Also known as: Voodoo Bear, IRIDIUM, Seashell Blizzard, TeleBots, Black Energy, Quedagh, Iron Viking, Hades, Olympic Destroyer
Exploit Public-Facing Application
Exploit vulnerabilities in internet-facing applications to gain access.
Spearphishing Attachment
Send targeted emails with malicious file attachments to gain initial access.
Valid Accounts
Use legitimate credentials to authenticate and gain access.
External Remote Services
Abuse remote services like VPNs or RDP to gain access to the network.
Data Encrypted for Impact
Encrypt victim data to disrupt availability, typically for ransom.
Data Destruction
Destroy data and files on victim systems to disrupt operations.
Service Stop
Stop critical services to disrupt operations or aid in data destruction.
Inhibit System Recovery
Delete backups, shadow copies, or recovery partitions to prevent restoration.
Destructive wiper disguised as ransomware. Spread via M.E.Doc accounting software supply chain attack in Ukraine, causing $10+ billion in global damages in June 2017.
ICS-targeting malware that directly manipulates electrical grid protocols (IEC 101/104, OPC DA, IEC 61850). Caused the December 2016 Kyiv power outage.
Streamlined version of Industroyer targeting IEC 104 protocol. Deployed against Ukrainian high-voltage substations in April 2022, coordinated with kinetic strikes.
Destructive wiper deployed against Ukrainian organizations in 2022. Overwrites files and partition tables, rendering systems unrecoverable.
Deployed hours before Russia's 2022 invasion of Ukraine. Uses legitimate EaseUS Partition Master drivers to corrupt disk structures at the MBR and partition level.
Multi-stage destructive malware targeting Ukrainian government systems in January 2022. Masquerades as ransomware but irreversibly corrupts the MBR and targeted file types.
Wiper malware targeting MIPS-based modems. Destroyed Viasat KA-SAT satellite modems across Europe on the first day of Russia's 2022 invasion, disrupting Ukrainian military communications.
Destructive malware deployed during the 2018 Pyeongchang Winter Olympics opening ceremony. Designed to disrupt IT systems with multiple false flag attributions embedded in the code.
Modular trojan used in the December 2015 Ukraine power grid attack. HMI module manipulated SCADA systems to open circuit breakers, causing the first cyber-caused blackout.
Modular botnet malware replacing VPNFilter, targeting WatchGuard Firebox and ASUS routers. Provides persistent access and C2 relay capabilities.
Successor to BlackEnergy targeting energy sector organizations. More stealthy with modular architecture, used for espionage preceding potential destructive attacks.
Backdoor for Windows and Linux, evolved from the Industroyer framework. Used for persistent access in critical infrastructure environments with encrypted C2 communication.
Disk-wiping component deployed alongside BlackEnergy and Industroyer. Overwrites files with random data and corrupts the MBR to prevent system recovery.
Used as post-exploitation tool for lateral movement and command execution before deploying destructive payloads in target networks.
Used for credential harvesting to enable lateral movement across enterprise networks before deploying wiper malware to maximum endpoints.
Used for reconnaissance, disabling security tools, and deploying secondary payloads. Often used to distribute wiper malware via Group Policy.
Sysinternals tool used for mass deployment of wiper malware across compromised networks, maximizing destructive impact simultaneously.
Wiper deployed against Ukrainian government organizations in February 2022. Uses IOCTL calls to overwrite physical disks and corrupt all accessible volumes.
ICS-focused malware framework designed to attack electrical substations and industrial control systems
Web shell used for persistent access to compromised web servers
| Type | Value |
|---|---|
| domain | vpnfilter[.]net |
| ip | 176[.]119[.]147[.]225 |
| ip | 91[.]245[.]255[.]243 |
| hash | 027cc450ef5f8c5f653329641ec1fed9 |
| hash | a196c6b8ffcb97ffb9f1d45a17eeead7 |
| Domain / Host | Status |
|---|---|
vpnfilter[.]netC2 domain linked to VPNFilter botnet campaign | active |
176[.]119[.]147[.]225Cyclops Blink C2 infrastructure | active |
91[.]245[.]255[.]243Infrastructure used in Ukraine targeting operations | offline |
Infrastructure data reflects monitoring status only — no raw fingerprint data is exposed.
MITRE ATT&CK - Sandworm Team
https://attack.mitre.org/groups/G0034/
U.S. DOJ - Six Russian GRU Officers Charged
https://www.justice.gov/opa/pr/six-russian-gru-officers-charged-connection-worldwide-deployment-destructive-malware
Mandiant - Sandworm Disrupts Power in Ukraine
https://www.mandiant.com/resources/sandworm-disrupts-power-ukraine-operational-technology
SANDWORM: (Mandiant Report)
https://www.mandiant.com/resources/blog/apt-attack-ukrainian-critical-infrastructure
Industroyer: Biggest threat to industrial control systems since Stuxnet
https://www.welivesecurity.com/2017/06/12/industroyer-biggest-threat-industrial-control-systems-since-stuxnet/
Industroyer2: Sandworm conducts attacks against Ukrainian energy sector
https://www.welivesecurity.com/2022/04/12/industroyer2-industroyer-reloaded/
CaddyWiper: New wiper malware targeting Ukrainian organizations
https://www.welivesecurity.com/2022/03/15/caddywiper-new-wiper-malware-discovered-ukraine/
AcidRain: A wiper rains down on Europe (Viasat attack analysis)
https://www.sentinelone.com/labs/acidrain-a-modem-wiper-rains-down-on-europe/
U.S. Charges Russian GRU Officers with International Hacking and Related Influence and Disinformation Operations
https://www.justice.gov/opa/pr/us-charges-russian-gru-officers-international-hacking-and-related-influence-and