HomeVulnerabilityDOJ seizes 41 Russian-controlled domains in cyber-espionage crackdown

DOJ seizes 41 Russian-controlled domains in cyber-espionage crackdown

The US Division of Justice (DOJ) has seized 41 web domains utilized by Russian intelligence brokers and their allies for cyberattacks on the US. This marks a significant transfer to dam state-sponsored cybercriminals from stealing delicate data.

“These Russian domains had been getting used to trick Individuals into giving up their private information,” Deputy Legal professional Normal Lisa Monaco stated in a press release. “The Russian authorities ran this scheme to steal Individuals’ delicate data, utilizing seemingly reputable e mail accounts to trick victims into revealing account credentials.”

The seized domains had been utilized by a hacker group linked to an operational unit inside Middle 18 of the Russian Federal Safety Service (FSB), generally known as the Callisto Group, to commit violations of unauthorized entry to a pc to acquire data from a division or company of the US, the DOJ assertion added.

The group carried out spear phishing campaigns designed to realize unauthorized entry to the computer systems and e mail accounts of US authorities companies, protection contractors, and different delicate organizations.

See also  LayerX Safety Raises $26M for its Browser Safety Platform, Enabling Workers to Work Securely from Any Browser, Wherever

The motion, a part of the Nationwide Cybersecurity Technique, was carried out alongside a civil lawsuit filed by Microsoft to take down an extra 66 domains managed by the identical actors.

“This motion is a part of our broader mission to guard folks, companies, and governments from cyberattacks by overseas adversaries,” Assistant Legal professional Normal Matthew G. Olsen stated in a press release. “Partnering with personal sector leaders like Microsoft permits us to strike again at these dangerous actors.”

Microsoft, which tracks the group beneath the identify “Star Blizzard” (previously SEABORGIUM), reported that between January 2023 and August 2024, the group focused greater than 30 civil society organizations, together with journalists and NGOs, by deploying spear-phishing campaigns to exfiltrate delicate data and intervene of their actions.

“Collectively, we’ve got seized greater than 100 web sites,” Microsoft stated in a press release. “Rebuilding infrastructure takes time, absorbs assets, and prices cash. By collaborating with DOJ, we’ve got been in a position to broaden the scope of disruption and seize extra infrastructure, enabling us to ship larger impression in opposition to Star Blizzard.”

See also  Nominations for CSO30 Australia 2024 open

“Subtle state-sponsored hacking operations demand proactive collaboration between governments and world tech corporations,” stated Pareekh Jain, CEO of Pareekh Consulting. “The partnership between Microsoft and the US authorities serves as a robust instance.”

Transferring ahead, extra world tech corporations mustn’t solely collaborate with governments but additionally with each other, sharing data and intelligence proactively, he added. “This method may also help stop and mitigate such hacking operations.”

A question searching for feedback from Microsoft stays unanswered.

Russia’s cyber espionage marketing campaign

The DOJ’s transfer is the newest in a collection of efforts to counter Russian cyber espionage. Previously, the Callisto Group actors have focused US-based corporations, former staff of the US Intelligence Neighborhood, former and present Division of Protection and Division of State staff, US army protection contractors, and workers on the Division of Vitality, amongst others.

In December 2023, the US DOJ charged two members of the Callisto Group – Ruslan Aleksandrovich Peretyatko, an officer in FSB Middle 18, and Andrey Stanislavovich Korinets – with hacking authorities and company networks. The indictment charged the defendants with a marketing campaign to hack into pc networks within the US, the UK, different North Atlantic Treaty Group member nations, and Ukraine, all on behalf of the Russian authorities, the assertion added.

See also  AI adoption in security taking off amid funds, belief, and skill-based points

“The Russia-based actor Star Blizzard (previously generally known as SEABORGIUM, also referred to as Callisto Group/TA446/COLDRIVER/TAG-53/BlueCharlie) continues to efficiently use spear-phishing assaults in opposition to focused organizations and people within the UK, and different geographical areas of curiosity, for information-gathering exercise,” America’s Cybersecurity & Infrastructure Safety Company (CISA) stated in a December 2023 advisory.

The FBI’s San Francisco workplace is main the continued investigation into this case, because the US authorities works with private and non-private companions to dismantle these cybercriminal networks.

- Advertisment -spot_img
RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

- Advertisment -

Most Popular