Diskussion:Secondary Infektion

Aus Psiram
Zur Navigation springen Zur Suche springen

Quelle: https://justpaste.it/k3tr1

Operation APT28.

GRU-Linked Infrastructure : mil.ru sso.mil.ru


APT28 Members (Unit 26165 / Unit 74455) :

Dmitriy Sergeyevich Badin — Officer, Unit 26165 — Involved in DNC hack and WADA intrusion

Ivan Sergeyevich Yermakov — Officer, Unit 26165 — Specialist in phishing infrastructure

Artem Andreyevich Malyshev — Developer, Unit 26165 — X-Agent malware developer

Aleksei Valeryevich Minin — Support staff, Unit 26165 — Logistics and ops coordination

Aleksei Sergeyevich Morenets — Operative, Unit 26165 — Field ops in The Hague (OPCW)

Evgenii Mikhaylovich Serebriakov — Operative, Unit 26165 — Participated in OPCW cyber ops

Oleg Mikhaylovich Sotnikov — Field Agent, Unit 26165 — Surveillance in cyber missions

Viktor Borisovich Netyksho — Commander, Unit 26165 — Senior leadership of GRU cyber ops

Boris Alekseyevich Antonov — Deputy Commander, Unit 26165 — Strategic coordination

Aleksey Viktorovich Lukashev — Operator, Unit 26165 — Spearphishing and email targeting

Sergey Aleksandrovich Morgachev — Officer, Unit 26165 — Lead planner in DNC breach

Nikolay Yuryevich Kozachek — Developer, Unit 26165 — Malware engineering

Pavel Vyacheslavovich Yershov — Operator, Unit 26165 — Targeting U.S. infrastructure

Aleksandr Vladimirovich Osadchuk — Director, Unit 26165 — Oversight of operations

Aleksey Aleksandrovich Potemkin — Analyst, Unit 26165 — Vulnerability and network research

Anatoliy Sergeyevich Kovalev — Operator, Unit 26165 — Spam, DDoS, and disinfo operations

Vladislav Yevgenyevich Borovkov — Unknown assignment — Possibly new operator

Yuriy Fedorovich Denisov — Unknown assignment — Possibly new operator

Summary :

APT28, also known as Fancy Bear or Sofacy, is a Russian military intelligence threat group attributed to GRU units 26165 and 74455. This group is responsible for a wide range of cyber espionage and influence operations, including :

The 2016 DNC and U.S. election interference

Attacks on NATO, Eastern European states, and anti-doping agencies

Deployment of malware families like X-Agent, CHOPSTICK, and Sednit

Use of spearphishing, credential harvesting, and advanced persistence techniques

Many of the individuals listed above have been indicted by USA federal authorities for their roles in these activities, including conspiracy to commit computer fraud, identity theft, and wire fraud.