Diskussion:Secondary Infektion
Quelle: https://justpaste.it/k3tr1
Operation APT28.
GRU-Linked Infrastructure : mil.ru sso.mil.ru
APT28 Members (Unit 26165 / Unit 74455) :
Dmitriy Sergeyevich Badin — Officer, Unit 26165 — Involved in DNC hack and WADA intrusion
Ivan Sergeyevich Yermakov — Officer, Unit 26165 — Specialist in phishing infrastructure
Artem Andreyevich Malyshev — Developer, Unit 26165 — X-Agent malware developer
Aleksei Valeryevich Minin — Support staff, Unit 26165 — Logistics and ops coordination
Aleksei Sergeyevich Morenets — Operative, Unit 26165 — Field ops in The Hague (OPCW)
Evgenii Mikhaylovich Serebriakov — Operative, Unit 26165 — Participated in OPCW cyber ops
Oleg Mikhaylovich Sotnikov — Field Agent, Unit 26165 — Surveillance in cyber missions
Viktor Borisovich Netyksho — Commander, Unit 26165 — Senior leadership of GRU cyber ops
Boris Alekseyevich Antonov — Deputy Commander, Unit 26165 — Strategic coordination
Aleksey Viktorovich Lukashev — Operator, Unit 26165 — Spearphishing and email targeting
Sergey Aleksandrovich Morgachev — Officer, Unit 26165 — Lead planner in DNC breach
Nikolay Yuryevich Kozachek — Developer, Unit 26165 — Malware engineering
Pavel Vyacheslavovich Yershov — Operator, Unit 26165 — Targeting U.S. infrastructure
Aleksandr Vladimirovich Osadchuk — Director, Unit 26165 — Oversight of operations
Aleksey Aleksandrovich Potemkin — Analyst, Unit 26165 — Vulnerability and network research
Anatoliy Sergeyevich Kovalev — Operator, Unit 26165 — Spam, DDoS, and disinfo operations
Vladislav Yevgenyevich Borovkov — Unknown assignment — Possibly new operator
Yuriy Fedorovich Denisov — Unknown assignment — Possibly new operator
Summary :
APT28, also known as Fancy Bear or Sofacy, is a Russian military intelligence threat group attributed to GRU units 26165 and 74455. This group is responsible for a wide range of cyber espionage and influence operations, including :
The 2016 DNC and U.S. election interference
Attacks on NATO, Eastern European states, and anti-doping agencies
Deployment of malware families like X-Agent, CHOPSTICK, and Sednit
Use of spearphishing, credential harvesting, and advanced persistence techniques
Many of the individuals listed above have been indicted by USA federal authorities for their roles in these activities, including conspiracy to commit computer fraud, identity theft, and wire fraud.