Clicky

mobile btn
Wednesday, October 16th, 2024

Justice Department, Microsoft disrupt Russian intelligence cyber scheme

© Shutterstock

The Justice Department recently unsealed a warrant authorizing the seizure of 41 internet domains used by Russian intelligence agents and their proxies to commit computer fraud and abuse in the United States.

“Today’s seizure of 41 internet domains reflects the Justice Department’s cyber strategy in action – using all tools to disrupt and deter malicious, state-sponsored cyber actors,” Deputy Attorney General Lisa Monaco said on Oct. 3. “The Russian government ran this scheme to steal Americans’ sensitive information, using seemingly legitimate email accounts to trick victims into revealing account credentials.”

The seized domains were used by hackers belonging to, or criminal proxies working for, the “Callisto Group,” an operational unit within Center 18 of the Russian Federal Security Service, according to the partially unsealed affidavit.  The domains were used to cause damage to protected computers, gain unauthorized access to protected computers to obtain information, and gain unauthorized access to computers to obtain information from a U.S. department or agency.

Working in conjunction with the Justice Department, Microsoft announced the filing of a civil action to seize 66 internet domains also used by Callisto Group actors. Microsoft Threat Intelligence tracks this group as “Star Blizzard” (formerly SEABORGIUM, also known as COLDRIVER). Between January 2023 and August 2024, Microsoft observed Star Blizzard target over 30 civil society entities and organizations – journalists, think tanks, and nongovernmental organizations – by deploying spear-phishing campaigns to exfiltrate sensitive information and interfere in their activities.

“With the continued support of our private sector partners, we will be relentless in exposing Russian actors and cybercriminals and depriving them of the tools of their illicit trade,” Monaco said.

The Justice Department’s National Security Cyber Section of the National Security Division and the U.S. Attorney’s Office for the Northern District of California are prosecuting the case.