email Collection via Graph/EWS API

T1114.002

Midnight Blizzard

M365 UAL: MailItemsAccessed via Graph API with OAuth app. Volume >100 messages/hour from single app. App accessing mailboxes of senior leadership/security team.

Cloud SIEM / CASB

Collection

Source Code Repository Access

T1213

Midnight Blizzard Microsoft breach

GitHub/ADO: Clone/download events from service principal or unusual IP. Access to repos containing secrets, keys, or authentication code.

SCM Audit Logs / SIEM

Exfiltration

C2 via Legitimate Cloud Services

T1567

APT29 (OneDrive, Notion, Google Drive abuse), Turla

DLP/Proxy: Unusual upload volume to cloud storage services. Data exfil to cloud services not sanctioned by organization.

DLP / CASB / Proxy

Exfiltration

DNS Tunneling

T1071.004

APT28

DNS: High volume of TXT/NULL queries to single domain. Unusually long subdomain labels (>30 chars). Entropy analysis on DNS query names.

NDR / DNS Monitoring / SIEM

Phase 8 – OT/ICS Targeting

Layer

Focus

Detection Logic

Layer 1

Network Visibility

Passive OT monitoring (Claroty/Dragos/Nozomi). Any ICS protocol (IEC-104, IEC-61850, Modbus, DNP3) from IT network to OT = immediate alert.

Layer 2

ICS Command Monitoring

IEC-104 commands outside baseline operating parameters. Breaker open/close commands from non-HMI workstation. Unauthorized setpoint changes.

Layer 3

Satellite/Telecom Integrity

Firmware integrity checks on satellite modems and telecom equipment. Unexpected management interface access. Mass device reboot/reset events.

Why Industroyer2/AcidRain are uniquely dangerous:

  • Industroyer2 targets IEC-104 protocol directly — purpose-built for electric grid disruption

  • AcidRain is a generic wiper that targets embedded Linux devices — easily redeployable against any modem, router, or IoT device

  • Both demonstrate Russia's capability to attack infrastructure layers below endpoint visibility

Phase 9 – Impact (Destructive Operations)

Phase

TTP

MITRE ID

Derived From

Detection Logic

Tooling

Impact

Disk Wiper Deployment

T1561.002

HermeticWiper, WhisperGate, CaddyWiper, SwiftSlicer

Pre-wiper indicators: vssadmin delete shadows, wbadmin delete backup, bcdedit recovery disable. Active wiper: Write to \.\PhysicalDrive0 or mass file overwrite (>500 files in burst). Alert: ANY vssadmin delete shadows = HIGH severity.

EDR / FIM / SIEM

Impact

ICS Disruption (Industroyer2)

T0855

Sandworm Industroyer2 (April 2022)

OT passive monitoring: IEC-104 commands from non-SCADA source. Breaker state changes outside maintenance window. Simultaneous commands to multiple substations.

OT NDR (Claroty/Dragos/Nozomi)

Impact

Satellite/Modem Wiper (AcidRain)

T1561.002

Sandworm AcidRain (Viasat)

Mass device offline events across satellite/modem fleet. Firmware integrity check failures. Management platform showing bulk device disconnection.

NOC Monitoring / Device Management

Impact

Ransomware (as Cover for Destruction)

T1486

Sandworm (NotPetya precedent), Cadet Blizzard (WhisperGate)

WhisperGate displayed fake ransom note with no recovery mechanism. Detect: Ransom note file creation + absence of actual C2/payment infrastructure = destructive operation masquerading as ransomware.

EDR / SIEM

Impact

GPO-Deployed Wiper

T1484.001 + T1561

Sandworm ZEROLOT

GPO modification + SYSVOL script deployment + mass endpoint execution within minutes. Alert: Any new GPO with script deployment outside change management = CRITICAL.

AD Monitoring / SIEM


Detection Engineering Master Matrix

Phase

TTP

MITRE ID

Log Source

Key Event ID / Indicator

Actor

Initial Access

Password spray (residential proxy)

T1110.003

Entra ID Sign-in

Distributed auth failures from residential ASN IPs

Midnight Blizzard

Initial Access

OAuth token abuse

T1078.004

M365 UAL

MailItemsAccessed via OAuth app without interactive sign-in

Midnight Blizzard

Initial Access

Outlook NTLM relay

T1187

Exchange / Sysmon

Calendar item with UNC path + outbound SMB to external IP

APT28

Initial Access

Edge device exploitation

T1190

VPN/Edge syslog

Auth bypass or management access from external IP

Sandworm BadPilot

Initial Access

RDP file spear-phishing

T1566.001

Email GW / EDR

.rdp attachment + mstsc.exe from Outlook context

Midnight Blizzard

Initial Access

Device code auth phishing

T1078.004

Entra ID

Device code flow from unassociated IP/device

APT29 (2025)

Persistence

OAuth app registration

T1098.003

Entra ID Audit

New app with Mail.Read/full_access_as_app permissions

Midnight Blizzard

Persistence

AD FS backdoor

T1556.001

EDR / FIM

Unexpected DLL in AD FS process

APT29

Persistence

Web shell — ASPX drop

T1505.003

Sysmon 11

w3wp.exe creates .aspx in web root

Sandworm

Persistence

GPO modification

T1484.001

WinSec 5136

GPO change outside change window with script deployment

Sandworm

Credential Access

LSASS dump

T1003.001

Sysmon 10

lsass.exe GrantedAccess 0x1fffff from non-AV

APT28, Sandworm

Credential Access

DCSync

T1003.006

WinSec 4662

DS-Replication-Get-Changes-All by non-DC account

Sandworm, APT28

Credential Access

AiTM session theft

T1557

Entra ID

Post-MFA session replay from geo-distinct IP

Star Blizzard

Credential Access

Token-signing cert theft

T1552.004

FIM / AD FS logs

Export of token-signing cert or DKM access

APT29

Defense Evasion

DLL side-loading

T1574.002

Sysmon 7

Legitimate app loads DLL from user-writable path

APT29, APT28

Defense Evasion

Log clearing

T1070.001

WinSec 1102

Audit log cleared on server

All

Defense Evasion

LOLBin abuse

T1218

Sysmon 1

mshta/certutil/rundll32 with external URL

APT28, Sandworm

Lateral Movement

Pass-the-Hash

T1550.002

WinSec 4624

LogonType 3 + NTLM + Key_Length=0

APT28, Sandworm

Lateral Movement

RDP lateral movement

T1021.001

WinSec 4624

LogonType 10 from workstation to server

Multiple

Lateral Movement

OAuth lateral pivot

T1550.001

Cloud SIEM

Cross-tenant app consent or service principal pivot

Midnight Blizzard

Collection

API mail access

T1114.002

M365 UAL

MailItemsAccessed via Graph/EWS OAuth app

Midnight Blizzard

Collection

Source code access

T1213

SCM audit logs

Repo clone from service principal or unusual IP

Midnight Blizzard

Exfiltration

Cloud service upload

T1567

DLP/Proxy

Large upload to unsanctioned cloud storage

APT29, Turla

Exfiltration

DNS tunneling

T1071.004

DNS logs

High-entropy subdomain queries to single domain

APT28

Impact

Disk wiper

T1561.002

EDR / Sysmon

Raw disk write by unexpected process OR mass file overwrite

Sandworm, Cadet Blizzard

Impact

ICS command injection

T0855

OT NDR

IEC-104 command from non-SCADA source

Sandworm

Impact

GPO-deployed wiper

T1484.001

WinSec 5136

GPO + SYSVOL script + mass execution

Sandworm

Pre-Impact

VSS/backup destruction

T1490

Sysmon 1

vssadmin delete shadows /all

All (pre-wiper)


Part IV — Threat Hunt Hypotheses

Disclaimer:These hunts complement EDR/ITDR and other security tool alerting. Mature platforms may detect portions or most of this activity, but correlation, tuning, and escalation logic determine whether intrusion is caught pre-impact or post-destruction.

Hunt 1: Midnight Blizzard — Orphaned OAuth Applications

Hypothesis: Legacy OAuth applications with elevated permissions are being abused for mailbox access without interactive sign-in.

Note: Mature ITDR platforms may alert on anomalous OAuth activity — validate coverage before building custom logic.

Core Detection Logic:

  • Enumerate all OAuth app registrations in Entra ID with Mail.Read, Mail.ReadWrite, Mail.Send, or full_access_as_app permissions

  • Cross-reference against approved application inventory

  • Flag: Any app not in approved inventory with mail permissions = immediate review

  • Secondary: OAuth app accessing >10 distinct mailboxes OR mailboxes of executives/security team

High Confidence: Any legacy OAuth app (created >1 year ago) with mail permissions that was not recently re-consented by an admin = HIGH risk. Midnight Blizzard specifically targets dormant, forgotten applications.


Hunt 2: APT28 — Outlook NTLM Relay Artifacts

Hypothesis: Crafted calendar/task items with UNC paths triggering automatic NTLM authentication to attacker-controlled servers.

Core Detection Logic:

  • Search Exchange mailbox items (calendar entries, tasks, notes) for properties containing UNC paths (\\IP\share or \\hostname\share)

  • Correlate with outbound SMB (TCP 445) or WebDAV traffic to external IPs

  • Check for Impacket ntlmrelayx signatures on network perimeter

Alert Threshold: Any Exchange item containing UNC path to external IP = CRITICAL. No legitimate business reason for calendar items to reference external file shares via UNC.


Hunt 3: Sandworm — Pre-Wiper Staging Activity

Hypothesis: GRU operator is preparing environment for destructive wiper deployment.

Core Detection Stack (correlate within 48h window, tune per environment):

  • vssadmin delete shadows /all

  • wbadmin delete catalog -quiet or wbadmin delete systemstatebackup

  • bcdedit /set {default} recoveryenabled No

  • GPO modification with script deployment to server OUs

  • SYSVOL write of executable/script files

Escalation Logic:

  • 1 indicator → HIGH

  • 2+ indicators on same host or within same AD site → CRITICAL (assume imminent wiper deployment)

  • GPO modification + SYSVOL script + VSS deletion = CRITICAL — initiate containment immediately

CRITICAL: Russia's historical wiper deployments were preceded by hours (not weeks) of pre-staging. If these capabilities are turned against US targets, detection-to-containment SLA must be measured in minutes, not days.


Hunt 4: Residential Proxy Password Spray

Hypothesis: SVR is conducting low-volume password spray through distributed residential proxy infrastructure to avoid lockout thresholds.

Core Detection Logic:

  • Aggregate all Entra ID sign-in failures over 24h rolling window

  • Filter for source IPs mapping to residential ISP ASNs (not commercial/VPN/enterprise)

  • Correlate: >20 distinct residential IPs attempting auth against same tenant with <5 attempts per IP

  • Secondary: Successful auth from residential IP immediately following distributed failure pattern

Alert Threshold: Distributed residential-IP auth failures across >10 IPs targeting same tenant within 24h = HIGH. Successful login from residential IP after failure pattern = CRITICAL.


Hunt 5: AD FS / Federated Authentication Backdoor

Hypothesis: APT29 has backdoored AD FS to forge authentication tokens (FoggyWeb / MagicWeb pattern).

Core Detection Logic:

  • Audit all DLLs loaded by AD FS service process against known-good baseline

  • Check AD FS configuration database for unauthorized modifications

  • Monitor access to DKM (Distributed Key Management) container in Active Directory

  • Verify token-signing certificate has not been exported or duplicated

Alert Threshold: Any unexpected DLL in AD FS process = CRITICAL. Any DKM container access from non-AD-FS server = CRITICAL. Token-signing certificate export event = CRITICAL. These are definitive indicators of authentication infrastructure compromise.


Hunt 6: Turla — Multi-Actor Infrastructure Overlap

Hypothesis: Turla is operating through C2 infrastructure belonging to another threat actor, making attribution and scoping incomplete.

Core Detection Logic:

  • For any confirmed intrusion attributed to a non-Russian APT: check for secondary implants not matching the attributed actor's known tooling

  • Look for TinyTurla, TwoDash, Statuezy, MiniPocket indicators alongside non-Russian APT tools

  • Monitor for unexplained lateral movement or data access that exceeds the attributed actor's known objectives

Alert Threshold: Finding implants from two distinct threat actors in the same environment = immediate re-scoping of incident. Turla's infrastructure parasitism means single-actor attribution may miss the more dangerous operator.


Hunt 7: Sandworm BadPilot — Edge Device Compromise

Hypothesis: Sandworm subgroup has exploited known vulnerabilities in internet-facing applications for persistent access.

Core Detection Logic:

  • Audit all internet-facing Exchange, Fortinet, ConnectWise ScreenConnect, and WatchGuard appliances for patch status

  • Check for web shells in Exchange web paths (aspnet_client, OWA/auth)

  • Review ConnectWise ScreenConnect for unauthorized admin accounts (CVE-2024-1709 auth bypass)

  • Fortinet: Check for unauthorized admin accounts or configuration changes post-CVE-2023-48788

Alert Threshold: Any unpatched internet-facing application in the BadPilot target set = assume compromised until verified. Any web shell or unauthorized admin account = CRITICAL.


Part V — Leadership Briefing: Strategic Threat Posture

The Strategic Reality

Russia's cyber threat is fundamentally different from China (patient, infrastructure-focused espionage), Iran (reactive, escalation-driven), and DPRK (financially motivated theft). Russia operates as a multi-doctrine adversary: its GRU units conduct destruction and critical infrastructure pre-positioning against Western targets, its SVR conducts patient strategic espionage through US cloud infrastructure, and its FSB conducts targeted credential theft and influence operations — all simultaneously, against overlapping target sets, with different risk tolerances and detection profiles.

The key insight: you are not facing one Russian cyber threat — you are facing three organizationally distinct threats that happen to share a flag. Each requires a different detection investment. The SVR has already breached Microsoft. Sandworm is already targeting US energy and telecom. Star Blizzard is already phishing US think tanks and defense researchers.

Three Things Leadership Must Understand

  1. Cloud identity is the SVR's primary attack surface — and they have already compromised the providers.

Midnight Blizzard breached Microsoft's own corporate environment through a password spray against a test account without MFA. They then pivoted via a legacy OAuth application to access senior leadership email and source code. If the SVR can compromise Microsoft, your cloud tenant's security posture matters enormously. The most impactful defensive investment against SVR espionage is cloud identity hygiene: eliminate legacy OAuth apps, enforce MFA on all accounts (including test/dev/service), implement conditional access policies, and monitor the M365 Unified Audit Log continuously.

Investment priority: Complete OAuth application audit, legacy tenant cleanup, MFA enforcement on all accounts including service principals, and E5-level UAL monitoring.

  1. Russia has demonstrated industrial-scale destructive capability — and it is now targeting the US.

GRU units proved they can produce 9+ distinct wiper families in a single year. AcidRain disrupted internet across Europe via Viasat satellite modems. By 2025, Sandworm's BadPilot campaign confirmed active targeting of US, UK, Canadian, and Australian organizations in energy, telecom, and government sectors. The destructive capability has been proven, the targeting has gone global, and the pre-positioning is underway.

Investment priority: Destructive malware pre-staging detection (VSS deletion, backup destruction, GPO-deployed scripts), OT/ICS network segmentation, and incident response playbooks that account for wiper scenarios (where "restore from backup" IS the recovery, not "patch and reimage").

  1. The APT28 Outlook vulnerability was exploited for 20 months before disclosure — zero-click, zero-interaction.

CVE-2023-23397 required no user interaction — receiving the crafted email was sufficient to trigger NTLM authentication to the attacker's server. APT28 exploited it against 30+ organizations across 14 NATO nations for 20 months before it was patched. This is not a theoretical risk — it is a demonstrated capability where receiving an email compromises your credentials.

Investment priority: Aggressive patch management for email infrastructure (Exchange on-premises and Exchange Online), NTLM relay protections (EPA for Exchange, SMB signing, restrict outbound SMB), and credential hygiene that limits the blast radius of a stolen NTLM hash.

Risk Prioritization by Actor

Actor

Likelihood

Impact

Your Asset at Risk

Midnight Blizzard (APT29/SVR)

HIGH (demonstrated breach of Microsoft, TeamViewer; active targeting of US gov/tech)

CRITICAL

Executive communications, source code, authentication infrastructure

APT28 (GRU 26165)

HIGH (broad US/NATO gov/defense targeting; Outlook zero-day precedent)

HIGH

Credentials (NTLM), email, military/defense intelligence

Sandworm (GRU 74455)

HIGH (confirmed US energy/telecom targeting via BadPilot)

CRITICAL

OT/ICS systems, power grid, satellite communications, data destruction

Cadet Blizzard (GRU 29155)

MEDIUM (NATO-focused, expanding scope)

HIGH

Data destruction, reputational damage

Turla (FSB Center 16)

MEDIUM (highly targeted but sophisticated)

HIGH

Long-duration espionage, diplomatic/military intelligence

Gamaredon (FSB 5th Service)

LOW (historically regionally focused)

MEDIUM

Government communications, regional intelligence

Star Blizzard (FSB Center 18)

MEDIUM–HIGH (active campaigns against US think tanks, academia, defense)

HIGH

Credentials, email access, influence operations

This document reflects threat intelligence through March 2026, including the 2026 Annual threat reports published by reputed vendors, and campaign reporting through Q1 2026. Russia's operational tempo against US and Western targets has increased steadily since 2022 and shows no signs of abatement. When reviewing this document's currency, always check current US-Russia geopolitical status.


Master References Index

Annual Threat Intelligence Reports

Report

Publisher

Year

Global Threat Report

CrowdStrike

2022 - 2026

Threat Hunting Report

CrowdStrike

2021 - 2025

M-Trends Report

Mandiant / Google Cloud

2021 - 2026

Microsoft Digital Defense Report

Microsoft

2021 - 2025

Global Incident Response Report

Unit 42 (Palo Alto Networks)

2025 - 2026

IBM X-Force Threat Intelligence Index

IBM X-Force

2025

Cybersecurity Report

Check Point Research

2022 - 2026

ODNI Annual Threat Assessment

Office of the Director of National Intelligence

2022–2025

FBI Internet Crime Report

FBI IC3

2021–2024

Additional Vendor Reports

Report

Publisher

Year

OT/ICS Cybersecurity Year in Review 2025

Dragos

2026

Red Canary Threat Detection Report

Red Canary

2025

Sophos Threat Report

Sophos

2025

Trellix Advanced Threat Research Report

Trellix

2024

Government & Regulatory Advisories

Identifier

Title

Publisher

Year

AA22-110A

Russian State-Sponsored and Criminal Cyber Threats to Critical Infrastructure

CISA / FBI / NSA / Five Eyes

April 2022

AA22-011A

Understanding and Mitigating Russian State-Sponsored Cyber Threats to US Critical Infrastructure

CISA / FBI / NSA

January 2022

AA22-047A

Russian State-Sponsored Cyber Actors Target Cleared Defense Contractor Networks

CISA / FBI / NSA

February 2022

AA22-057A

Destructive Malware Targeting Organizations in Ukraine (WhisperGate)

CISA

February 2022

AA23-341A

Russia's FSB Malicious Cyber Activity — Star Blizzard

CISA / NCSC-UK / FBI / NSA

December 2023

AA23-347A

Russian Foreign Intelligence Service (SVR) Exploiting JetBrains TeamCity CVE Globally

CISA / FBI / NSA / Five Eyes

December 2023

AA24-057A

SVR Cyber Actors Adapt Tactics for Initial Cloud Access

CISA / NCSC-UK / NSA / FBI

February 2024

Shields Up

Shields Up — Guidance for Organizations in Response to Russian Cyber Threats

CISA

February 2022 (ongoing)

Russia Cyber Threat Overview

Russia Cyber Threat Overview and Advisories

CISA

Ongoing

GRU Unit 29155 Indictment

Six Russian GRU Officers Charged in Connection with Worldwide Deployment of Destructive Malware (Sandworm)

US Department of Justice

October 2020

Cadet Blizzard Reward

Rewards for Justice — Russian Military Intelligence Officers (WhisperGate / Unit 29155)

US Department of State

September 2024

Campaign-Specific Vendor Reporting (2021–2026)

Campaign / Actor

Report Title

Publisher

Year

WhisperGate / Cadet Blizzard

Destructive Malware Targeting Ukrainian Organizations

Microsoft MSTIC

January 2022

Cadet Blizzard

Cadet Blizzard Emerges as a Novel and Distinct Russian Threat Actor

Microsoft MSTIC

June 2023

HermeticWiper

HermeticWiper: New Data-Wiping Malware Hits Ukraine

ESET (WeLiveSecurity)

February 2022

HermeticWiper

HermeticWiper — Ukraine Under Attack

SentinelLabs

February 2022

Industroyer2 / Sandworm

Industroyer2: Industroyer Reloaded

ESET (WeLiveSecurity)

April 2022

AcidRain / Sandworm

AcidRain: A Modem Wiper Rains Down on Europe

SentinelLabs

March 2022

AcidPour / Sandworm

AcidPour: New Embedded Wiper Variant of AcidRain Appears in Ukraine

SentinelLabs

2024

Ukraine Wiper Campaign

A Year of Wiper Attacks in Ukraine

ESET (WeLiveSecurity)

February 2023

Sandworm / APT44

Unearthing APT44: Russia's Notorious Cyber Sabotage Unit Sandworm

Mandiant / Google Cloud

April 2024

Sandworm / Industroyer2

Sandworm Disrupts Power in Ukraine Using Novel OT Attack

Mandiant / Google Cloud

November 2022

Sandworm / BadPilot

The BadPilot Campaign: Seashell Blizzard Subgroup Conducts Multiyear Global Access Operation

Microsoft Threat Intelligence

February 2025

Sandworm / Poland

Sandworm Cyberattack on Poland Power Grid (Late 2025)

ESET Research

2025

Sandworm / SwiftSlicer

Sandworm: A Tale of Disruption Told Anew

ESET (WeLiveSecurity)

March 2022

Midnight Blizzard / Microsoft Breach

Midnight Blizzard: Guidance for Responders on Nation-State Attack

Microsoft Security Blog

January 2024

Midnight Blizzard / Microsoft Breach

Microsoft Actions Following Attack by Nation-State Actor Midnight Blizzard

Microsoft MSRC

January 2024

Midnight Blizzard / Microsoft Breach

Update on Microsoft Actions Following Attack by Midnight Blizzard

Microsoft MSRC

March 2024

Midnight Blizzard / RDP Phishing

Midnight Blizzard Conducts Large-Scale Spear-Phishing Campaign Using RDP Files

Microsoft Security Blog

October 2024

Midnight Blizzard / Teams

Midnight Blizzard Conducts Targeted Social Engineering Over Microsoft Teams

Microsoft Security Blog

August 2023

Midnight Blizzard / Cloud Tactics

SVR Cyber Actors Adapt Tactics for Initial Cloud Access

CISA / NCSC-UK / NSA / FBI

February 2024

APT29 / Diplomatic Phishing

APT29 Rapidly Evolving Diplomatic Phishing Operations

Mandiant / Google Cloud

2022

APT29 / Watering Hole 2025

Amazon Disrupts Watering Hole Campaign by Russia's APT29

AWS Security Blog

2025

APT28 / CVE-2023-23397

Russian APT Fighting Ursa Exploits CVE-2023-23397

Unit 42 (Palo Alto Networks)

2023

APT28 / GooseEgg (CVE-2022-38028)

Analyzing Forest Blizzard's Custom Post-Compromise Tool for Exploiting CVE-2022-38028

Microsoft Security Blog

April 2024

APT28 / CVE-2023-23397

Guidance for Investigating Attacks Using CVE-2023-23397

Microsoft Security Blog

March 2023

Turla / Secret Blizzard

Frequent Freeloader Part I: Secret Blizzard Compromising Storm-0156 Infrastructure

Microsoft Security Blog

December 2024

Star Blizzard

Star Blizzard Continues Spear-Phishing Campaigns

NCSC-UK

December 2023

Star Blizzard / WhatsApp

New Star Blizzard Spear-Phishing Campaign Targets WhatsApp Accounts

Microsoft Security Blog

January 2025

TeamViewer / Midnight Blizzard

TeamViewer Corporate Network Breached in APT Attack

BleepingComputer

June 2024

APT28 / Operation Neusploit

APT28 Stealthy Campaign Leveraging CVE-2026-21509 and Cloud C2

Trellix

February 2026

APT28 / BadPaw & MeowMeow

Russian APT Targets with BadPaw and MeowMeow Malware

SecurityAffairs

2026

Star Blizzard / DarkSword

Star Blizzard Targets Reporters with DarkSword iOS Exploit Kit

Infosecurity Magazine

March 2026

Sandworm / Global Infrastructure

Sandworm: Russia's Global Infrastructure Wrecking Crew

Barracuda Networks

March 2026

Pro-Russia Hacktivists / OT

Opportunistic Pro-Russia Hacktivists Attack US and Global Critical Infrastructure

CISA / FBI / NSA / EPA / DoD

December 2025

Russia Cyber Overview

Dark Covenant 2.0: Cybercrime, Russian State, and War in Ukraine

Recorded Future Insikt Group

2024

Russia Cyber Overview

Russia's Invasion of Ukraine: Likely Retaliation

Mandiant / Google Cloud

2022

Russian State-Actor Overview

TAG-110 Targets Asia and Europe with HATVIBE and CHERRYSPY

Recorded Future Insikt Group

2024

APT29 / BlueBravo

BlueBravo Adapts to Target Diplomatic Entities with GraphicalProton

Recorded Future Insikt Group

2023

MITRE ATT&CK Group Profiles

Group ID

Name

Profile Link

Deepak Mangipudi
Deepak Mangipudi

Staff Engineer - Detection and Response, Aviatrix

Deepak is a Staff Engineer, Detection & Response at Aviatrix, specializing in detection engineering and adversary behavior analysis. He collaborates with cross-functional teams to identify emerging threats, design high-signal detections, and strengthen response capabilities across complex cloud and hybrid infrastructures.

Read Full Bio
PODCAST

Altitude

Secure The Connections Between Your Clouds and Cloud Workloads

Leverage a security fabric to meet compliance and reduce cost, risk, and complexity.

Cta pattren Image