Cookies Policy
We use strictly necessary cookies whilst you are here. These are to enable the website to work and cannot be disabled. To read more about what this means, please see our Privacy Policy.

Follow-Up on Cadet Blizzard: New Developments and Insights

June 29, 2024
Recent developments have provided new insights into the operations of Cadet Blizzard.

by Kade Morton (CEO)
Introduction

Cadet 
Blizzard 
has 
orchestrated 
sophisticated 
cyber 
attacks.

In a previous blog post, we delved into the activities and implications of Cadet Blizzard.

Recent developments have provided new insights into their operations, especially following the unsealed indictment against Amin Stigal, a figure linked to Cadet Blizzard. This post offers an updated overview based on the latest information.

Attributed to the Main Intelligence Directorate of the General Staff of the Russian Armed Forces (GRU), Cadet Blizzard has orchestrated sophisticated cyber attacks targeting Ukraine and its allies.

Cyber Attacks on Ukraine Preceding the Invasion

In the month leading up to the full-scale Russian invasion of Ukraine in February 2022, Cadet Blizzard launched a series of cyber attacks against numerous Ukrainian government entities. These attacks targeted critical infrastructure, including non-military organisations such as agriculture, education, science, and emergency services. The objective was to disrupt and destroy these systems in advance of the invasion, crippling essential services and spreading chaos.

Tactics: The malware deployed by Cadet Blizzard was designed to masquerade as ransomware. Instead of encrypting data for ransom, the malware deleted it, rendering recovery impossible and causing significant disruption.

WhisperGate Campaign: Undermining Trust

One of Cadet Blizzard’s campaigns, known as WhisperGate, involved the theft and online leaking of personal data belonging to thousands of Ukrainian civilians, including sensitive medical records. This campaign aimed to sow distrust in the Ukrainian government by exposing and exploiting citizens’ private information.

Attacks on Allies and Supporters of Ukraine

Cadet Blizzard’s operations extended beyond Ukraine, targeting countries that supported Ukraine during the conflict. In October 2022, the group hacked the transportation infrastructure of a Central European country that had provided civilian and military aid to Ukraine.

Probing U.S. Government Systems

The group also probed systems in the United States, including multiple sites maintained by a U.S. government agency located in Maryland. These reconnaissance activities were likely aimed at identifying vulnerabilities for potential future exploitation.

Global Network and Cryptocurrency Utilisation

Cadet Blizzard’s operations are supported by a network of computers scattered worldwide, rented using cryptocurrency. This infrastructure allows the group to execute attacks from various geographical locations, making detection and attribution challenging.

Setting Up Online Infrastructure

Amin Stigal played a role in setting up online infrastructure for GRU officers. This infrastructure was used to scan the internet for vulnerable devices, which were then exploited to gain unauthorised access. Once inside, they stole files and programs, enhancing their capabilities and resources.

Detailed Attacks on Ukrainian Government Entities

From September 17, 2021, through January 28, 2022, Stigal created five accounts on a messaging and VOIP platform located in the United States, referred to as Company 1. Cadet Blizzard uploaded more than 225 files, including malware scripts, to Company 1’s servers using these accounts. On August 19, 2021, the group scanned over 2400 public-facing Ukrainian government websites for vulnerabilities, setting the stage for future attacks.

On January 13, 2022, Cadet Blizzard launched a massive assault on at least two dozen Ukrainian government networks. The targets included high-profile entities such as the Ministry of Internal Affairs, State Treasury, Judiciary Administration, the State Portal for Digital Services (DIIA), the Ministry of Education and Science, the Ministry of Agriculture, the State Service for Food Safety and Consumer Protection, the Ministry of Energy, the Accounting Chamber of Ukraine, the State Emergency Service, the State Forestry Agency and Motor Insurance Bureau. This attack saw the deployment of WhisperGate, a multi-stage malware designed to inflict maximum damage.

WhisperGate Deployment
  • First Stage: WhisperGate wiped the Master Boot Record of infected devices and dropped a ransom note to pose as ransomware.
  • Second Stage: The malware sent a GET request to a URL maintained by Company 1, downloading and executing a program from an account created by Cadet Blizzard. This corrupted the files on the target computer, rendering it inoperable.
Psychological Warfare and Data Leaks

On January 13, 2022, Cadet Blizzard compromised computers hosting the DIIA and other websites, displaying a message in Polish, Russian, and Ukrainian: “Ukrainians! All Information about you has become public, be afraid and expect the worst. This is for your past, present and future.” Within hours, the group released stolen data from the Ukrainian government on dark web forums, using the moniker “Free Civilian.” The data included criminal records, patient health data, and information from the Motor Insurance Bureau. They also offered the data of 13.5 million DIIA users for $80,000.

Continued Attacks on Allies

In October 2022, Cadet Blizzard targeted a Central European country’s transportation sector, a supporter of Ukraine that had provided civilian and military aid. Cadet Blizzard successfully gained access to its computer networks.

Real World Impact and Strategic Disruption

The GRU’s modus operandi extends beyond cyber espionage. Cadet Blizzard’s attacks aim to cause real-world impacts. They destroy systems, leak sensitive data, sell it on the dark web, and post messages to ensure the victims know about it. This approach maximises disruption to Ukrainian government operations and sows discord and fear among the population. The timing of these attacks, notably before the Russian invasion of Ukraine, highlights their strategic intent to destabilize the region and undermine trust in government institutions.

Use of Cryptocurrency

Cryptocurrency has become a common tradecraft in state-sponsored cyber operations. Cadet Blizzard, along with other GRU-affiliated groups like APT28 and Sandworm, maintains pools of cryptocurrency to rent servers worldwide. This allows them to execute attacks from various geographical locations, complicating attribution and tracking efforts by cybersecurity professionals and law enforcement agencies.

Internet Scanning for Vulnerabilities

Scanning the internet for vulnerabilities is a routine practice for groups like Cadet Blizzard. They exploit these weaknesses to gain unauthorised access to systems and networks. Organisations must prioritize patch management, especially for internet-facing devices, to mitigate this risk. Regularly updating and patching systems can prevent attackers from exploiting known vulnerabilities.

Monitoring for Unexpected Activities

Effective cybersecurity defense requires vigilant monitoring for unusual activities. This includes:

  • Unexpected Account Creations: Monitor for the creation of new accounts that are not part of regular administrative activities. Such accounts could indicate an ongoing or impending attack.
  • Unusual Uploads and Downloads: Keep an eye on unexpected uploads and downloads. Large volumes of data being transferred to or from your network could signal data exfiltration or the deployment of malware.
Conclusion

The GRU’s cyber operations, as demonstrated by Cadet Blizzard, underscore the need for robust and proactive cybersecurity measures. Their ability to cause real-world impact through cyber attacks calls for heightened vigilance and strategic defence mechanisms. By understanding their tactics and focusing on key areas like patch management and activity monitoring, organisations can better protect themselves against these persistent and evolving threats.

Benefits

Why 
select 
Arachne?

Do you want to maximise your security within your budget? Arachne Digital is the logical choice.

Our platform searches the internet for information on threat actors, gathers reports, and categorises the findings by region, industry, and threat actor. Our process automatically maps TTPs to MITRE ATT&CK®, slashing research time and saving you money.

Threat Mitigation Experts

Connect with a way to see and neutralise potential attacks before they impact your organisation. Arachne Digital empowers organisations to anticipate and avoid cyber threats by delivering actionable intelligence.

Optimised Security Posture

By integrating the precise threat intelligence provided by our reports, you can evolve, prioritise and implement effective and continually updated security controls relevant to your organisation.

Streamlined Compliance

Comprehensive, insightful threat intelligence reports support audit preparations. Demonstrate a proactive approach to cybersecurity and achieve and maintain compliance more easily.

Testimonials 
& 
Partnerships

“Arachne Digital’s team works closely with us in integrating our tool, Speculo, with their data. Speculo is designed to help organisations get a full picture of their cyber risk with reliable analytics and a streamlined risk assessment process. The integration of Arachne Digital’s threat intelligence into Speculo provides evidence-based insights into cyber risks, making the tool more relevant to our customers. Arachne facilitated multiple face-to-face meetings and video calls, provided technical resources, comprehensive documentation, and example reports. This collaboration ensured that we could seamlessly integrate and utilize their data, significantly enriching the value we deliver to our clients.

Arachne Digital’s commitment to excellence and their proactive approach in supporting our needs have made them an indispensable partner. We highly recommend their services to any organisation looking to strengthen their threat intelligence capabilities.”

Partnership

We 
are 
partnered 
with 
DISARM 
Foundation.

Arachne Digital is proud to partner with the DISARM Foundation as the inaugural member of their Partner Programme, launched at the beginning of 2024.

This partnership is crucial in supporting the DISARM Foundation’s mission to maintain and enhance the DISARM Framework, ensuring it remains a free and continuously updated resource in the fight against disinformation.

Through our collaboration, Arachne Digital provides valuable feedback, promotes the integration of the framework into our operations, and encourages wider adoption within the defender community. This partnership highlights our commitment to combating evolving threats and fostering a secure digital environment.


Empower. 
Defend. 
Prevail.

Newsletter
Stay in the loop with our latest updates, exclusive offers, and content by subscribing to our newsletter.

© 2026 Arachne Digital, ALL RIGHTS RESERVED
Built by