Cyber Intelligence Report
Cyber-security information from 24th February 2022 to 14th April 2023.
David Swan Director, CSCIS Cyber Intelligence Defence Centre (CIDC)
Publisher – CSCIS / David Swan, Director CIDC
Release – 14th April 2023.
Cyber Intelligence Report
yberwarfare: Russia vs Ukraine : Russian Cyber Units
This report contains selected cyber-security information from 24th February 2022 to 14th April 2023.
<strong><span data-preserver-spaces=”true”>Synopsis</span></strong>
<span data-preserver-spaces=”true”>1. This report describes Russia Cyber Forces. This includes ‘government’ forces, commercial companies that support the government, criminal hackers (in it for the money) and ‘patriotic hackers’, volunteers who want to support Russia.</span>
<span data-preserver-spaces=”true”>2. Russia appears to be committed to the following ‘Course of Action’ for its cyber forces: </span>
<strong><em><span data-preserver-spaces=”true”>Ongoing: Russian cyber forces, including allied forces, have launched a series of cyber campaigns against both Ukrainian targets and their allies. Targeting Includes strategic and general targets as well as vulnerable governments. Russian cyber attacks are increasing against Ukrainian Allies. </span></em></strong>
<strong><span data-preserver-spaces=”true”>The Vulcan Files</span></strong>
<span data-preserver-spaces=”true”>3. An employee of Russian IT Consultancy Company NTC Vulkan, disgusted by the war, released a trove of documents to the German newspaper ‘</span><em><span data-preserver-spaces=”true”>Süddeutsche Zeitung’ shortly after the invasion of Ukraine</span></em><span data-preserver-spaces=”true”>. A consortium of eleven news organizations including ‘Paper Trail Media’ (Germany) and ‘Der Spiegel’ (Germany), ‘Washington Post’ (United States), The Guardian (UK), Le Monde (France), collaborated to analyze the documents. There are 1,000 secret documents that include 5,299 pages full of project plans, instructions and internal emails from Vulkan from the years 2016 to 2021. Despite being in Russian and extremely technical in nature, they provide unique insight into the depths of Russian cyberwarfare plans. Five Western intelligence agencies confirmed the authenticity of the documents. These files are known collectively as ‘the Vulkan Files’ and provide the basis for the identification of Russia’s cyber units. </span>
<strong><span data-preserver-spaces=”true”>Russian Cyber Order of Battle (ORBAT)</span></strong>
<strong><span data-preserver-spaces=”true”>4. Government Forces. According to ‘The Washington Post’ “</span><em><span data-preserver-spaces=”true”>Moscow’s cyberwarriors are not a disparate collection of hackers launching ransomware for quick scores. Instead, they are part of a robust, state-sponsored effort using the full power of the Russian security state and private companies to identify critical targets and enemies’ vulnerabilities.</span></em><span data-preserver-spaces=”true”>” “</span><em><span data-preserver-spaces=”true”>The Russian government regards offensive cyber capabilities as part of a holistic effort to degrade its enemies. This includes the sowing of mistrust via social media, the gathering of kompromat (compromising material), and the ability to target crucial infrastructure. That list of enemies is a long one.”</span></em><span data-preserver-spaces=”true”> “</span><em><span data-preserver-spaces=”true”>Countries on the “unfriendly countries” list include New Zealand, Australia, EU states, the UK, US, Canada, Ukraine, Singapore, Japan and Taiwan</span></em><span data-preserver-spaces=”true”>” (and NATO).</span></strong>
<strong><span data-preserver-spaces=”true”>6. The cyber forces of the Russian Federation are operated by the Intelligence Agencies of Russia. Their crest is shown at right. The cyber forces include:</span></strong>
<ul>
<li><strong><span data-preserver-spaces=”true”>Government teams, military and/or intelligence services,</span></strong></li>
<li><strong><span data-preserver-spaces=”true”>Commercial Consultants/Hackers,</span></strong></li>
<li><strong><span data-preserver-spaces=”true”>Criminal Hackers, and/or </span></strong></li>
<li><strong><span data-preserver-spaces=”true”>‘Patriotic’ Hackers. </span></strong></li>
</ul>
<strong><span data-preserver-spaces=”true”>7. Military Intelligence Service of the General Staff of the Armed Forces of the Russian Federation (GRU). Government personnel are university graduates, software developers, computer scientists etc, who are officers in their organizations. </span></strong>
<span data-preserver-spaces=”true”> Emblem of GRU</span>
<span data-preserver-spaces=”true”>Also known as the ‘Main Intelligence Directorate’, the GRU is</span><em><span data-preserver-spaces=”true”> very probably </span></em><span data-preserver-spaces=”true”>the operator of the following hacking units: ‘Sandworm’, ‘Fancy Bear’, ‘GhostWriter’, ‘XakNet’, ‘Infoccentr’ and the ‘Cyber Army of Russia_reborn.’ According to a U.S. report to Congress ‘Unit 54777’ is a GRU psychological operations team that uses cyber attacks. </span>
<span data-preserver-spaces=”true”>The GRU cyber teams target: Infrastructure in Ukraine, including both physical infrastructure such as energy and telecommunications, as well as functional government infrastructure like Ukrainian tax software. External governments, organizations and individuals are also targeted. Analysts Comment: Target sets are not fixed. Additional targets are routinely added which may require additional malware, tactics, techniques and procedures. </span>
<span data-preserver-spaces=”true”>8. Foreign Intelligence Service of the Russian Federation (</span><strong><span data-preserver-spaces=”true”>SVR RF</span></strong><span data-preserver-spaces=”true”>)</span>
<span data-preserver-spaces=”true”> Emblem of SVR RF</span>
<span data-preserver-spaces=”true”> </span><em><span data-preserver-spaces=”true”>Hacking units of the SVR RF include: ‘NOBELIUM’, also known as Cozy Bear,</span></em>
<em><span data-preserver-spaces=”true”>The Dukes and APT29. This ‘unit’ may be multiple teams that are reconfigured in accordance with their tasks.</span></em>
<em><span data-preserver-spaces=”true”>SVR RF hacking teams most often use information collection (espionage) malware as well as conduct disinformation operations. Espionage targets include: diplomats, embassy’s, military (including supply chains), research facilities, key industries, among many others. Cyber Espionage attacks often work at remaining covert over long time periods.</span></em>
<span data-preserver-spaces=”true”> </span><span data-preserver-spaces=”true”>9. The Federal Security Service of the Russian Federation (</span><strong><span data-preserver-spaces=”true”>FSB</span></strong><span data-preserver-spaces=”true”>) </span><span data-preserver-spaces=”true”>Emblem of </span><span data-preserver-spaces=”true”>FSB</span>
<span data-preserver-spaces=”true”>The FSB also includes the 18th Center for Information Security, which oversees domestic operations and security but conducts foreign operations as well. The FSB is responsible for monitoring domestic hackers meaning hackers within Russia and allied countries. Similar to the SVR RF hacking organization, the FSB hacking unit appears to re-configure according to assigned tasks. Hacking groups associated with the FSB include: ‘BeserkBear’, ‘Gamaredon’, and ‘Nodaria’ TA 569 also known as the Vovan & Lexus disinformation team are </span><em><span data-preserver-spaces=”true”>very probably linked to the FSB. </span></em>
<span data-preserver-spaces=”true”>The target set for the FSB is very broad ranging from information collection on individuals (within Russia, in Ukraine and sometimes external targets) to targeting the energy sector in the U.S. There are documented ‘close connections’ between the FSB and criminal hackers who </span><em><span data-preserver-spaces=”true”>may be used to augment operations</span></em><span data-preserver-spaces=”true”>. This suggests that ‘patriotic hacker groups such as KillNet</span><em><span data-preserver-spaces=”true”> may take their orders from the FSB. </span></em>
<strong><span data-preserver-spaces=”true”>10. Commercial Companies. The Russian government has approximately forty principal consultants and contractors that support its military.</span></strong>
<span data-preserver-spaces=”true”>11. </span><strong><span data-preserver-spaces=”true”>NTC Vulkan</span></strong><span data-preserver-spaces=”true”>: </span><em><span data-preserver-spaces=”true”>NTC Vulkan was founded in 2010 by Anton Markov and Alexander Irzhavsky, graduates of St Petersburg military academy and service in the Russian Army. NTC Vulkan, presents itself as a completely normal, IT consulting firm, a small company with software expertise. The company claims “Information security management” as one of its specialties. </span></em>
<span data-preserver-spaces=”true”> </span><em><span data-preserver-spaces=”true”>Vulkan works for intelligence agencies: for the military intelligence agency GRU, the domestic intelligence agency FSB and for the foreign and economic intelligence agency SVR.</span></em><span data-preserver-spaces=”true”>One of the NTC Vulkan goals is to develop highly effective cyberweapons. The table (right) describes three ongoing programs developed by Vulkan. Vulkan’s engineers have: developed </span><span data-preserver-spaces=”true”>hacking operations worked for Russian military and intelligence agencies, trained and support operatives before attacks on national infrastructure, assisted in spreading disinformation and controlled sections of the internet. In addition, Vulkan collects vulnerabilities and compromised access, enabling cyber attacks. Vulkan apparently has 60 software developers plus support staff and sub-contractors. </span>
<span data-preserver-spaces=”true”>12. Another company supporting Russian cyber operations is the “</span><strong><span data-preserver-spaces=”true”>Internet Research Agency</span></strong><span data-preserver-spaces=”true”>”. </span><em><span data-preserver-spaces=”true”>It is a private organization, funded by Kremlin-connected oligarch Yevgeniy Prighozin, which has supported Russian government disinformation and propaganda operations. Often referred to as a troll farm or troll factory, this group has focused on disinformation by impersonating domestic activists and people, primarily</span></em>
<em><span data-preserver-spaces=”true”> through various social media channels</span></em><span data-preserver-spaces=”true”>.</span>
<span data-preserver-spaces=”true”>13. There are two other types of hackers that support Russia. Criminal Hacker Groups are typical ‘ransomware groups’. Ransomware or not, the groups are in business to make money. The second group is volunteer hackers who Russia calls ‘patriotic hackers’. </span>
<span data-preserver-spaces=”true”>14. </span><strong><span data-preserver-spaces=”true”>Criminal Hacker Groups</span></strong><span data-preserver-spaces=”true”>. Prior to the invasion, the Conti Ransomware Gang was known as one of the most prolific and successful ransomware organizations globally. It is a young group, first noticed in 2020. Based in Russia, it featured an almost corporate organization as well as its own encryption protocols and malware. Conti was the first Ransomware group to declare its support for Russia. Conti appears to have reorganized into smaller teams. It is possible that Conti is working with the FSB and Vulkan, sub-dividing in order to attack more targets. Conti’s new organization is reported to have two types of groups: Fully autonomous groups which focus on stealing data, like Karakurt, BlackBasta, and BlackByte. The other groups are semi-autonomous, which acts as Conti-loyal affiliates within other collectives. This includes AlphV/BlackCat, Hive, HelloKitty/FiveHands, and AvosLocker.</span>
<span data-preserver-spaces=”true”>15. </span><strong><span data-preserver-spaces=”true”>‘Patriotic Hackers’</span></strong><span data-preserver-spaces=”true”>. Recruiting of hackers to support Russia was started by the Cuba Ransomware Group and continued by ‘KillNet’. Recruited sub-groups include NoName 057(16), Zarya, Phoenix, Vera, FasoninnGung, Mirai, Jacky, DDoS Gung, Sakurajima, and Sparta. KillNet and its allied groups are best known for Distributed Denial of Service (DDoS) attacks against countries that actively support Ukraine. Russia offers a bounty to these groups if they can prove they disabled a ‘target’ web site.</span>
For more information on the CIDC, this Intelligence Report or to have a dedicated briefing please contact cidc@cscis.org