COLDRIVER
coldriver · primary source: Other · first observed 2014
RU · RussiaState-sponsoredHigh confidencelast cited Dec 6, 2023 · 2y ago
Russian state-sponsored intrusion set publicly assessed by the UK NCSC and Five Eyes partners as 'almost certainly subordinate to FSB Centre 18'. Conducts targeted credential-phishing operations against UK and U.S. political figures, policy-NGOs, journalists, defense contractors, and academia, frequently using elaborate impersonation personas. The U.S. DOJ unsealed an indictment of FSB officer Ruslan Peretyatko and Andrey Korinets on 7 December 2023; the UK Foreign Office concurrently announced sanctions and public attribution.
Aliases
Star BlizzardMicrosoftSEABORGIUMMicrosoftCallisto GroupOtherTA446OtherBlueCharlieOther
Motivations
espionageinformation operations
Target sectors
governmentngoacademiadefensejournalism
Target countries
USGBUADEFRBEPL
Diamond Model
Caltagirone / Pendergast / Betz 2013 — four-vertex attribution framework.
MITRE ATT&CK techniques
Timeline
1 eventIndicators of compromise
2 indicators| Type | Value | First seen | Source |
|---|---|---|---|
| SHA-256 | family · SPICA SPICA - Rust backdoor delivered as 'Proton-decrypter.exe' in a fake PDF-decryption lure. Google Threat Analysis Group disclosed the sample on 18 January 2024 as the first custom malware they have attributed to COLDRIVER (Star Blizzard / Callisto / SEABORGIUM), assessed as FSB Centre 18. | Aug 31, 2023 | Google TAG |
| Name | Long-running FSB Centre 18 spear-phishing cluster targeting academia, defence, NGOs and government in the UK, US and allied countries. NCSC UK and Five Eyes partners published a joint advisory on 7 December 2023; same day, US Treasury (OFAC) and UK sanctioned FSB officer Ruslan Peretyatko and Andrey Korinets for their role in the operation. | Dec 31, 2018 | NCSC UK |
Related actors
shared ATT&CK techniques- IR · IranAPT342 shared techniques
- IR · IranAPT392 shared techniques
- RU · RussiaDragonfly2 shared techniques
- ?? · UnknownALPHV/BlackCat1 shared technique
- KP · DPRKAndariel1 shared technique
- CN · ChinaAPT101 shared technique
References
cite this page
Threat Intel Tracker. (2026-05-19). COLDRIVER — actor profile. Retrieved from https://threatintel.local/actors/coldriver
latest cited activity · 2023-12-07 · 2 cataloged indicators