Lord777
Professional
- Messages
- 2,577
- Reaction score
- 1,556
- Points
- 113
Researchers detailed the activity of the Cadet Blizzard group in a recent series of attacks.
Microsoft linked a hacker group to Russia that they have been tracking since April of this year, codenamed "Cadet Blizzard."
According to Microsoft Threat Intelligence, the group began its activities back in 2020, giving priority to attacks on government services, law enforcement agencies, non-profit/non-governmental organizations, IT service providers and emergency services of Ukraine.
Redmond experts also associate the group with the spread of the WhishperGate viper, which once disabled many government computers.
However, Microsoft estimates the impact of Cadet Blizzard attacks to be relatively low compared to other hacker groups such as APT28 (Strontium, Fancy Bear) and Sandworm (Iridium).
Although Cadet Blizzard disappeared from the radar after June 2022, the group resumed its activities in early 2023. Its later cyber operations were sometimes quite successful, but still did not achieve the same effect and scale as other similar groups.
"Cadet Blizzard is active seven days a week and conducts its operations outside of the business hours of its primary goals, when its activity is less likely to be detected. In addition to Ukraine, it also focuses on the NATO member states involved in supporting Ukraine, " said Tom Burt, Microsoft's vice president of Security and Customer Trust.
It is worth noting that Russia has repeatedly denied its involvement in such operations in cyberspace, and the information from the Microsoft report should be treated with skepticism.
Microsoft linked a hacker group to Russia that they have been tracking since April of this year, codenamed "Cadet Blizzard."
According to Microsoft Threat Intelligence, the group began its activities back in 2020, giving priority to attacks on government services, law enforcement agencies, non-profit/non-governmental organizations, IT service providers and emergency services of Ukraine.
Redmond experts also associate the group with the spread of the WhishperGate viper, which once disabled many government computers.
However, Microsoft estimates the impact of Cadet Blizzard attacks to be relatively low compared to other hacker groups such as APT28 (Strontium, Fancy Bear) and Sandworm (Iridium).
Although Cadet Blizzard disappeared from the radar after June 2022, the group resumed its activities in early 2023. Its later cyber operations were sometimes quite successful, but still did not achieve the same effect and scale as other similar groups.
"Cadet Blizzard is active seven days a week and conducts its operations outside of the business hours of its primary goals, when its activity is less likely to be detected. In addition to Ukraine, it also focuses on the NATO member states involved in supporting Ukraine, " said Tom Burt, Microsoft's vice president of Security and Customer Trust.
It is worth noting that Russia has repeatedly denied its involvement in such operations in cyberspace, and the information from the Microsoft report should be treated with skepticism.
