Star Blizzard is a Russia-backed spear-phishing operation, formerly known as SEABORGIUM, that targets academia, defense, government, NGOs, and think tanks with highly personalized social engineering. It uses fake email and social media profiles, deceptive event invitations, and credential-stealing links hosted on cloud services, often bypassing MFA with EvilGinx. #StarBlizzard #SEABORGIUM
Keypoints
- Star Blizzard is a Russia-supplied spear-phishing group with multiple aliases including SEABORGIUM, Callisto Group, TA446, COLDRIVER, TAG-53, and BlueCharlie.
- The group targets academia, defense, government, NGOs, and think tanks, using tailored information to captivate victims.
- They build legitimacy by creating fake social media and email accounts and by posing as trusted contacts or experts.
- Phishing campaigns often start with personal outreach, then deliver malicious links hosted on Google Drive, OneDrive, or similar platforms.
- Reconnaissance relies on open-source data from social networks to identify victims and entry points.
- Star Blizzard has been linked to real-world actions and sanctioned by US and UK authorities; NSA has issued advisories on their spear-phishing techniques.
MITRE Techniques
- [T1593] Search Open Websites/Domains – Star Blizzard uses open-source research and social media to identify information about victims to use in targeting. ‘uses open-source research and social media to identify information about victims to use in targeting.’
- [T1589] Gather Victim Identity Information – Star Blizzard uses online data sets and open-source resources to gather information about their targets. ‘online data sets and open-source resources to gather information about their targets.’
- [T1585.001] Establish Accounts: Social Media Accounts – Star Blizzard has been observed establishing fraudulent profiles on professional networking sites to conduct reconnaissance. ‘establishing fraudulent profiles on professional networking sites to conduct reconnaissance.’
- [T1585.002] Establish Accounts: Email Accounts – Star Blizzard registers consumer email accounts matching the names of individuals they are impersonating to conduct spear-phishing activity. ‘registers consumer email accounts matching the names of individuals they are impersonating to conduct spear-phishing activity.’
- [T1583.001] Acquire Infrastructure: Domains – Star Blizzard registers domains to host their phishing framework. ‘registers domains to host their phishing framework.’
- [T1586.002] Compromise Accounts: Email Accounts – Star Blizzard has been observed using compromised victim email accounts to conduct spear-phishing activity against contacts of the original victim. ‘using compromised victim email accounts to conduct spear-phishing activity against contacts of the original victim.’
- [T1078] Valid Accounts – Star Blizzard uses compromised credentials, captured from fake log-in pages, to log in to valid victim user accounts. ‘compromised credentials, captured from fake log-in pages, to log in to valid victim user accounts.’
- [T1566.001] Phishing: Spear-phishing Attachment – Star Blizzard uses malicious links embedded in email attachments to direct victims to their credential-stealing sites. ‘malicious links embedded in email attachments to direct victims to their credential-stealing sites.’
- [T1566.002] Phishing: Spear-phishing Link – Star Blizzard sends spear-phishing emails with malicious links directly to credential-stealing sites, or to documents hosted on a file-sharing site. ‘spear-phishing emails with malicious links directly to credential-stealing sites, or to documents hosted on a file-sharing site.’
- [T1550.004] Use Alternate Authentication Material: Web Session Cookie – Star Blizzard bypasses multi-factor authentication on victim email accounts by using session cookies stolen using EvilGinx. ‘bypasses multi-factor authentication on victim email accounts by using session cookies stolen using EvilGinx.’
- [T1539] Steal Web Session Cookie – Star Blizzard uses EvilGinx to steal the session cookies of victims directed to their fake log-in domains. ‘uses EvilGinx to steal the session cookies of victims directed to their fake log-in domains.’
- [T1114.002] Email Collection: Remote Email Collection – Star Blizzard interacts directly with externally facing Exchange services, Office 365 and Google Workspace to access email and steal information using compromised credentials or access tokens. ‘interacts directly with externally facing Exchange services, Office 365 and Google Workspace to access email and steal information using compromised credentials or access tokens.’
- [T1114.003] Email Collection: Email Forwarding Rule – Star Blizzard abuses email-forwarding rules to monitor the activities of a victim, steal information, and maintain persistent access to victim’s emails, even after compromised credentials are reset. ‘abuses email-forwarding rules to monitor the activities of a victim, steal information, and maintain persistent access to victim’s emails.’
Indicators of Compromise
- [Domain] context – cache-dns[.]com, cache-dns-forwarding[.]com, and 2 more domains
- [Domain] context – cache-dns-preview[.]com, cache-docs[.]com, and 2 more domains
- [Domain] context – cloud-docs[.]com, cloud-drive[.]live, and 2 more domains
Read more: https://socradar.io/russian-apt-operation-star-blizzard/