ETDA สำนักงานพัฒนาธุรกรรมทางอิเล็กทรอนิกส์
Electronic Transactions Development Agency
Home > List all groups > Gamaredon Group

Threat Group Cards: A Threat Actor Encyclopedia

Permanent link APT group: Gamaredon Group

NamesGamaredon Group (Palo Alto)
Winterflounder (iDefense)
Primitive Bear (CrowdStrike)
BlueAlpha (Recorded Future)
Blue Otso (PWC)
Iron Tilden (SecureWorks)
Armageddon (SSU)
SectorC08 (ThreatRecon)
Callisto (NATO Association of Canada)
CountryRussia Russia
SponsorState-sponsored, FSB 16th & 18th Centers
MotivationInformation theft and espionage
First seen2013
Description(Lookingglass) The Lookingglass Cyber Threat Intelligence Group (CTIG) has been tracking an ongoing cyber espionage campaign named “Operation Armageddon”. The name was derived from multiple Microsoft Word documents used in the attacks. “Armagedon” (spelled incorrectly) was found in the “Last Saved By” and “Author” fields in multiple Microsoft Word documents. Although continuously developed, the campaign has been intermittently active at a small scale, and uses unsophisticated techniques. The attack timing suggests the campaign initially started due to Ukraine’s decision to accept the Ukraine-­‐European Union Association Agreement (AA). The agreement was designed to improve economic integrations between Ukraine and the European Union. Russian leaders publicly stated that they believed this move by Ukraine directly threatened Russia’s national security. Although initial steps to join the Association occurred in March 2012, the campaign didn’t start until much later (mid‐2013), as Ukraine and the EU started to more actively move towards the agreement.

Russian actors began preparing for attacks in case Ukraine finalized the AA. The earliest identified modification timestamp of malware used in this campaign is June 26, 2013. A group of files with modification timestamps between August 12 and September 16, 2013 were used in the first wave of spear-phishing attacks, targeting government officials prior to the 10th Yalta Annual Meeting: “Changing Ukraine in a Changing World: Factors of Success.”
ObservedSectors: Defense, Government, Law enforcement, NGOs and diplomats and journalists.
Countries: Albania, Austria, Australia, Bangladesh, Brazil, Canada, Chile, China, Colombia, Croatia, Denmark, Georgia, Germany, Guatemala, Honduras, India, Indonesia, Iran, Israel, Italy, Japan, Kazakhstan, Malaysia, Netherlands, Nigeria, Norway, Pakistan, Papua New Guinea, Poland, Portugal, Romania, Russia, South Africa, South Korea, Spain, Sweden, Turkey, UK, Ukraine, USA, Vietnam.
Tools usedAversome infector, EvilGnome, FRAUDROP, Gamaredon, Pteranodon, RMS, Resetter, UltraVNC.
Operations performedApr 2019The discovered attack appears to be designed to lure military personnel: it leverages a legit document of the “State of the Armed Forces of Ukraine” dated back in the 2nd April 2019.
May 2019The Gamaredon attacks against Ukraine doesn’t seem to have stopped. After a month since our last report we spotted a new suspicious email potentially linked to the Gamaredon group.
Jul 2019EvilGnome: Rare Malware Spying on Linux Desktop Users
Oct 2019Lure documents observed appear to target Ukrainian entities such as diplomats, government employees, military officials, and more.
Nov 2019New wave of attacks
Dec 2019Gamaredon APT Improves Toolset to Target Ukraine Government, Military
Mar 2020Moving into March 2020, countries worldwide are still struggling to manage the spread of the viral disease now known as COVID-19. In cyberspace, threat actors are using the topic of COVID-19 to their advantage with numerous examples of malicious activity using COVID-19 as lure documents in phishing campaigns.
Apr 2020The attacks we found all arrived through targeted emails (MITRE ATT&CK framework ID T1193). One of them even had the subject “Coronavirus (2019-nCoV).”
Jan 2021Russia-Sponsored Group Employs Apparently Legitimate Documents Aligned to Growing Hostilities Between Russia and Ukraine

Last change to this card: 06 November 2021

Download this actor card in PDF or JSON format

Previous: Gallmaker
Next: Gangnam Industrial Style

Digital Service Security Center
Electronic Transactions Development Agency

Follow us on

Facebook Twitter

Report incidents

Telephone +66 (0)2-123-1227
E-mail [email protected]