Russian cyber operations are best understood through the lens of "information confrontation" (informatsionnoye protivoborstvo) -- a doctrinal concept that treats cyber, electronic warfare, psychological operations, and information control as components of a single continuum, employed below the threshold of armed conflict and integrated with military operations when conflict occurs.
Russia distributes offensive cyber capability across three principal intelligence agencies, each with distinct mandates:
SVR (Sluzhba Vneshney Razvedki) -- Foreign Intelligence Service. Focuses on long-dwell, high-stealth espionage against diplomatic, policy, and technology targets. Responsible for the SolarWinds/SUNBURST campaign and the 2023--2024 Microsoft corporate email compromise. Prioritizes intelligence collection over disruption.
GRU (Glavnoye Razvedyvatelnoye Upravleniye) -- Main Directorate of the General Staff. The most operationally aggressive agency. Houses multiple cyber units:
Unit 74455 (Sandworm): Destructive attacks against critical infrastructure, wipers, ICS targeting (NotPetya, Ukrainian grid attacks, Industroyer).
Unit 29155: Recently attributed (2024) for destructive operations including WhisperGate against Ukraine and broader European targeting (CISA AA24-249A).
FSB (Federalnaya Sluzhba Bezopasnosti) -- Federal Security Service. Primarily domestic-focused but operates against targets in neighboring states and dissidents abroad. Linked to Turla (historically) and Gamaredon (targeting Ukraine). The FSB's Center 16 (Dragonfly/Energetic Bear) has targeted Western critical infrastructure; Center 18 (Turla) conducts sophisticated global espionage.
A defining feature of the Russian cyber ecosystem is the deliberate blurring of state and criminal activity. The Kremlin tolerates -- and in some cases directs -- cybercriminal organizations that operate with impunity from Russian territory, provided they do not target domestic interests and cooperate when called upon.
Evil Corp (Indrik Spider/Manatee Tempest): Led by Maksim Yakubets, who the U.S. Treasury identified as working for the FSB. The group transitioned from banking trojans (Dridex) to ransomware (WastedLocker, Hades, PhoenixCryptoLocker) while maintaining state ties (Treasury designation, 2019).
"Patriotic hackers" and hacktivist fronts (KillNet, XakNet, CyberBerkut, Anonymous Russia) provide deniable disruption -- DDoS attacks, defacements, and leak operations -- particularly during the Ukraine conflict, with demonstrated coordination with GRU operations (Mandiant, 2022).
The conflict in Ukraine (2014--present, full-scale invasion from February 2022) represents the most sustained integration of cyber operations with conventional warfare in history. Russian actors have deployed:
Dozens of distinct wiper malware families against Ukrainian government, energy, transport, and communications targets.
ICS/SCADA attacks against the power grid (2015, 2016, 2022).
Satellite communications disruption (Viasat/AcidRain, February 2022).
Coordinated hack-and-leak and influence operations.
The full extent of coordination between Russian intelligence agencies in cyber operations remains debated. While strategic objectives clearly align, evidence suggests loose coordination rather than centralized command -- agencies sometimes duplicate targeting or interfere with each other's operations. The institutional relationships between GRU, SVR, FSB, and criminal proxies are inferred from operational overlap and intelligence reporting rather than definitive organizational charts.
The table below catalogues the principal Russian-attributed cyber threat groups. Naming conventions follow the originating tracker where possible, with Microsoft's weather-based taxonomy included.
#
Group
Key Aliases
Sponsor
Primary Objective
Active Since
Status (2025)
1
APT29
Cozy Bear, Midnight Blizzard, The Dukes, Dark Halo, Nobelium, YTTRIUM
SVR
Long-term espionage, intelligence collection
~2008
Active -- ongoing campaigns against cloud/identity infrastructure
Russian cyber operations follow a rough division of labor, though boundaries are not rigid:
GRU -- Speed, Scale, and Destruction
Unit 74455 (Sandworm) executes the most destructive operations: power grid attacks, NotPetya, Olympic Destroyer, and the bulk of wiper deployments in Ukraine. Operations prioritize impact over stealth -- they are designed to be noticed.
Unit 26165 (APT28) conducts espionage and influence operations. The 2016 DNC hack-and-leak, credential phishing against political targets, and exploitation of email and VPN infrastructure. More concerned with speed of collection than long-term persistence.
Unit 29155 (Ember Bear/Cadet Blizzard) was attributed by Western intelligence agencies in September 2024 as responsible for WhisperGate and destructive operations across Europe. This unit also has a physical sabotage mission (Skripal poisoning, arms depot explosions), with cyber as one tool in a broader toolkit.
SVR -- Patience and Stealth
APT29/Midnight Blizzard operations are characterized by exceptionally long dwell times, sophisticated tradecraft, and targeting of high-value intelligence targets. The SolarWinds supply chain compromise remained undetected for approximately 9 months. The 2023--2024 Microsoft corporate email breach used a password spray against a legacy test tenant to gain initial access, then pivoted to executive mailboxes.
SVR operations heavily abuse cloud infrastructure and identity systems (OAuth applications, service principals, API tokens), reflecting a sophisticated understanding of modern enterprise architecture.
FSB -- Domestic and Adjacent
Gamaredon conducts extremely high-volume, low-sophistication operations against Ukrainian targets -- thousands of phishing attempts weekly. Despite basic tooling, the sheer volume ensures consistent access.
Turla represents the FSB's most sophisticated capability, with decades of operations and tooling like the Snake rootkit. The FBI's 2023 Operation MEDUSA disrupted Snake's peer-to-peer infrastructure, but the group continues to operate with alternative tooling.
Star Blizzard/COLDRIVER focuses on credential phishing against NGOs, think tanks, journalists, and former intelligence officials -- intelligence targets of direct interest to Russia's security services.
Criminal Proxies
Groups like Evil Corp provide plausible deniability. When operations are conducted using ransomware tooling, attribution is complicated -- is it state-directed or financially motivated? This ambiguity is a feature, not a bug.
Hacktivist fronts (KillNet, XakNet, Anonymous Russia) conduct DDoS and disruption that creates noise and public perception of broad cyber capability, even when the technical sophistication is low.
Used in 2015 Ukrainian power grid attack; modular platform with ICS-specific plugins
Industroyer (CrashOverride)
ICS malware
Sandworm
Purpose-built to attack electricity substations via IEC 101/104, IEC 61850, OPC DA protocols (ESET, 2017)
Industroyer2
ICS malware
Sandworm
Streamlined variant deployed against Ukrainian energy in April 2022; IEC 104 only (ESET, 2022)
NotPetya (ExPetr)
Destructive wiper (disguised as ransomware)
Sandworm
Spread via MEDoc supply chain; caused $10B+ global damage; used EternalBlue + credential harvesting for propagation
Olympic Destroyer
Destructive wiper
Sandworm
Targeted 2018 PyeongChang Olympics IT; included false flag artifacts pointing to North Korea and China
VPNFilter
Router/IoT botnet
Sandworm
Infected 500K+ SOHO routers across 54 countries; modular with MITM, data exfiltration, and destructive capabilities
Cyclops Blink
Router botnet
Sandworm
Successor to VPNFilter; targeted WatchGuard and ASUS routers; disrupted by DOJ operation in 2022
AcidRain
Wiper
Sandworm (assessed)
Targeted Viasat KA-SAT modems on February 24, 2022, disrupting satellite communications across Europe at the start of the Ukraine invasion (SentinelOne, 2022)
SUNSPOT injected SUNBURST into SolarWinds Orion builds; SUNBURST provided initial access to ~18,000 organizations, of which ~100 were actively exploited
FoggyWeb
Post-compromise backdoor
APT29
Targeted AD FS servers to exfiltrate configuration databases and decrypt token-signing certificates (Microsoft, 2021)
MagicWeb
Post-compromise backdoor
APT29
Successor to FoggyWeb; manipulates AD FS authentication to forge tokens for any user (Microsoft, 2022)
The volume of unique wiper malware deployed against Ukraine is unprecedented:
Wiper
Date (First Seen)
Target
Notes
WhisperGate
January 2022
Ukrainian government
Disguised as ransomware; MBR wiper + file corrupter; attributed to GRU Unit 29155
HermeticWiper (FoxBlade)
February 2022
Ukrainian government, financial
Deployed hours before the invasion; used signed driver for disk destruction
IsaacWiper
February 2022
Ukrainian government
Deployed alongside HermeticWiper at some targets
CaddyWiper
March 2022
Ukrainian targets
Simpler wiper; destroys user data and partition information
DoubleZero
March 2022
Ukrainian enterprises
.NET-based wiper
AcidRain
February 2022
Viasat KA-SAT modems
MIPS wiper targeting satellite modem firmware
Industroyer2
April 2022
Ukrainian energy
ICS-specific; paired with CaddyWiper for IT systems
SwiftSlicer
January 2023
Ukrainian targets
Go-based wiper deployed via Active Directory GPO (ESET)
NikoWiper
Late 2022
Ukrainian energy
Deployed against energy sector targets
SDelete abuse
2022--2023
Various Ukrainian
Abuse of Microsoft SDelete for data destruction
Scale of Destructive Tooling
Between January 2022 and early 2023, security researchers identified at least 13 distinct wiper malware families deployed against Ukrainian targets -- more than in all previous years of cyber conflict combined. This reflects both the intensity of the conflict and GRU's investment in destructive capability development.
OAuth abuse and token theft (APT29) demand continuous monitoring of OAuth application registrations, consent grants, and service principal activity.
Password spray detection -- the Microsoft breach originated from a password spray against a legacy account with no MFA. Legacy tenant hygiene is critical.
Conditional access policies and phishing-resistant MFA (FIDO2) are essential against credential harvesting campaigns (Star Blizzard, APT28).
Credential phishing remains the primary initial access vector for APT28, Star Blizzard, and Gamaredon. Advanced URL analysis, sandboxing, and user training are necessary.
BEC-adjacent techniques -- while not traditional BEC, APT29's access to executive email for intelligence collection shares the same defensive surface.
Sandworm's demonstrated capability to cause physical effects through cyber means (power outages, communications disruption) makes OT network segmentation, ICS-specific monitoring, and Purdue model enforcement critical.
Industroyer and Industroyer2 demonstrate protocol-specific attack capabilities (IEC 104, IEC 61850, OPC DA) that require specialized ICS security tooling.
Russian actors' use of compromised SOHO routers (VPNFilter, Cyclops Blink) and legitimate cloud services for C2 complicates network-based detection. NDR solutions must inspect encrypted traffic patterns and detect beaconing to legitimate services.
Lateral movement detection (pass-the-hash, Kerberoasting, WMI, SMB) is essential given the rapid internal propagation observed in Sandworm operations.
The volume and diversity of Russian threat actors demand dedicated tracking and correlation across multiple naming taxonomies. Threat intel platforms must reconcile overlapping attributions.
ICS-specific threat intelligence for energy, water, and transport sectors.
Sandworm's attacks on Ukrainian infrastructure have driven sustained OT security investment, particularly in Europe. The EU's NIS2 Directive explicitly references critical infrastructure cyber resilience.
The NotPetya wiper ($10B+ damage) remains the single most impactful cyber event for driving enterprise backup and disaster recovery investment. Organizations that survived NotPetya with minimal disruption had robust offline backup strategies.
The Ukraine wiper campaigns have reinforced the message: backup and resilience are not optional.
NATO's Cooperative Cyber Defence Centre of Excellence (CCDCOE) in Tallinn was established in direct response to the 2007 Estonia attacks.
European defense spending on cyber has accelerated post-2022, with the EU Cyber Solidarity Act and national cyber defense strategies explicitly citing Russian threats.
The European cyber insurance market has tightened underwriting criteria, with some policies now excluding state-sponsored attacks following the NotPetya coverage disputes (Merck v. Zurich, Mondelez v. Zurich).
This section covers activity through early 2026 based on available reporting. Russian cyber operations are continuous and rapidly evolving -- check CISA advisories, Microsoft Threat Intelligence, and Mandiant blog for the latest.
Microsoft breach follow-on: APT29/Midnight Blizzard continued to exploit information gained from the initial corporate email compromise, accessing source code repositories and internal systems. Microsoft disclosed ongoing intrusion activity through early 2024.
GRU Unit 29155 public attribution: In September 2024, a joint advisory by the Five Eyes and European allies formally attributed destructive cyber operations to GRU's 161st Specialist Training Center (Unit 29155), linking them to WhisperGate and operations across multiple European countries.
Star Blizzard domain seizures: The U.S. DOJ and Microsoft jointly seized over 100 domains used by Star Blizzard/COLDRIVER for credential phishing against U.S. and allied targets.
Continued Ukraine operations: Sandworm and associated groups maintained sustained targeting of Ukrainian energy, telecommunications, and government infrastructure throughout 2024.
APT28 exploitation of Outlook vulnerability: Continued exploitation of CVE-2023-23397 (NTLM relay via Outlook calendar invitations) against European government and defense targets.
Midnight Blizzard cloud campaigns: APT29 continued sophisticated targeting of cloud infrastructure across government and technology sectors, with particular focus on OAuth application abuse and cross-tenant access.
Sandworm Ukrainian energy targeting: Ongoing operations against Ukrainian energy grid during winter months, attempting to maximize civilian impact.
Evolving hacktivist fronts: KillNet-derivative groups continued DDoS operations against NATO-aligned countries, though with decreasing impact as targets improved DDoS mitigation.
Reporting on 2026 operations is limited given the recency. Assessment below reflects early 2026 trends.
Russian cyber operations continue at sustained high tempo, with no indication of reduced capability or intent.
The integration of cyber operations with conventional military activity in Ukraine remains the primary theater of Russian offensive cyber activity.
Western intelligence agencies have expressed growing concern about Russian pre-positioning in Western critical infrastructure networks, particularly energy and telecommunications.
Russian groups carry many names across different threat intelligence vendors. The primary taxonomies in use:
Microsoft: Weather-based (Blizzard suffix for Russia -- Midnight Blizzard, Forest Blizzard, Seashell Blizzard, Star Blizzard, Aqua Blizzard, Cadet Blizzard, Ember Bear)
Mandiant/Google: APT numbers (APT28, APT29) and UNC tracking clusters
CrowdStrike: Animal-based (Bear suffix for Russia -- Cozy Bear, Fancy Bear, Voodoo Bear, Venomous Bear, Primitive Bear)
MITRE ATT&CK: Generally uses the most widely recognized name
Government advisories: Mix of all naming conventions; increasingly using Microsoft taxonomy
This glossary defines the acronyms and key terms used throughout the cybersecurity market research site. Use it as a quick reference when navigating segment analyses, pain-point discussions, and opportunity assessments.
Ransomware-as-a-Service — cybercrime business model where ransomware operators provide malware and infrastructure to affiliates who conduct attacks, splitting profits
RGB
Reconnaissance General Bureau — North Korea's primary intelligence agency responsible for clandestine operations including cyber operations