Threat Intelligence Tarot
swords · 7
Russia (FSB - Crimean officers)
G0047
risk 3/5
The Hunger
Gamaredon
Shuckworm · Armageddon · ACTINIUM · UAC-0010 · Primitive Bear
Ukraine governmentUkrainian militaryUkrainian NGOsSecurity researchers
Active since ~2013 · Ukraine-focused espionage, Military intelligence, Volume-based persistent infection
Other Russian APTs are surgical. Gamaredon is ravenous. It floods Ukraine with malicious documents by the thousands - spray-and-pray volume phishing that relies on saturation rather than precision. A few always open. The Hunger is always fed.
Tactics & Techniques
RCN
RDV
INI
EXC
PRS
PRV
EVA
CRD
DSC
LAT
COL
C2
EXF
IMP
T1566.001
Spearphishing Attachment
Initial Access
T1547.001
Registry Run Keys
Persistence
T1204.002
Malicious File
Execution
T1082
System Information Discovery
Discovery
T1113
Screen Capture
Collection
T1134
Access Token Manipulation
Privilege Escalation
Notable Operations
  • Continuous Ukraine targeting since 2014 annexation of Crimea
  • Pterodo/Pteranodon backdoor family deployment
  • Ukrainian military credential harvesting operations (2022)
  • Post-invasion surge: thousands of phishing attacks per week (2022)
Defenses
Reversed: Their Weakness
Gamaredon's high-volume, low-sophistication approach made it one of the most thoroughly documented Russian APT groups. The sheer number of samples gave Ukrainian CERT and Western researchers deep visibility into its tooling and infrastructure.

Share this adversary profile

swipe to browse

Data sourced from MITRE ATT&CK. For educational purposes.