Also known as: Sandworm Team, ELECTRUM, Telebots, IRON VIKING, BlackEnergy (Group), Quedagh, Voodoo Bear, IRIDIUM, Seashell Blizzard, FROZENBARENTS, APT44
🇷🇺
Russia
Active Since
2017
MITRE ID
G0034
Techniques
79
[Sandworm Team](https://attack.mitre.org/groups/G0034) is a destructive threat group that has been attributed to Russia's General Staff Main Intelligence Directorate (GRU) Main Center for Special Technologies (GTsST) military unit 74455.(Citation: US District Court Indictment GRU Unit 74455 October 2020)(Citation: UK NCSC Olympic Attacks October 2020) This group has been active since at least 2009.(Citation: iSIGHT Sandworm 2014)(Citation: CrowdStrike VOODOO BEAR)(Citation: USDOJ Sandworm Feb 2020)(Citation: NCSC Sandworm Feb 2020)
In October 2020, the US indicted six GRU Unit 74455 officers associated with [Sandworm Team](https://attack.mitre.org/groups/G0034) for the following cyber operations: the 2015 and 2016 attacks against Ukrainian electrical companies and government organizations, the 2017 worldwide [NotPetya](https://attack.mitre.org/software/S0368) attack, targeting of the 2017 French presidential campaign, the 2018 [Olympic Destroyer](https://attack.mitre.org/software/S0365) attack against the Winter Olympic Games, the 2018 operation against the Organisation for the Prohibition of Chemical Weapons, and attacks against the country of Georgia in 2018 and 2019.(Citation: US District Court Indictment GRU Unit 74455 October 2020)(Citation: UK NCSC Olympic Attacks October 2020) Some of these were conducted with the assistance of GRU Unit 26165, which is also referred to as [APT28](https://attack.mitre.org/groups/G0007).(Citation: US District Court Indictment GRU Oct 2018)
MITRE ATT&CK Techniques
Recon9
T1591.002Business Relationships
T1590.001Domain Properties
T1589.002Email Addresses
T1589.003Employee Names
T1593Search Open Websites/Domains
T1594Search Victim-Owned Websites
T1592.002Software
T1598.003Spearphishing Link
+1 more
Resource12
Known Victims
live · just now
No victims recorded in ransomware.live for this group.
T1583Acquire Infrastructure
T1584.005Botnet
T1583.001Domains
T1585.002Email Accounts
T1587.001Malware
T1583.004Server
T1584.004Server
T1585.001Social Media Accounts
+4 more
Initial6
T1195.002Compromise Software Supply Chain
T1190Exploit Public-Facing Application
T1566.001Spearphishing Attachment
T1566.002Spearphishing Link
T1195Supply Chain Compromise
T1199Trusted Relationship
Exec9
T1203Exploitation for Client Execution
T1204.002Malicious File
T1204.001Malicious Link
T1106Native API
T1059.001PowerShell
T1053.005Scheduled Task
T1072Software Deployment Tools
T1059.005Visual Basic
+1 more
Persist2
T1133External Remote Services
T1505.003Web Shell
PrivEsc0
Defense9
T1027.010Command Obfuscation
T1140Deobfuscate/Decode Files or Information
T1078.002Domain Accounts
T1070.004File Deletion
T1036Masquerading
T1036.005Match Legitimate Resource Name or Location