The Register: DOJ, Microsoft seize 107 domains used in Russia’s Star Blizzard phishing attacks

Source URL: https://www.theregister.com/2024/10/03/russian_phishing_domains_seized/
Source: The Register
Title: DOJ, Microsoft seize 107 domains used in Russia’s Star Blizzard phishing attacks

Feedly Summary: Winter is coming
The US Department of Justice and Microsoft have seized 107 websites used by Russian cyberspies in a phishing campaign to steal sensitive information from US government agencies, think tanks, and other victims.…

AI Summary and Description: Yes

Summary: The text details a significant action taken by the US Department of Justice and Microsoft against Russian hacking group Callisto, which had been conducting a sophisticated phishing campaign targeting sensitive information from US government entities and other organizations. This disruption is particularly relevant in the context of national security, given the ongoing concerns over foreign interference in democratic processes.

Detailed Description:

The US Department of Justice (DOJ) and Microsoft have collaborated to disrupt the operations of the Callisto Group, a Russian cyber espionage unit linked to the Federal Security Service (FSB). The significant points from this development include:

– **Seizure of Domains**: The DOJ obtained court orders to seize 107 websites identified as being utilized by Callisto for a phishing campaign aimed at stealing sensitive information from various targets, including government agencies and private organizations.

– **Targeted Organizations**: Victims included a range of entities such as:
– US military defense contractors
– Employees of the Department of Defense and Department of State
– Alumni of intelligence agencies
– Businesses and NGOs, particularly civil society entities

– **Phishing Techniques**: The Callisto Group employed sophisticated spear phishing techniques to trick victims into revealing account credentials through seemingly legitimate email accounts.

– **Historical Context**: The group’s operations date back to at least 2017, and there have been recent warnings from cybersecurity experts, such as the University of Toronto’s Citizen Lab, highlighting Callisto’s ongoing espionage activities.

– **Recent Actions**: In addition to the 107 seized domains, Microsoft has identified a total of 66 additional domains that were associated with the phishing efforts. The disruption of these domains is seen as vital during a period of heightened awareness about foreign interference in democratic processes in the US and allied nations.

– **Legal Moves Against Individuals**: The DOJ has initiated criminal charges against key individuals associated with Callisto, emphasizing the legal and defensive actions being taken against cyber threats.

– **International Cooperation**: The incident also drew attention from government agencies from multiple countries, highlighting the collaborative effort required to combat international cyber threats.

This scenario underscores critical insights for security and compliance professionals, such as:
– The necessity for continuous monitoring and immediate response to cyber threats.
– Importance of collaboration between private corporations and government entities in safeguarding national security.
– The evolving nature of cyberespionage tactics and their implications for organizational and governmental cybersecurity defenses.
– The escalation of attacks aimed at undermining democracy through information manipulation and theft.

Overall, the disruption of Callisto’s operations not only affects the group’s immediate capabilities but also serves as a warning to other threat actors about the serious ramifications of engaging in cyber espionage and attacks on democratic institutions.