DIRECTORY

  • Alerts
  • APTs
  • Blog
  • Books
  • Certifications
  • Cheat Sheets
  • Courses
  • Cyber Briefing
  • CyberDecoded
  • CyberReview
  • CyberStory
  • CyberTips
  • Definitions
  • Domains
  • Entertainment
  • FAQ
  • Frameworks
  • Hardware Tools
  • Incidents
  • Malware
  • News
  • Papers
  • Podcasts
  • Quotes
  • Reports
  • Tools
  • Threats
  • Tutorials
No Result
View All Result
  • Login
  • Register
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
CyberMaterial
Talk To An Expert
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
CyberMaterial
No Result
View All Result
Talk To An Expert
CyberMaterial
Home News

Russian Group BlueCharlie: Evolving Threat

August 3, 2023
Reading Time: 2 mins read
in News

A Russian-linked cyber adversary has emerged with a dynamic strategy, incorporating 94 new domains into its infrastructure to adapt and counteract public disclosures regarding its activities.

Cybersecurity firm Recorded Future has identified this evolving infrastructure, attributing it to a hacking group known as BlueCharlie, with various aliases like Blue Callisto, COLDRIVER, and TA446. These adjustments underscore a certain level of sophistication, indicating the group’s intent to obfuscate and alter its actions in response to industry reporting. The firm’s technical report, shared with The Hacker News, highlights the significance of these shifts in the threat landscape.

Recorded Future’s assessment reveals that BlueCharlie has affiliations with Russia’s Federal Security Service (FSB), with a focus on phishing campaigns aimed at stealing credentials from private sector firms, nuclear research labs, and NGOs involved in Ukraine crisis relief.

This activity, dating back to at least 2017, is thought to contribute to Russian efforts to disrupt military supply chains and gather intelligence related to potential war crime evidence.

A secondary report by NISOS further reveals connections between the group’s attack infrastructure and a Russian company contracting with governmental entities.

The report emphasizes BlueCharlie’s persistence in executing phishing and credential theft campaigns, coupled with extensive reconnaissance to enhance the efficacy of their attacks. Notably, BlueCharlie has introduced a new naming pattern for its domains, featuring keywords associated with information technology and cryptocurrency.

While the group’s methods often employ common techniques like phishing and open-source offensive security tools, their continued utilization of these tactics, combined with a proactive evolution of strategies, showcases their ongoing potency. To counter these threats, organizations are advised to implement robust security measures, including phishing-resistant multi-factor authentication (MFA) and stringent password reset policies, given the group’s adaptability and formidable capabilities.

Source:
  • BlueCharlie, Previously Tracked as TAG-53, Continues to Deploy New Infrastructure in 2023

Tags: August 2023BlueCharliecredentialsCyberattackCybersecurityHackingNewsNews 2023PhishingRecorded FutureRussiaVulnerabilities
2
VIEWS
ADVERTISEMENT

Related Posts

Lazarus Group’s Espionage

Lazarus Group’s Espionage

October 2, 2023
NY Bans School Facial Recognition

NY Bans School Facial Recognition

October 2, 2023
IronNet Shuts Down Amid Financial Struggle

IronNet Shuts Down Amid Financial Struggle

October 2, 2023
ShinyHunters Hacker Pleads Guilty

ShinyHunters Hacker Pleads Guilty

October 2, 2023

More Articles

Incidents

IT Services Provider Hit by Donut Gang

September 22, 2023
Incidents

Ransomware Group LostTrust’s Rapid Attacks

September 28, 2023
Incidents

APT IRAN Claims 4TB Data Access

September 28, 2023
Incidents

Baruch College Malware Incident Update

September 29, 2023

Security through data

Cybersecurity Domains

  • API Security
  • Business Continuity
  • Career Development
  • Compliance
  • Cryptography
  • HSM
  • KPIs / KRIs
  • Penetration Testing
  • Shift Left
  • Vulnerability Scan

Emerging Technologies

  • 5G
  • Artificial Intelligence
  • Blockchain
  • Cryptocurrency
  • Deepfake
  • E-Commerce
  • Healthcare
  • IoT
  • Quantum Computing

Frameworks

  • CIS Controls
  • CCPA
  • GDPR
  • NIST
  • 23 NYCRR 500
  • HIPAA

Repository

  • Books
  • Certifications
  • Definitions
  • Documents
  • Entertainment
  • Quotes
  • Reports

Threats

  • APTs
  • DDoS
  • Insider Threat
  • Malware
  • Phishing
  • Ransomware
  • Social Engineering

© 2023 | CyberMaterial | All rights reserved.

World’s #1 Cybersecurity Repository

  • About
  • Legal and Privacy Policy
  • Site Map
No Result
View All Result
  • Alerts
  • Incidents
  • News
  • Audience
    • Cyber Citizens
    • Cyber Professionals
    • Institutions
  • Highlights
    • Blog
    • CyberDecoded
    • Cyber Review
    • CyberStory
    • CyberTips
  • Cyber Risks
    • Alerts
    • Attackers
    • Domains
    • Incidents
    • Threats
  • Opportunities
    • Events
    • Jobs
  • Repository
    • Books
    • Certifications
    • Cheat Sheets
    • Courses
    • Definitions
    • Frameworks
    • Games
    • Hardware Tools
    • Memes
    • Movies
    • Papers
    • Podcasts
    • Quotes
    • Reports
    • Tutorials
  • Report Cyber Incident
  • GET HELP
  • Contact Us

Subscribe to our newsletter

© 2022 Cybermaterial - Security Through Data .

Welcome Back!

Sign In with Google
Sign In with Linked In
OR

Forgotten Password? Sign Up

Create New Account!

Sign Up with Google
Sign Up with Linked In
OR

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.