"CERT-UA Uncovers Gamaredon's Rapid Data Exfiltration Tactics Following Initial Compromise"

Gamaredon, a threat actor with connections to Russia, was observed conducting data exfiltration operations within an hour of the initial compromise. As a vector of primary compromise, emails and messages in messengers (i.e., Telegram, WhatsApp, Signal) are used, in most cases, with previously compromised accounts, according to a published analysis by the Computer Emergency Response Team of Ukraine (CERT-UA). Gamaredon, also known as Aqua Blizzard, Armageddon, Shuckworm, and UAC-0010, is a state-sponsored actor connected to the SBU Main Office in the Autonomous Republic of Crimea. It is estimated that this group has infected thousands of government computers. This article continues to discuss recent findings and observations regarding Gamaredon. 

THN reports "CERT-UA Uncovers Gamaredon's Rapid Data Exfiltration Tactics Following Initial Compromise"

Submitted by Anonymous on