Russian Sandworm Subgroup Expands Global Cyberattack Campaign
- A subgroup of Russia's Sandworm has accessed networks in the US, UK, Canada, and Australia, stealing credentials and data from a limited number of organizations, according to Microsoft.
- The Sandworm subgroup, tracked by Microsoft as Seashell Blizzard, has been running a near-global campaign called BadPilot since at least 2021.
- By 2023, the BadPilot campaign gained persistent access to numerous high-value sectors in the US, Europe, Central Asia, and the Middle East.
- In early 2024, the subgroup started using remote management tools for persistence and communication with command-and-control servers, according to Microsoft.
Insights by Ground AI
Does this summary seem wrong?
14 Articles
14 Articles
All
Left
1
Center
3
Right
A Hacker Group Within Russia’s Notorious Sandworm Unit Is Breaching Western Networks
A team Microsoft calls BadPilot is acting as Sandworm's “initial access operation,” the company says. And over the last year it's trained its sights on the US, the UK, Canada, and Australia.
·United States
Read Full ArticleCoverage Details
Total News Sources14
Leaning Left1Leaning Right0Center3Last UpdatedBias Distribution75% Center
Bias Distribution
- 75% of the sources are Center
75% Center
L 25%
C 75%
Factuality
To view factuality data please Upgrade to Premium
Ownership
To view ownership data please Upgrade to Vantage