Russian Cyber Adversary BlueCharlie Alters Infrastructure in Response to Disclosures

Aug 02, 2023THNCyber Menace / Hacking


A Russa-nexus adversary has been linked to 94 new domains, suggesting that the group is actively modifying its infrastructure in response to public disclosures about its actions.

Cybersecurity agency Recorded Future linked the brand new infrastructure to a menace actor it tracks beneath the title BlueCharlie, a hacking crew that is broadly identified by the names Blue Callisto, Callisto (or Calisto), COLDRIVER, Star Blizzard (previously SEABORGIUM), and TA446. BlueCharlie was beforehand given the momentary designation Menace Exercise Group 53 (TAG-53).

“These shifts reveal that these menace actors are conscious of business reporting and present a sure degree of sophistication of their efforts to obfuscate or modify their exercise, aiming to stymie safety researchers,” the corporate said in a brand new technical report shared with The Hacker Information.


BlueCharlie is assessed to be affiliated with Russia’s Federal Safety Service (FSB), with the menace actor linked to phishing campaigns geared toward credential theft by making use of domains that masquerade because the login pages of personal sector firms, nuclear analysis labs, and NGOs concerned in Ukraine disaster aid. It is stated to be energetic since no less than 2017.

“Calisto assortment actions most likely contribute to Russian efforts to disrupt Kiev supply-chain for army reinforcements,” Sekoia noted earlier this yr. “Furthermore, Russian intelligence assortment about identified battle crime-related proof is probably going performed to anticipate and construct counter narrative on future accusations.”


One other report printed by NISOS in January 2023 identified potential connections between the group’s assault infrastructure to a Russian firm that contracts with governmental entities within the nation.

“BlueCharlie has carried out persistent phishing and credential theft campaigns that additional allow intrusions and information theft,” Recorded Future stated, including the actor conducts intensive reconnaissance to extend the chance of success of its assaults.

The newest findings reveal that BlueCharlie has moved to a brand new naming sample for its domains that includes key phrases associated to info know-how and cryptocurrency, akin to cloudrootstorage[.]com, directexpressgateway[.]com, storagecryptogate[.]com, and pdfsecxcloudroute[.]com.


Seventy-eight of the 94 new domains are stated to have been registered utilizing NameCheap. A few of the different area registrars used embody Porkbun and Regway.

To mitigate threats posed by state-sponsored superior persistent menace (APT) teams, it is really helpful that organizations implement phishing-resistant multi-factor authentication (MFA), disable macros by default in Microsoft Workplace, and implement a frequent password reset coverage.

“Whereas the group makes use of comparatively frequent strategies to conduct assaults (akin to the usage of phishing and a historic reliance on open-source offensive safety instruments), its possible continued use of those strategies, decided posture, and progressive evolution of ways suggests the group stays formidable and succesful,” the corporate stated.

Discovered this text attention-grabbing? Comply with us on Twitter and LinkedIn to learn extra unique content material we put up.