CyberSecurity updates
2025-02-23 19:16:13 Pacfic

Russian Seashell Blizzard Hackers Target High-Value Targets - 10d
Read more: www.microsoft.com

A subgroup of the Russian state-sponsored hacking group APT44, also known as Seashell Blizzard and Sandworm, has been conducting a multi-year campaign named BadPilot, targeting critical organizations and governments. Microsoft's Threat Intelligence team has been researching this operation, revealing that the group aims to gain initial access to strategically important organizations across the U.S. and Europe. This campaign has been active since at least 2021, with the threat actor focusing on initial access, persistence, and maintaining presence to allow for tailored network operations.

The BadPilot hackers have expanded their focus beyond Ukraine and Eastern Europe, now including targets in the U.S. and U.K. since early 2024. Sectors affected include energy, oil and gas, telecommunications, shipping, arms manufacturing, and government entities. Microsoft assesses that while some targeting is opportunistic, the accumulated compromises offer Seashell Blizzard options when responding to Russia’s evolving strategic objectives and national priorities. The group has been exploiting vulnerabilities in ConnectWise ScreenConnect and Fortinet FortiClient EMS security software to achieve this broadened access.