🇷🇺

Sandworm

High ConfidenceCritical Threat

Voodoo Bear • IRIDIUM • Seashell Blizzard • Iron Viking • Electrum • TeleBots +1 more

Sandworm, also known as APT44, Seashell Blizzard, and Voodoo Bear, is a highly skilled and destructive threat actor attributed to Unit 74455 of Russia's Main Intelligence Directorate (GRU). Active since at least 2009, Sandworm has gained notoriety for its aggressive and disruptive cyber operations, which often align with Russia's geopolitical interests. The group is known for a series of high-profile attacks that have caused significant disruption and damage to critical infrastructure and government organizations, particularly in Ukraine. Sandworm's operations are characterized by a willingness to conduct destructive attacks, including the use of data-wiping malware and attacks on industrial control systems (ICS). The group has been at the forefront of several major cyber events, including the 2015 and 2016 power grid attacks in Ukraine, the global NotPetya outbreak in 2017, and the Olympic Destroyer attack against the 2018 Pyeongchang Winter Olympics. These incidents demonstrate Sandworm's capability and intent to cause widespread disruption and chaos. In recent years, especially since the full-scale invasion of Ukraine, Sandworm has continued its focus on Ukrainian targets, deploying a variety of wiper malware and conducting cyber-espionage campaigns. The group's tactics have evolved to include more integrated cyber and kinetic operations, aiming to provide direct suppor...

Origin: Russia
Sponsor: GRU Unit 74455
Active: 2009 - Present
Victims: 10000+ organizations (NotPetya alone)
Advanced
Active
SabotageDestructionEspionage
Risk Assessment
98
Composite Risk Score
Critical Risk
ARCS Compliance98
Escalation Risk99
Grievance Index95
Infrastructure Impact99
History & Evolution

Sandworm, also known as APT44, Seashell Blizzard, and Voodoo Bear, is a highly skilled and destructive threat actor attributed to Unit 74455 of Russia's Main Intelligence Directorate (GRU). Active since at least 2009, Sandworm has gained notoriety for its aggressive and disruptive cyber operations, which often align with Russia's geopolitical interests. The group is known for a series of high-profile attacks that have caused significant disruption and damage to critical infrastructure and government organizations, particularly in Ukraine. Sandworm's operations are characterized by a willingness to conduct destructive attacks, including the use of data-wiping malware and attacks on industrial control systems (ICS). The group has been at the forefront of several major cyber events, including the 2015 and 2016 power grid attacks in Ukraine, the global NotPetya outbreak in 2017, and the Olympic Destroyer attack against the 2018 Pyeongchang Winter Olympics. These incidents demonstrate Sandworm's capability and intent to cause widespread disruption and chaos. In recent years, especially since the full-scale invasion of Ukraine, Sandworm has continued its focus on Ukrainian targets, deploying a variety of wiper malware and conducting cyber-espionage campaigns. The group's tactics have evolved to include more integrated cyber and kinetic operations, aiming to provide direct suppor...

Targeting

Target Sectors

EnergyGovernmentCritical InfrastructureTransportationFinancial ServicesMedia

Target Regions

UkraineEuropeUnited StatesGlobal
Attribution & Affiliations

Attributed to GRU Unit 74455 (Russia). Attribution confidence: High.

Intelligence Assessment
Critical
Threat Level
Highly
Targeting
Highly
Adaptability
Very High
Persistence
Continuous
Op Tempo
Active
Status

Future Outlook

Sandworm is expected to continue operations targeting Energy sectors.

Timeline of Key Events
2009
Major

First observed activity of Sandworm

2015-12
Major

Ukraine power grid attack

2017-06
Major

NotPetya global outbreak

2024
Moderate

Continued active operations