Jump to content

Ghostwriter (hacker group)

From Wikipedia, the free encyclopedia
Ghostwriter
Formationc. 2016
Typethreat actor
PurposeDisinformation attack
HeadquartersMinsk, Belarus[1]
Region
Belarus
Methodsphishing
AffiliationsArmed Forces of Belarus[1]

Ghostwriter, also known as UNC1151 and Storm-0257 by Microsoft,[2] is a hacker group allegedly originating from Belarus. According to the cybersecurity firm Mandiant, the group has spread disinformation critical of NATO since at least 2016.[3]

History

[edit]

The name Ghostwriter comes from the group's first attacks, whereby they would steal credentials of journalists or publishers and publish fake articles using those credentials. Hence, the group effectively became unwanted ghostwriters for those with stolen credentials.[4] UNC1151 is an internal company name by Mandiant given to uncategorized groups of "cyber intrusion activity."[5]

The European Union has blamed this group for hacking German government officials.

EU's foreign policy chef Josep Borrell has threatened Russia for sanctions.[6]

According to Serhiy Demedyuk, deputy secretary of the national security and defense council of Ukraine, the group was responsible for defacement of Ukrainian government websites in January 2022.[7]

In February 2022 The Register reported that a Ukrainian CERT had announced that the group was targeting "private ‘i.ua’ and ‘meta.ua’ [email] accounts of Ukrainian military personnel and related individuals" as part of a phishing attack during the invasion of Ukraine.[8] Mandiant said that two domains mentioned by the CERT, i[.]ua-passport[.]space and id[.]bigmir[.]space were known command and control domains of the group.[8] Mandiant also said "We are able to tie the infrastructure reported by CERT.UA to UNC1151, but have not seen the phishing messages directly. However, UNC1151 has targeted Ukraine and especially its military extensively over the past two years, so this activity matches their historical pattern."[8][7]

Characteristics and techniques

[edit]

The group has executed spear-phishing campaigns against members of legitimate press to infiltrate the content management systems of those organizations. Then, the group uses the system to publish their own fake stories.[9]

References

[edit]
  1. ^ a b Satter, Raphael (2022-02-25). "Ukraine says its military is being targeted by Belarusian hackers". Reuters. Retrieved 2022-03-07.
  2. ^ "How Microsoft names threat actors". Microsoft. Retrieved 21 January 2024.
  3. ^ "Ghostwriter Update: Cyber Espionage Group UNC1151 Likely Conducts Ghostwriter Influence Activity | Mandiant". www.mandiant.com. Retrieved 2022-03-02.
  4. ^ "'Ghostwriter' Influence Campaign" (PDF). FireEye. Retrieved 5 March 2022.
  5. ^ "DebUNCing Attribution: How Mandiant Tracks Uncategorized Threat Actors | Mandiant". www.mandiant.com. Retrieved 2022-03-07.
  6. ^ "EU threatens sanctions on Russia over 'malicious cyber activities'". euronews. 2021-09-24. Retrieved 2021-09-24.
  7. ^ a b Polityuk, Pavel (2022-01-16). "EXCLUSIVE Ukraine suspects group linked to Belarus intelligence over cyberattack". Reuters. Retrieved 2022-03-07.
  8. ^ a b c Corfield, Gareth (2022-02-25). "Ukraine seeks volunteers to defend networks as Russian troops menace Kyiv". The Register. Retrieved 2022-02-26.
  9. ^ Greenberg, Andy. "Hackers Broke Into Real News Sites to Plant Fake Stories". Wired. ISSN 1059-1028. Retrieved 2022-03-02.