Home > List all groups > Sandworm Team, Iron Viking, Voodoo Bear

Threat Group Cards: A Threat Actor Encyclopedia

Permanent link APT group: Sandworm Team, Iron Viking, Voodoo Bear

NamesSandworm Team (Trend Micro)
Iron Viking (SecureWorks)
CTG-7263 (SecureWorks)
Voodoo Bear (CrowdStrike)
Quedagh (F-Secure)
TEMP.Noble (FireEye)
ATK 14 (Thales)
BE2 (Kaspersky)
CountryRussia Russia
MotivationSabotage and destruction
First seen2009
DescriptionSandworm Team is a Russian cyberespionage group that has operated since approximately 2009. The group likely consists of Russian pro-hacktivists. Sandworm Team targets mainly Ukrainian entities associated with energy, industrial control systems, SCADA, government, and media. Sandworm Team has been linked to the Ukrainian energy sector attack in late 2015.

This group appears to be closely associated with, or evolved into, TeleBots.
ObservedSectors: Education, Energy, Government, Telecommunications.
Countries: Azerbaijan, Belarus, Georgia, Iran, Israel, Kazakhstan, Kyrgyzstan, Lithuania, Poland, Russia, Ukraine.
Tools usedBlackEnergy, Gcat, PassKillDisk, PsList.
Operations performedOct 2014The vulnerability was disclosed by iSIGHT Partners, which said that the vulnerability had already been exploited in a small number of cyberespionage attacks against NATO, several unnamed Ukrainian government organizations, a number of Western European governmental organizations, companies operating in the energy sector, European telecoms firms, and a US academic organization.
Dec 2015Widespread power outages on the Ukraine
The power outage was described as technical failures taking place on Wednesday, December 23 that impacted a region around Ivano-Frankivisk Oblast. One report suggested the utility began to disconnect power substations for no apparent reason. The same report goes on to describe a virus was launched from the outside and it brought down the “remote management system” (a reference to the SCADA and or EMS). The outage was reported to have lasted six hours before electrical service was restored. At least two reports suggest the utility had initiated manual controls for restoration of service and the SCADA system was still off-line due to the infection.
Aug 2019Russian military cyber actors, publicly known as Sandworm Team, have been exploiting a vulnerability in Exim mail transfer agent (MTA) software since at least last August.
Counter operationsOct 2020Six Russian GRU Officers Charged in Connection with Worldwide Deployment of Destructive Malware and Other Disruptive Actions in Cyberspace

Last change to this card: 07 January 2021

Download this actor card in PDF or JSON format

Thailand Computer Emergency Response Team (ThaiCERT)
Electronic Transactions Development Agency

Follow us on

Facebook Twitter

Report incidents

Telephone +66 (0)2-123-1234
PGP Download PGP key