Sandworm
High ConfidenceCritical ThreatVoodoo Bear • IRIDIUM • Seashell Blizzard • Iron Viking • Electrum • TeleBots +1 more
Sandworm, also known as APT44, Seashell Blizzard, and Voodoo Bear, is a highly skilled and destructive threat actor attributed to Unit 74455 of Russia's Main Intelligence Directorate (GRU). Active since at least 2009, Sandworm has gained notoriety for its aggressive and disruptive cyber operations, which often align with Russia's geopolitical interests. The group is known for a series of high-profile attacks that have caused significant disruption and damage to critical infrastructure and government organizations, particularly in Ukraine. Sandworm's operations are characterized by a willingness to conduct destructive attacks, including the use of data-wiping malware and attacks on industrial control systems (ICS). The group has been at the forefront of several major cyber events, including the 2015 and 2016 power grid attacks in Ukraine, the global NotPetya outbreak in 2017, and the Olympic Destroyer attack against the 2018 Pyeongchang Winter Olympics. These incidents demonstrate Sandworm's capability and intent to cause widespread disruption and chaos. In recent years, especially since the full-scale invasion of Ukraine, Sandworm has continued its focus on Ukrainian targets, deploying a variety of wiper malware and conducting cyber-espionage campaigns. The group's tactics have evolved to include more integrated cyber and kinetic operations, aiming to provide direct suppor...
Sandworm, also known as APT44, Seashell Blizzard, and Voodoo Bear, is a highly skilled and destructive threat actor attributed to Unit 74455 of Russia's Main Intelligence Directorate (GRU). Active since at least 2009, Sandworm has gained notoriety for its aggressive and disruptive cyber operations, which often align with Russia's geopolitical interests. The group is known for a series of high-profile attacks that have caused significant disruption and damage to critical infrastructure and government organizations, particularly in Ukraine. Sandworm's operations are characterized by a willingness to conduct destructive attacks, including the use of data-wiping malware and attacks on industrial control systems (ICS). The group has been at the forefront of several major cyber events, including the 2015 and 2016 power grid attacks in Ukraine, the global NotPetya outbreak in 2017, and the Olympic Destroyer attack against the 2018 Pyeongchang Winter Olympics. These incidents demonstrate Sandworm's capability and intent to cause widespread disruption and chaos. In recent years, especially since the full-scale invasion of Ukraine, Sandworm has continued its focus on Ukrainian targets, deploying a variety of wiper malware and conducting cyber-espionage campaigns. The group's tactics have evolved to include more integrated cyber and kinetic operations, aiming to provide direct suppor...
Target Sectors
Target Regions
Attributed to GRU Unit 74455 (Russia). Attribution confidence: High.
Future Outlook
Sandworm is expected to continue operations targeting Energy sectors.
First observed activity of Sandworm
Ukraine power grid attack
NotPetya global outbreak
Continued active operations