Russia'S Cyber Tactics H1'2023
Russia'S Cyber Tactics H1'2023
Russia'S Cyber Tactics H1'2023
RUSSIA’S
CYBER
TACTICS
H1’2023
Lessons Learned:
Shift in the Patterns, Goals, and Capacity of the Russian Government
and Government-Controlled Groups
September 2023
1
TLP:CLEAR
INTRODUCTION
Cyberwarfare has evolved rapidly since 2022. Russian malicious actors are finding
new and effective ways to support Russia's military operations, both on the
battlefield and against civilians. This has become a signature strategy of the
Russian war against Ukraine, and assessment of their tactics is highly important
for the strengthening of security and protection around the globe.
This is our 2nd analysis of the active phase of cyber component in this war. It is
our attempt at taking a step back from the day-to-day events, pierce through the
fog of war and reveal a bigger picture. A picture that could enable all our partners
to learn and adapt to a new era of active cyber aggression. Considering the
lessons learned from monitoring shifts in Russian cyber tactics during the most
active phase of cyber and kinetic operations the Cyber community gain the
following value to predict/model:
1. Future Target Selection: Analyzing how Russian cyber tactics have evolved in
terms of target selection can provide insights into potential future targets. This could include critical
infrastructure, government agencies, or specific industries.
2
TLP:CLEAR
https://www.ft.com/content/c7038f7e-48fb-4d76-a608-96eec217a654
3
TLP:CLEAR
The shift from hack and encrypt attacks to actual offensive espionage and
influence operations will keep the bar for sophisticated instructions high for
further escalation around the globe after the Ukrainian victory on the battlefield.
Key Insights:
2X GROWTH IN THE NUMBER OF INCIDENTS WHERE CERT UA WAS
INVOLVED IN INVESTIGATIONS & FORENSICS
Despite all improvements implemented by Ukrainian authorities (from utilizing the
most modern protection stack to many other enhancements), the number of
incidents doubled in the last 6 months: from an average of 1.9 incidents per day
(57 per month) in H2’22 to 4-5 per day (128 per month) in H1’23.
Russian state-controlled adversaries brace for the long stand against the West and
add more people to increase the capacity and speed of the attacks.
Additionally, there were more cyberattacks targeting the private sector with the
intent to leverage cyber capabilities for monitoring the outcomes of their kinetic
operations, including missile
and drone attacks. Furthermore, these attacks were aimed at scrutinizing the
plans of government contractors and supply chain members, as part of Ukraine's
proactive measures for future actions.
strategize future actions and anticipate our responses. Having prior knowledge of
a victim organization's network infrastructure, defensive measures, key personnel,
and communication patterns provides returning attackers with a substantial
advantage when it comes to exploiting organizations that have been
compromised in the past.
https://cert.gov.ua/article/4818341
https://cert.gov.ua/article/4501891
5
TLP:CLEAR
Amount of attacks in 2023 dropped after the end of the drone and missile attacks
on the civilian energy infrastructure. Still, terrorist-style pressure on the
international community over the Zaporizhzhya nuclear plant continued, and key
Russian APT groups were tasked to collect information about Ukrainian plans to
protect the station and preparedness for the worst-case scenario.
123%
+
GROWTH IN THE REGISTERED INCIDENTS RATE IN H’203
- 81%
In avg 128 per month, 4-5 per day
6
TLP:CLEAR
55 incidents in H1’2023
(8 critical incidents with registered impact)
From the data presented above, it's evident that the number of critical incidents
has notably decreased. Moreover, the ratio of high-level to critical-level
incidents has improved. The attackers appear to be using less sophisticated
tactics, employing a "spray and pray" approach, while Ukraine's defense of its
infrastructure has markedly improved compared to six months ago.
TIMELINE
The figure below shows the pattern of all threat actors and their ability to conduct
specific amounts of cyber operations over time (distribution by weeks). We
discovered that every APT team is unique and relies on its talent pool, TTPs, and
victimology — so each could perform a limited amount of operations and lateral
movement and maintain access to specific targets (also within a limited timeline
before being discovered).
February
February
January
January
January
January
January
March
March
March
March
June
June
June
April
April
April
April
May
May
May
May
May
June
UAC-0028 2 2 1 4 1 3 6 2 2
UAC-0102 2
UAC-0010 1 4 3 4 4 4 8 7 2 1 1 8 6 2 2 3 7 7 10 7 4 3 4
UAC-0041 1 1 1 1 1
UAC-0082 1 1 2 2 1 1 1 3 1 1 1
UAC-0156 1 1
UAC-0024 1 1
UAC-1045 3 1
UAC-0120 1 1
UAC-0107 5 1 1 1
UAC-0114 1
UAC-0100 1 2 2 1 3
UAC-0056 1 1 18 3 1
UAC-0150 1 2 1 2 1 1 1 1 5 1
UAC-0050 1 12 10 1
UAC-0006 1 11 1 5 1
UAC-0145 1
UAC-1037 1 1 1
UAC-0153 1
UAC-0151 1
UAC-0109 4 26 1 10
UAC-0099 1 1 1
UAC-0166 1
UAC-0117 2
UAC-0165 1 1
UAC-1046 1
UAC-0135 1 1 1
UAC-0096 4
UAC-0160 1
UAC-0064 1
UAC-0162 1
UAC-0063 1
UAC-0035 3
UAC-0036 1
UAC-0106 1
UAC-0155 1
UAC-0143 1
UAC-0148 1
UAC-0097 1
8
TLP:CLEAR
4. Strategic Targets Limited: Despite numerous targets, the number of strategic and
valuable IT/Cyber targets crucial for supporting Russian military operations in Ukraine is relatively
limited. Attackers, therefore, tend to keep a low profile after being discovered and may reuse their
knowledge of an organization's internals to regain access or find alternative entry points by exploiting
trust and people's behavior (e.g., from emails) and the IT administrator environment. Sometimes, even
password wallets are exploited.
From our findings, it is evident that the following five sectors have consistently
been the primary targets of malicious actors: numerous private companies in the
Media & Telecommunications sector, as well as organizations in the Public and
Local Administration, Security and Defense, and Government Institutions sectors.
Notably, there is a particular emphasis on targeting entities within the Public and
Local Administration subcategory of the Government sector.
9
TLP:CLEAR
185
Government
125
Public and local
73
Media
55
Energy
47
Security and
institutions administration defense
42
Telecoms / ISPs
19
Logistics /
5
Healthcare / IT
4 408
Others
Transportation Insurance
In the first half of 2023, FSB, GRU, and SVR continued the trend of increasing
espionage operations focused on intelligence gathering. Concurrently, some
groups maintained their penchant for destructive operations. APT groups
frequently revisited their previous targets, capitalizing on their familiarity with the
victims' infrastructure and recognizing the significance of these targets for both
intelligence collection and destructive purposes.
It appears that their objective is to acquire data with the intention of gaining
insights into:
• Better situation awareness and cases • List of important witnesses and stakeholders
coming to the court for further war criminal cases
• What information Security Service of • Who was arrested, and how to help these
Ukraine and other law enforcement individuals avoid prosecution and move them
organizations managed to collect as an back to Russia
evidence base for further arrests They utilize this data for counter-
intelligence operations and data
• Plans and evidence Ukrainian law attribution.
enforcement organizations assemble for
international court cases
10
TLP:CLEAR
• PII and Personalities that become known • Which elite soldiers and officers were
to the Ukrainian law enforcement agencies captured during the siege and could/couldn't be
when officers ask court and prosecutors for exchanged
permission to arrest or interrogate a person
The concept of "once a victim, always a victim" underscores how threat actors
exhibit a persistent pattern of revisiting targets the threat actors have previously
compromised is driven by their ability to leverage the information they've already
acquired and their familiarity with the targeted individuals and email accounts.
This "once a victim, always a victim" strategy underscores the ongoing and
evolving threat that organizations face from cyber adversaries who exploit their
knowledge to maximize the impact of their attacks, highlighting the need for
robust and adaptive cybersecurity measures to counter such persistent threats.
REMARKABLE CASES
UAC-0010
UAC-0109
UAC-0050
UAC-0056
UAC-0028
UAC-0006
UAC-0150
UAC-0082
UAC-0100
0 25 50 75 100 125
Attributed cases
Figure 1. The most active Threat actors that generated the most cases during H1’2023
12
TLP:CLEAR
Based on our analysis it seems like FSB cyber unit Gamaredon managed to
significantly increase the total amount of operations and cases registered by
CERT (from 128 for the full 2022 to 103 just in H1'2023), but not all of them were
that successful and converted into high severity issues.
13
TLP:CLEAR
Malware infection 58
Malicious connection to C2 68
DoS/DDoS 77
Type of incident
14
TLP:CLEAR
Local govermants
5.4%
Other Ministries
5.4%
Diplomacy sector
13.5%
Low
enforcement
54.1%
Defense Sector
21.6%
The figure below presents an analysis of methods registered across SOC and
CERT cases used by UAC-0010 during its campaigns. Malware distribution is the
dominating tactic for this group, while other groups heavily rely on phishing
campaigns.
Malicious
connection
29.7%
Malware
distribution
54.5%
10
6
UAC-0010
h h h h l l l l y y y y y n
FebruaryFebruaryFebruaryFebruary
JanuaryJanuaryJanuaryJanuaryJanuary Marc Marc Marc Marc Apri Apri Apri Apri Ma Ma Ma Ma Ma June June June June
organizatio
Targeted
Date
Figure 6 illustrates the UAC -0010/Gamaredon campaigns and activities throughout H1’2023, providing a visual representation of the time
intervals in weeks between the discovery of this threat actor on various victims. This representation effectively portrays the velocity and
speed at which their team penetrates both new and previously targeted entities.
To enhance the effect of their hacking campaigns even more, starting from April
2023, hackers are using tactics of compromising news agencies and Facebook
pages where they publish provocative and controversial information, blaming
CERT-UA for the breach and losing competition.
During the war, there takes place an obvious "merging" between criminal hacker
groups and the aggressor state. There are numerous cases of using a toolset of
Trickbot/Conti hacker groups for performing attacks toward objects of critical
infrastructure, in particular energy infrastructure. Another example is the activity of
the Tropical Scorpius group utilizing a RomCom backdoor during their attacks.
Others
Local municipalities
6.7%
Govermant
Private businesses
13.3%
Energy sector
33.3%
Telco & ISP
Media
13.3%
13.3%
13.3%
6.7%
They also actively hunt after military personnel who have access to some military
platforms
However, starting from the 25th of April 2023, they are using a
@solntsepekZ Telegram channel instead for better OpSec.
17
TLP:CLEAR
The complexity of attacks against the energy sector was significantly raised, as
they knew these networks and companies (since 2014) are built similarly and have
the same weak spots or defense best practices, which allowed them to better
prepare the operations.
Story
In one of the investigations on one of the energy objects, we managed
to collect evidence of initial access to that network dated by mid-2021,
which links to a part of a broader campaign of similar cases. This
indicates the planning of intrusion, and proactive cyber operations,
including hacker groups involvement in conventional m
ilitary operations with the aim of enhancing their effect and performing
a negative influence on industrial control systems, etc.
“Hacktivists”
Killnet, HackNet, Zarya, NoName057, Anonymous Russia
• Although their claims rarely describe the nature of the supposed cyberattack.
New Trend
Also, they are now combining hack-and-leak with publishing
fake news through compromised media resources to reach a
wider audience.
Relevant cases:
https://cip.gov.ua/ua/news/kiberataka-na-derzhstat-ukrayini-vorog-
ukotre-prozvituvav-pro-peremogu-yakoyi-ne-bulo
https://cip.gov.ua/ua/news/rosiiski-khakeri-namagayutsya-diskredituvati-
uryadovu-komandu-reaguvannya-na-komp-yuterni-nadzvichaini-podiyi-
cert-ua
References
We recommend checking the following materials:
1. https://cert.gov.ua/article/5213167
2. https://cert.gov.ua/article/5160737
3. https://cert.gov.ua/article/4905829
4. https://cert.gov.ua/article/4905718
5. https://cip.gov.ua/ua/news/cert-ua-zavdyaki-spivpraci-z-recorded-future-viyaviv-
shpigunsku-kampaniyu-grupi-apt28-bluedelta-proti-ukrayinskikh-organizacii
6. https://cert.gov.ua/article/3947787
19
TLP:CLEAR
20
TLP:CLEAR
Prepared with the support of the European Union and the USAID Cybersecurity for Critical
Infrastructure in Ukraine Activity
This publication is made possible by the support of the American people through the United States
Agency for International Development (USAID) and the support of the European Union.
The authors’ views expressed in this publication do not necessarily reflect the views of USAID, the
U.S. Government or the EU.
21