Cadet Blizzard
cadet-blizzard · primary source: Microsoft · first observed 2019
RU · RussiaState-sponsoredModerate confidencelast cited Jan 14, 2022 · 4y ago
Russian state-sponsored intrusion set publicly assessed by Microsoft as associated with the GRU but operationally distinct from Forest Blizzard (APT28) and Seashell Blizzard (Sandworm). Conducted the January 2022 WhisperGate destructive wiper operation against Ukrainian government and IT-services targets in the weeks preceding Russia's full-scale invasion. Microsoft assesses 'at least one Russian private sector organization has materially supported' Cadet Blizzard operations.
Aliases
DEV-0586MicrosoftEmber BearCrowdStrikeUAC-0056OtherBleeding BearOther
Motivations
destructionespionageinformation operations
Target sectors
governmenttechnologyeducationngo
Target countries
UAGEPLCZ
Diamond Model
Caltagirone / Pendergast / Betz 2013 — four-vertex attribution framework.
Adversary
- Cadet Blizzard
- Russia
- destruction
- espionage
- information operations
Capability
Infrastructure
—Victim
- government
- technology
- education
- UA
- GE
- +1 more
MITRE ATT&CK techniques
Tools & malware
1 entryTimeline
1 eventIndicators of compromise
2 indicators| Type | Value | First seen | Source |
|---|---|---|---|
| SHA-256 | family · WhisperGate WhisperGate stage2.exe - the file-corruption stage that overwrites files matching a hardcoded extension list, downloaded over Discord CDN. Hash from Microsoft MSTIC via CISA / FBI AA22-057A Table 1. | Jan 12, 2022 | CISA |
| SHA-256 | family · WhisperGate WhisperGate stage1.exe - MBR-corrupting destructive payload disguised as ransomware, deployed against Ukrainian organisations from 13 January 2022. Hash from Microsoft MSTIC, republished in CISA / FBI AA22-057A Table 1. Microsoft renamed the responsible actor Cadet Blizzard (DEV-0586) in June 2023 and attributed it to a GRU subgroup. | Jan 12, 2022 | CISA |
Related actors
shared ATT&CK techniques- IR · IranHomeland Justice3 shared techniques
- IR · IranVoid Manticore3 shared techniques
- KP · DPRKAndariel2 shared techniques
- CN · ChinaAPT402 shared techniques
- CN · ChinaHafnium2 shared techniques
- RU · RussiaRomCom2 shared techniques
References
cite this page
Threat Intel Tracker. (2026-05-19). Cadet Blizzard — actor profile. Retrieved from https://threatintel.local/actors/cadet-blizzard
latest cited activity · 2022-01-15 · 2 cataloged indicators