Microsoft is publishing for the first time our research into a subgroup within the Russian state actor Seashell Blizzard and ...
A subgroup of the Russia-linked Seashell Blizzard is tasked with broad initial access operations to sustain long-term ...
Microsoft researchers uncover the “BadPilot campaign,” a threat subgroup working with the Russian state actor Seashell Blizzard in a multi-year global hacking campaign.
Microsoft found that Russian state actor Seashell Blizzard has deployed an initial access subgroup to gain persistent access ...
The operation, attributed to the notorious Russian threat actor Seashell Blizzard, has compromised high-profile targets in ...
Microsoft released a lengthy blog post detailing Seashell Blizzard's cyberattacks all over the world, as well as methods to ...
Near-global' initial access campaign active since 2021 An initial-access subgroup of Russia's Sandworm last year wriggled its ...
A team Microsoft calls BadPilot is acting as Sandworm's “initial access operation,” the company says. And over the last year ...
A subgroup of the Russian state-sponsored hacking group APT44, also known as 'Seashell Blizzard' and 'Sandworm', has been ...
Sandworm’s BadPilot campaign exploits eight security flaws to infiltrate global critical sectors, enabling persistent access ...
Russian hacking group 'Seashell Blizzard' has claimed victims in its 'BadPilot' campaign The group is diversifying its targets, no longer focusing entirely on Eastern European infrastructure Microsoft ...
The Sandworm Russian military cyber-espionage group is targeting Windows users in Ukraine with trojanized Microsoft Key ...