FROZENLAKE, Forest Blizzard, Blue Delta, Sofacy, Pawn Storm, Unit 26165, STRONTIUM
Long-duration cyber espionage. Intelligence collection against governments, military, diplomatic, and high-value commercial targets. Support of Russian foreign policy objectives. Disruption of Western logistics and technology supply chains supporting Ukraine.
Habib Bank AG Zurich compromised 2024 (2.5TB data exfil). WEF 2025 DDoS campaign against Swiss private banks and cantonal authorities. Swiss financial sector explicitly in active target set per 2025 CISA/NCSC advisory. Swiss BWL and pharma procurement data assessed as collection priority.
| Tool | Type | MITRE | Description |
|---|---|---|---|
|
XTunnel / X-Tunnel
|
C2 proxy | T1043 | Proxy tool enabling real-time bidirectional communication between victim and C2. Used to relay traffic through compromised endpoints, masking C2 origin. |
|
NotDoor
|
backdoor | T1059.001 | Outlook-focused two-stage VBA backdoor. Designed for long-term email intelligence collection. Used alongside CovenantGrunt in 2026 filen.io C2 campaign. |
|
ADVSTORESHELL
Swiss-observed
|
implant | T1059 | Modular backdoor providing file upload/download, command execution, and registry key manipulation. Deployed via spear-phishing with weaponised Office documents. |
|
CHOPSTICK
|
implant | T1071 | Modular HTTP/HTTPS implant used since 2014 for C2 with flexible sleep intervals and task queues. Compatible with compromised Mikrotik routers as proxy infrastructure. |
|
XAgent / Sofacy
Swiss-observed
|
implant | T1569.002 | Modular backdoor with separate components for file system, keylogger, screenshots, network enumeration, and C2. Cross-platform variants for Windows, Linux, macOS, iOS. Used since 2007 for sustained access to high-value targets. |
|
Zebrocy
Swiss-observed
|
implant | T1566 | Delphi and GoLang variants used in spear-phishing campaigns against government and diplomatic targets. Functionality includes file enumeration, keystroke capture, and file exfiltration. |
|
LAMEHUG
|
malware | T1059 | Novel implant identified 2025. First known LLM-powered malware with links to APT28. Capable of autonomous command generation from threat-intelligence context. Identified by Cato CTRL and ESET. |
|
LoJax
|
rootkit | T1542.001 | First UEFI firmware rootkit observed in the wild. Modifies UEFI bootkit to maintain persistence across OS reinstalls. Highly sophisticated. |
|
Cannon
|
trojan | T1566 | Lightweight spear-phishing trojan targeting government and military email accounts. Communicates via HTTPS to avoid detection. |
|
Responder / NetBIOS Poisoning
Swiss-observed
|
utility | T1016 | Network credential harvesting via LLMNR/NBT-NS poisoning. Captures NTLM hashes from legitimate network authentication attempts. |
| Indicator | Role | ASN / Country | Confidence | Notes |
|---|---|---|---|---|
|
filen.io
domain
|
C2 | AS206628 · DE | HIGH | Legitimate cloud storage abused as C2 channel in 2026 campaign. HTTPS traffic to filen.io API appears as normal cloud activity. |
|
accesscam[.]org
domain
|
C2 | AS39608 · RU | HIGH | Corrected C2 domain per April 2026 CISA advisory v1.1. |
|
giize[.]com
domain
|
C2 | AS39608 · RU | HIGH | Corrected C2 domain per April 2026 CISA advisory v1.1. |
|
185.234.72.x/24
ip
|
C2 | AS206628 · NL | MEDIUM | VPS range used for credential harvesting. Rotated Q3 2024. |
|
BEGAN Hosting
asn
|
hosting | AS12345 · RU | CONFIRMED | Identified as APT28 preferred hosting provider across multiple campaigns. |
|
194.165.16.x/24
ip
|
redirector | AS198571 · RU | HIGH | Long-duration redirector across multiple campaigns. Compromised MikroTik router network. |
GRU Unit 26165 has demonstrated consistent operational evolution over 17+ years of documented activity. The unit sits within the Russian Ministry of Defence's Main Intelligence Directorate and is responsible for the most technically sophisticated cyber operations attributed to Russian state actors.
2022 – present: Post-Ukraine invasion, Unit 26165 expanded its target set from pure espionage to include Western logistics and technology supply chains. Attribution confidence increased dramatically following coordinated Western government disclosures — ANSSI (France), NCSC (UK), BfV/BSI/BND (Germany), BSI (Switzerland), and CISA/FBI/NSA (US) all published technical advisories in 2024–2025, providing rare multi-government attribution of the same infrastructure and TTPs.
2024 – MooBot pivot: Demonstrated operational pragmatism by repurposing a pre-existing criminal botnet (MooBot/MikroTik) for state espionage purposes rather than building bespoke infrastructure. 2024 DOJ action disrupted the botnet, though re-establishment is assessed as likely.
2026 – LAMEHUG and cloud C2: First documented use of LLM-augmented malware in wild. Pivot to legitimate cloud services (filen.io) as C2 channels represents a fundamental shift — infrastructure is effectively un-take-down-able without collateral disruption to legitimate users.
Assessment: Unit 26165 operates with increasing technical ambition and decreasing operational caution. Capability ceiling continues to rise. Swiss financial sector remains in active target set — high-value intelligence collection combined with potential for disruption signalling.