Movatterモバイル変換


[0]ホーム

URL:


  1. Home
  2. Groups
  3. Star Blizzard

Star Blizzard

Star Blizzard is a cyber espionage and influence group originating in Russia that has been active since at least 2019.Star Blizzard campaigns align closely with Russian state interests and have included persistent phishing and credential theft against academic, defense, government, NGO, and think tank organizations in NATO countries, particularly the US and the UK.[1][2][3][4]

ID: G1033
Associated Groups: SEABORGIUM, Callisto Group, TA446, COLDRIVER
Contributors: Aung Kyaw Min Naing, @Nolan
Version: 2.0
Created: 14 June 2024
Last Modified: 22 October 2025

Associated Group Descriptions

NameDescription
SEABORGIUM

[1]

Callisto Group

[2]

TA446

[2]

COLDRIVER

[4]

Enterprise Layer
downloadview
Mobile Layer
downloadview

Techniques Used

DomainIDNameUse
EnterpriseT1583Acquire Infrastructure

Star Blizzard has used HubSpot and MailerLite marketing platform services to hide the true sender of phishing emails.[3]

.001Domains

Star Blizzard has registered domains using randomized words and with names resembling legitimate organizations.[2][3]

EnterpriseT1059.007Command and Scripting Interpreter:JavaScript

Star Blizzard has used JavaScript to redirect victim traffic from an adversary controlled server to a server hosting the Evilginx phishing framework.[3]

EnterpriseT1586.002Compromise Accounts:Email Accounts

Star Blizzard has used compromised email accounts to conduct spearphishing against
contacts of the original victim.[2]

EnterpriseT1114.002Email Collection:Remote Email Collection

Star Blizzard has remotely accessed victims' email accounts to steal messages and attachments.[2]

.003Email Collection:Email Forwarding Rule

Star Blizzard has abused email forwarding rules to monitor the activities of a victim, steal information, and maintain persistent access after compromised credentials are reset.[1][2]

EnterpriseT1585.001Establish Accounts:Social Media Accounts

Star Blizzard has established fraudulent profiles on professional networking sites to conduct reconnaissance.[1][2]

.002Establish Accounts:Email Accounts

Star Blizzard has registered impersonation email accounts to spoof experts in a particular field or individuals and organizations affiliated with the intended target.[1][2][4]

EnterpriseT1589Gather Victim Identity Information

Star Blizzard has identified ways to engage targets by researching potential victims' interests and social or professional contacts.[2]

EnterpriseT1588.002Obtain Capabilities:Tool

Star Blizzard has incorporated the open-source EvilGinx framework into their spearphishing activity.[2][3]

EnterpriseT1566.001Phishing:Spearphishing Attachment

Star Blizzard has sent emails with malicious .pdf files to spread malware.[4]

EnterpriseT1598.002Phishing for Information:Spearphishing Attachment

Star Blizzard has sent emails to establish rapport with targets eventually sending messages with attachments containing links to credential-stealing sites.[1][2][3][4]

.003Phishing for Information:Spearphishing Link

Star Blizzard has sent emails to establish rapport with targets eventually sending messages with links to credential-stealing sites.[1][2][3][4]

EnterpriseT1593Search Open Websites/Domains

Star Blizzard has used open-source research to identify information about victims to use in targeting.[1][2]

EnterpriseT1608.001Stage Capabilities:Upload Malware

Star Blizzard has uploaded malicious payloads to cloud storage sites.[4]

EnterpriseT1539Steal Web Session Cookie

Star Blizzard has used EvilGinx to steal the session cookies of victims directed to
phishing domains.[2]

EnterpriseT1550.004Use Alternate Authentication Material:Web Session Cookie

Star Blizzard has bypassed multi-factor authentication on victim email accounts by using session cookies stolen using EvilGinx.[2]

EnterpriseT1204.002User Execution:Malicious File

Star Blizzard has lured targets into opening malicious .pdf files to deliver malware.[4]

EnterpriseT1078Valid Accounts

Star Blizzard has used stolen credentials to sign into victim email accounts.[1][2]

MobileT1676Linked Devices

Star Blizzard has used the linked devices feature to connect WhatsApp accounts to adversary-controlled infrastructure and/or the WhatsApp Web portal for message exfiltration.[5]

Software

References

×

[8]ページ先頭

©2009-2026 Movatter.jp