“Active since at least 2021, this subgroup within Seashell Blizzard has leveraged opportunistic access techniques and stealthy forms of persistence to collect credentials, achieve command execution, and support lateral movement that has at times led to substantial regional network compromises,” Microsoft said in the report.
Seashell Blizzard’s activities align with those tracked by other security vendors under various names, including BE2, UAC-0133, Blue Echidna, Sandworm, PHANTOM, BlackEnergy Lite, and APT44.
The hacking subgroup tracked as the “BadPilot campaign,” has been active since at least 2021, originally focusing on Ukraine and Europe. Microsoft reports that the operation has now extended its reach into North America, Central Asia, and the Middle East.
Homepage > News > Business > UK, India explore AI, digital infra ties
Siemens Mobility has installed 1,700 solar panels across its Goole Rail Village in East Yorkshire to reduce carbon emissions. The newly activated panels
An estimated 40,000 kilometres of abandoned utility infrastructure – including gas and water pipes – could be used to dras
Strategic Expansion: CIP’s acquisition of Morecambe boosts its UK renewable energy pipeline to over 25GW. Advanced Development: Morecambe