Russian Hackers Target Ukraine Using Cybercriminal Tools, Microsoft Reports
A Russian state-backed hacking group has been targeting Ukraine’s military using tools originally developed by cybercriminals, according to new research from Microsoft. The findings highlight the evolving tactics of nation-state cyberespionage operations.
Key Findings from Microsoft’s Report
Microsoft’s recent report reveals that a hacking group it identifies as Secret Blizzard - known to be affiliated with Russia’s Federal Security Service (FSB) - utilized a criminal botnet called Amadey in attacks against Ukrainian military targets between March and April 2024.
About Secret Blizzard
- Identified by CISA as a unit within FSB’s Center 16
- Also known as Turla in cybersecurity circles (MITRE ID: G0010)
- Specializes in long-term espionage against government and defense targets
The Amadey Botnet Connection
Microsoft researchers discovered that Secret Blizzard leveraged the Amadey botnet, which is:
- Typically used by cybercriminals for cryptocurrency mining
- Allegedly sold on Russian hacking forums
- Potentially accessed through purchase or unauthorized means
“Using commodity tools allows threat actors to potentially hide their origin and make attribution more difficult,” explained Sherrod DeGrippo, Microsoft’s Director of Threat Intelligence Strategy.
Attack Methodology and Targets
The campaign specifically targeted:
- Ukrainian Army systems
- Ukrainian Border Guard infrastructure
- Devices using Starlink satellite internet (crucial for Ukrainian military operations)
The hackers deployed custom malware designed to:
- Gather system information (device names, security software)
- Determine target value for further exploitation
- Potentially deploy additional tools like Tavdig and KazuarV2 backdoors
A Pattern of Cyber Espionage
This marks at least the second time since 2022 that Secret Blizzard has:
- Leveraged cybercriminal infrastructure for state-sponsored attacks
- Demonstrated a pattern of “freeloading” on other hackers’ tools
- Previously exploited Pakistani and Iranian hacking groups’ infrastructure
Implications for Cybersecurity
The incident highlights:
- The blurring lines between cybercrime and nation-state operations
- Growing sophistication in attribution evasion techniques
- The importance of monitoring criminal malware markets for state-actor activity
Microsoft continues to investigate how Secret Blizzard gained access to the Amadey botnet. Neither the Russian embassy in Washington nor the FSB responded to requests for comment.
Correction: This story was updated on December 11 to correct a link to a CISA report.
📚 Featured Products & Recommendations
Discover our carefully selected products that complement this article’s topics:
🛍️ Featured Product 1: AIR JORDAN 12 RETRO “MELO”
Image: Premium product showcase
Advanced air jordan 12 retro “melo” engineered for excellence with proven reliability and outstanding results.
Key Features:
- Cutting-edge technology integration
- Streamlined workflow optimization
- Heavy-duty construction for reliability
- Expert technical support available
🔗 View Product Details & Purchase
💡 Need Help Choosing? Contact our expert team for personalized product recommendations!