• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
russian cyber adversary bluecharlie alters infrastructure in response to disclosures

Russian Cyber Adversary BlueCharlie Alters Infrastructure in Response to Disclosures

You are here: Home / General Cyber Security News / Russian Cyber Adversary BlueCharlie Alters Infrastructure in Response to Disclosures
August 2, 2023

A Russa-nexus adversary has been linked to 94 new domains, suggesting that the group is actively modifying its infrastructure in reaction to general public disclosures about its functions.

Cybersecurity firm Recorded Foreseeable future connected the new infrastructure to a danger actor it tracks beneath the identify BlueCharlie, a hacking crew which is broadly recognized by the names Blue Callisto, Callisto (or Calisto), COLDRIVER, Star Blizzard (formerly SEABORGIUM), and TA446. BlueCharlie was beforehand offered the momentary designation Threat Activity Team 53 (TAG-53).

“These shifts exhibit that these risk actors are knowledgeable of business reporting and display a specified degree of sophistication in their endeavours to obfuscate or modify their exercise, aiming to stymie security scientists,” the corporation said in a new technical report shared with The Hacker Information.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


Cybersecurity

BlueCharlie is assessed to be affiliated with Russia’s Federal Security Company (FSB), with the threat actor linked to phishing campaigns aimed at credential theft by making use of domains that masquerade as the login webpages of personal sector providers, nuclear study labs, and NGOs associated in Ukraine disaster reduction. It really is mentioned to be energetic because at the very least 2017.

“Calisto selection routines in all probability lead to Russian attempts to disrupt Kiev offer-chain for armed service reinforcements,” Sekoia noted before this calendar year. “What’s more, Russian intelligence assortment about identified war criminal offense-linked proof is probably done to foresee and develop counter narrative on long term accusations.”

BlueCharlie

Another report published by NISOS in January 2023 discovered probable connections in between the group’s attack infrastructure to a Russian organization that contracts with governmental entities in the state.

“BlueCharlie has carried out persistent phishing and credential theft strategies that further empower intrusions and knowledge theft,” Recorded Long term reported, incorporating the actor conducts in depth reconnaissance to boost the chance of success of its attacks.

The newest results expose that BlueCharlie has moved to a new naming sample for its domains featuring keyword phrases connected to data technology and cryptocurrency, these types of as cloudrootstorage[.]com, directexpressgateway[.]com, storagecryptogate[.]com, and pdfsecxcloudroute[.]com.

Cybersecurity

Seventy-eight of the 94 new domains are reported to have been registered using NameCheap. Some of the other domain registrars utilized contain Porkbun and Regway.

To mitigate threats posed by state-sponsored state-of-the-art persistent danger (APT) groups, it truly is suggested that corporations put into practice phishing-resistant multi-factor authentication (MFA), disable macros by default in Microsoft Office, and implement a repeated password reset coverage.

“Even though the group employs fairly prevalent tactics to carry out attacks (these types of as the use of phishing and a historical reliance on open up-source offensive security instruments), its very likely ongoing use of these solutions, decided posture, and progressive evolution of methods indicates the team continues to be formidable and capable,” the organization said.

Uncovered this write-up attention-grabbing? Stick to us on Twitter  and LinkedIn to browse extra unique content we post.


Some pieces of this short article are sourced from:
thehackernews.com

Previous Post: «industrial control systems vulnerabilities soar: over one third unpatched in 2023 Industrial Control Systems Vulnerabilities Soar: Over One-Third Unpatched in 2023
Next Post: Researchers Discover Bypass for Recently Patched Critical Ivanti EPMM Vulnerability researchers discover bypass for recently patched critical ivanti epmm vulnerability»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.