{"id":21360,"date":"2022-09-28T04:29:00","date_gmt":"2022-09-28T04:29:00","guid":{"rendered":"https:\/\/nsfocusglobal.com\/?p=21360"},"modified":"2026-04-17T18:07:43","modified_gmt":"2026-04-17T18:07:43","slug":"apt-group-gamaredon-intensifies-cyber-offensive-in-ukraine","status":"publish","type":"post","link":"https:\/\/nsfocusglobal.com\/pt-br\/apt-group-gamaredon-intensifies-cyber-offensive-in-ukraine\/","title":{"rendered":"APT Group Gamaredon Intensifies Cyber Offensive in Ukraine (Part 1)"},"content":{"rendered":"<!DOCTYPE html PUBLIC \"-\/\/W3C\/\/DTD HTML 4.0 Transitional\/\/EN\" \"http:\/\/www.w3.org\/TR\/REC-html40\/loose.dtd\">\n<html><body><h2 class=\"wp-block-heading\"><strong>Overview<\/strong><\/h2>\n\n\n\n<p>Beginning in the second quarter of this year, NSFOCUS Security Labs discovered that the APT group Gamaredon began frequently using a number of different types of attacks to conduct cyberattacks against military and police targets in Ukraine&acirc;&euro;&trade;s Kherson, Donetsk and other regions.<\/p>\n\n\n\n<p>In this attack cycle, Gamaredon mainly used attack tools such as malicious office documents, malicious HTML attachments, and malicious SFX files, along with carefully designed decoy messages, to form three different attack processes. Tracking analysis revealed that Gamaredon significantly increased the frequency of various types of attack activities in late July, and the number of decoy deliveries reached a new peak.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>About APT Group Gamaredon<\/strong><\/h2>\n\n\n\n<p>The earliest activities of the Russian APT group Gamaredon can be traced back to 2013. The group has carried out phishing attacks against government departments in Eastern European countries, especially Ukraine, for a long time. Common tools include various decoys disguised as official government documents, various scripting programs, and various homemade Trojans.<\/p>\n\n\n\n<p>The Ukrainian side blamed the Gamaredon organization on the Russian Federal Security Service (FSB).<\/p>\n\n\n\n<p>Gamaredon is known for its huge attack scale. According to <a href=\"https:\/\/nsfocusglobal.com\/pt-br\/resources\/h1-2022-global-ddos-attack-landscape\/\" target=\"_blank\" rel=\"noreferrer noopener\">NSFOCUS Global DDoS Attack Landscape (H1 2022)<\/a> report, medium and high-sophistication level threat actors have more attack resources to launch large-scale attacks. With adequate attack resources, launching Tb-level DDoS attacks will not be a difficult thing. &Acirc;&nbsp;<\/p>\n\n\n\n<p>With its large attack resources, the Gamaredon consistently delivers a wide variety of short-lived attack modules to minimize the chances of exposure and countermeasures.<\/p>\n\n\n\n<p>As the situation between Russia and Ukraine gradually escalated, the Gamaredon group significantly increased the frequency of its cyberattacks, actively using various known techniques to try to infiltrate critical institutions such as the Ukrainian government, military barracks, and police stations.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Trend Analysis<\/strong><\/h2>\n\n\n\n<p>In the process of tracking and analyzing the three types of attack activities used by Gamaredon, we found that the organization significantly intensified the frequency of attacks after July, and the attack trends showed the following two aspects:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Gamaredon added dependencies on the attack processes of spear phishing attacks using malicious HTML attachments and attacks using SFX self-extracting files.<\/li><li>The decoy content used by attackers has gradually shifted from news-based information in the early days to military-based information.<\/li><\/ul>\n\n\n\n<p>Our tracking study found that, on the one hand, a malicious SFX self-extracting file attack process commonly used by Gamaredon had two obvious peaks in late April and late July, and the decoys carried in the process gradually unified into various Russian military documents; On the other hand, a spear phishing attack containing malicious HTML attachments and lnk files also reached its peak in mid-to-late July, and the bait content of such spear phishing emails focused more on Ukrainian military information and cyber security information.<\/p>\n\n\n\n<p>Taking the second type of attack activity using HTM and lnk attack chains as an example, we captured relevant samples since Q2&acirc;&euro;&trade;22, extracted the malicious lnk files, and plotted the following statistical chart with the file creation time as in the figure below:<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large is-resized\"><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/09\/Figure-1-Statistical-chart-of-the-frequency-of-the-second-type-of-attack-activity.png\"><img fetchpriority=\"high\" decoding=\"async\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/09\/Figure-1-Statistical-chart-of-the-frequency-of-the-second-type-of-attack-activity-1024x652.png\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-21361\" width=\"765\" height=\"486\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/09\/Figure-1-Statistical-chart-of-the-frequency-of-the-second-type-of-attack-activity-1024x652.png 1024w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/09\/Figure-1-Statistical-chart-of-the-frequency-of-the-second-type-of-attack-activity-300x191.png 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/09\/Figure-1-Statistical-chart-of-the-frequency-of-the-second-type-of-attack-activity-768x489.png 768w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/09\/Figure-1-Statistical-chart-of-the-frequency-of-the-second-type-of-attack-activity-1536x978.png 1536w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/09\/Figure-1-Statistical-chart-of-the-frequency-of-the-second-type-of-attack-activity-600x382.png 600w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/09\/Figure-1-Statistical-chart-of-the-frequency-of-the-second-type-of-attack-activity-200x127.png 200w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/09\/Figure-1-Statistical-chart-of-the-frequency-of-the-second-type-of-attack-activity.png 1558w\" sizes=\"(max-width: 765px) 100vw, 765px\" \/><\/a><\/figure>\n<\/div>\n\n\n<p class=\"has-text-align-center\">Figure 1 Statistical chart of the frequency of the second type of attack activity<\/p>\n\n\n\n<p>It can be found that throughout the second quarter, Gamaredon made less use of this type of attack method, with a higher frequency attacks in early May; while starting from the middle of July, Gamaredon significantly increased the frequency of lnk spear phishing attacks, with more than 10 such incidents observed every week.<\/p>\n\n\n\n<p>The third type of attack activity using SFX files exhibits similar variations. Based on the time appearance in the wild, the frequency of such activities is calculated as follows:<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large is-resized\"><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/09\/Figure-2-Statistical-chart-of-the-frequency-of-the-third-type-of-attack-activity.png\"><img decoding=\"async\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/09\/Figure-2-Statistical-chart-of-the-frequency-of-the-third-type-of-attack-activity-1024x754.png\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-21363\" width=\"772\" height=\"568\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/09\/Figure-2-Statistical-chart-of-the-frequency-of-the-third-type-of-attack-activity-1024x754.png 1024w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/09\/Figure-2-Statistical-chart-of-the-frequency-of-the-third-type-of-attack-activity-300x221.png 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/09\/Figure-2-Statistical-chart-of-the-frequency-of-the-third-type-of-attack-activity-768x566.png 768w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/09\/Figure-2-Statistical-chart-of-the-frequency-of-the-third-type-of-attack-activity-600x442.png 600w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/09\/Figure-2-Statistical-chart-of-the-frequency-of-the-third-type-of-attack-activity-200x147.png 200w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/09\/Figure-2-Statistical-chart-of-the-frequency-of-the-third-type-of-attack-activity.png 1462w\" sizes=\"(max-width: 772px) 100vw, 772px\" \/><\/a><\/figure>\n<\/div>\n\n\n<p class=\"has-text-align-center\">Figure 2&Acirc;&nbsp; Statistical chart of the frequency of the third type of attack activity<\/p>\n\n\n\n<p>It can be found that, overall, the frequency of SFX decoys is relatively even, again with two peaks in late April and late July, which is more in line with the pace of the second type of attacks.<\/p>\n\n\n\n<p>The above statistics show that Gamaredon significantly increased the frequency of cyber attacks against Ukraine in late July and used more military file information as bait, which can be judged as an intensive offensive against Ukrainian military targets.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Activity Analysis<\/strong><\/h2>\n\n\n\n<p><strong>Type 1: Malicious documents disguised as police files<\/strong><\/p>\n\n\n\n<p>The main bait used by Gamaredon in such campaigns is a malicious document disguised as a Ukrainian investigation report. We found that most malicious documents of this type carry the content of common police documents such as duty records, police records, and processing reports, and are mainly used by Gamaredon to attack police officers in various regions of Ukraine.<\/p>\n\n\n\n<p>A recently discovered document of this type, named &#8220;&ETH;&nbsp;&ETH;&ETH;&Yuml;&ETH;&#382;&ETH;&nbsp;&ETH;&cent; &ETH;&oelig;&ETH;&nbsp;&ETH;&pound;&ETH;&Yuml; 06.06.22.docx&#8221;, abuses the Office remote template mechanism and tries to obtain the malicious payload at the specified network location (shown below) when it is opened, and then run it.<\/p>\n\n\n\n<p><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-cyan-bluish-gray-color\">http[:]\/\/faithfully.glitter17.drowrang[.]ru\/WIN-BDQQL5EO1F2\/interested\/naturalists\/lowered\/lowered\/lowered.hr2<\/mark><\/p>\n\n\n\n<p>Observing the decoy text in the document, we can find that its direct target is the Police Station of Donetsk District in Ukraine.<\/p>\n\n\n\n<p> <\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large is-resized\"><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/09\/Figure-3-Type-1-A-decoy-document.png\"><img decoding=\"async\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/09\/Figure-3-Type-1-A-decoy-document-1024x684.png\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-21365\" width=\"621\" height=\"415\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/09\/Figure-3-Type-1-A-decoy-document-1024x684.png 1024w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/09\/Figure-3-Type-1-A-decoy-document-300x200.png 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/09\/Figure-3-Type-1-A-decoy-document-768x513.png 768w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/09\/Figure-3-Type-1-A-decoy-document-600x401.png 600w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/09\/Figure-3-Type-1-A-decoy-document-200x134.png 200w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/09\/Figure-3-Type-1-A-decoy-document.png 1440w\" sizes=\"(max-width: 621px) 100vw, 621px\" \/><\/a><\/figure>\n<\/div>\n\n\n<p class=\"has-text-align-center\">Figure 3 Type 1 &#8211; A decoy document<\/p>\n\n\n\n<p>Other decoys of this type include a document called &#8220;&ETH;&scaron;&ETH;&frac34;&ETH;&iquest;&ETH;&cedil;&Ntilde; &ETH;&mdash;&ETH;&ETH;&nbsp;&ETH;&Yuml;&ETH;&rsaquo;&ETH;&Yuml;&ETH;&cent;&ETH; &ETH;&cent;&Ntilde;&euro;&ETH;&deg;&ETH;&sup2;&ETH;&micro;&ETH;&frac12;&Ntilde;&OElig; 2022.docx&#8221;, carrying a malicious link of http[:]\/\/enforce.interdependent23.vipertos[. ]ru\/DESKTOP-STA1AO7\/salmon\/salmon.udb, which actually holds a multi-stage VBScript payload. The associated content indicates that the direct target of the decoy was A4267 unit of the Ukrainian Army&#8217;s.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large is-resized\"><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/09\/Figure-4-Type-1-Another-decoy-document.png\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/09\/Figure-4-Type-1-Another-decoy-document-1024x692.png\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-21367\" width=\"698\" height=\"471\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/09\/Figure-4-Type-1-Another-decoy-document-1024x692.png 1024w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/09\/Figure-4-Type-1-Another-decoy-document-300x203.png 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/09\/Figure-4-Type-1-Another-decoy-document-768x519.png 768w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/09\/Figure-4-Type-1-Another-decoy-document-600x405.png 600w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/09\/Figure-4-Type-1-Another-decoy-document-200x135.png 200w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/09\/Figure-4-Type-1-Another-decoy-document.png 1425w\" sizes=\"(max-width: 698px) 100vw, 698px\" \/><\/a><\/figure>\n<\/div>\n\n\n<p class=\"has-text-align-center\">Figure 4 Type 1 &#8212; Another decoy document<\/p>\n\n\n\n<p>(To be continued&#8230;) <\/p>\n<\/body><\/html>\n","protected":false},"excerpt":{"rendered":"<p>Overview Beginning in the second quarter of this year, NSFOCUS Security Labs discovered that the APT group Gamaredon began frequently using a number of different types of attacks to conduct cyberattacks against military and police targets in Ukraine&acirc;&euro;&trade;s Kherson, Donetsk and other regions. In this attack cycle, Gamaredon mainly used attack tools such as malicious [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":21371,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_coblocks_attr":"","_coblocks_dimensions":"","_coblocks_responsive_height":"","_coblocks_accordion_ie_support":"","footnotes":""},"categories":[3],"tags":[94],"class_list":["post-21360","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","tag-apt-group"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>APT Group Gamaredon Intensifies Cyber Offensive in Ukraine (Part 1) - NSFOCUS<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/nsfocusglobal.com\/apt-group-gamaredon-intensifies-cyber-offensive-in-ukraine\/\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"APT Group Gamaredon Intensifies Cyber Offensive in Ukraine (Part 1) - NSFOCUS\" \/>\n<meta property=\"og:description\" content=\"Overview Beginning in the second quarter of this year, NSFOCUS Security Labs discovered that the APT group Gamaredon began frequently using a number of\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nsfocusglobal.com\/apt-group-gamaredon-intensifies-cyber-offensive-in-ukraine\/\" \/>\n<meta property=\"og:site_name\" content=\"NSFOCUS\" \/>\n<meta property=\"article:published_time\" content=\"2022-09-28T04:29:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-17T18:07:43+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/09\/Gamaredon-e1664167669467.png\" \/>\n<meta name=\"author\" content=\"NSFOCUS\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"APT Group Gamaredon Intensifies Cyber Offensive in Ukraine (Part 1) - NSFOCUS\" \/>\n<meta name=\"twitter:description\" content=\"Overview Beginning in the second quarter of this year, NSFOCUS Security Labs discovered that the APT group Gamaredon began frequently using a number of\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/09\/Gamaredon-e1664167669467.png\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"NSFOCUS\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/apt-group-gamaredon-intensifies-cyber-offensive-in-ukraine\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/apt-group-gamaredon-intensifies-cyber-offensive-in-ukraine\\\/\"},\"author\":{\"name\":\"NSFOCUS\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#\\\/schema\\\/person\\\/fd9ab61c9c77a81bbd870f725cc0c61d\"},\"headline\":\"APT Group Gamaredon Intensifies Cyber Offensive in Ukraine (Part 1)\",\"datePublished\":\"2022-09-28T04:29:00+00:00\",\"dateModified\":\"2026-04-17T18:07:43+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/apt-group-gamaredon-intensifies-cyber-offensive-in-ukraine\\\/\"},\"wordCount\":956,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/apt-group-gamaredon-intensifies-cyber-offensive-in-ukraine\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2022\\\/09\\\/Gamaredon-e1664167669467.png\",\"keywords\":[\"APT Group;\"],\"articleSection\":[\"Blog\"],\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/apt-group-gamaredon-intensifies-cyber-offensive-in-ukraine\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/apt-group-gamaredon-intensifies-cyber-offensive-in-ukraine\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/apt-group-gamaredon-intensifies-cyber-offensive-in-ukraine\\\/\",\"name\":\"APT Group Gamaredon Intensifies Cyber Offensive in Ukraine (Part 1) - NSFOCUS\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/apt-group-gamaredon-intensifies-cyber-offensive-in-ukraine\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/apt-group-gamaredon-intensifies-cyber-offensive-in-ukraine\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2022\\\/09\\\/Gamaredon-e1664167669467.png\",\"datePublished\":\"2022-09-28T04:29:00+00:00\",\"dateModified\":\"2026-04-17T18:07:43+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/apt-group-gamaredon-intensifies-cyber-offensive-in-ukraine\\\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/apt-group-gamaredon-intensifies-cyber-offensive-in-ukraine\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/apt-group-gamaredon-intensifies-cyber-offensive-in-ukraine\\\/#primaryimage\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2022\\\/09\\\/Gamaredon-e1664167669467.png\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2022\\\/09\\\/Gamaredon-e1664167669467.png\",\"width\":300,\"height\":125,\"caption\":\"Hooded figure with \\\"Gamaredon APT Group\\\" text.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/apt-group-gamaredon-intensifies-cyber-offensive-in-ukraine\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/nsfocusglobal.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"APT Group Gamaredon Intensifies Cyber Offensive in Ukraine (Part 1)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#website\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/\",\"name\":\"NSFOCUS\",\"description\":\"Security Made Smart and Simple\",\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/nsfocusglobal.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#organization\",\"name\":\"NSFOCUS\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"width\":248,\"height\":36,\"caption\":\"NSFOCUS\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#\\\/schema\\\/person\\\/fd9ab61c9c77a81bbd870f725cc0c61d\",\"name\":\"NSFOCUS\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"caption\":\"NSFOCUS\"},\"sameAs\":[\"https:\\\/\\\/nsfocusglobal.com\"],\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/author\\\/admin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"APT Group Gamaredon Intensifies Cyber Offensive in Ukraine (Part 1) - NSFOCUS","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/nsfocusglobal.com\/apt-group-gamaredon-intensifies-cyber-offensive-in-ukraine\/","og_locale":"pt_BR","og_type":"article","og_title":"APT Group Gamaredon Intensifies Cyber Offensive in Ukraine (Part 1) - NSFOCUS","og_description":"Overview Beginning in the second quarter of this year, NSFOCUS Security Labs discovered that the APT group Gamaredon began frequently using a number of","og_url":"https:\/\/nsfocusglobal.com\/apt-group-gamaredon-intensifies-cyber-offensive-in-ukraine\/","og_site_name":"NSFOCUS","article_published_time":"2022-09-28T04:29:00+00:00","article_modified_time":"2026-04-17T18:07:43+00:00","og_image":[{"url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/09\/Gamaredon-e1664167669467.png","type":"","width":"","height":""}],"author":"NSFOCUS","twitter_card":"summary_large_image","twitter_title":"APT Group Gamaredon Intensifies Cyber Offensive in Ukraine (Part 1) - NSFOCUS","twitter_description":"Overview Beginning in the second quarter of this year, NSFOCUS Security Labs discovered that the APT group Gamaredon began frequently using a number of","twitter_image":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/09\/Gamaredon-e1664167669467.png","twitter_misc":{"Escrito por":"NSFOCUS","Est. tempo de leitura":"5 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/nsfocusglobal.com\/apt-group-gamaredon-intensifies-cyber-offensive-in-ukraine\/#article","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/apt-group-gamaredon-intensifies-cyber-offensive-in-ukraine\/"},"author":{"name":"NSFOCUS","@id":"https:\/\/nsfocusglobal.com\/#\/schema\/person\/fd9ab61c9c77a81bbd870f725cc0c61d"},"headline":"APT Group Gamaredon Intensifies Cyber Offensive in Ukraine (Part 1)","datePublished":"2022-09-28T04:29:00+00:00","dateModified":"2026-04-17T18:07:43+00:00","mainEntityOfPage":{"@id":"https:\/\/nsfocusglobal.com\/apt-group-gamaredon-intensifies-cyber-offensive-in-ukraine\/"},"wordCount":956,"commentCount":0,"publisher":{"@id":"https:\/\/nsfocusglobal.com\/#organization"},"image":{"@id":"https:\/\/nsfocusglobal.com\/apt-group-gamaredon-intensifies-cyber-offensive-in-ukraine\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/09\/Gamaredon-e1664167669467.png","keywords":["APT Group;"],"articleSection":["Blog"],"inLanguage":"pt-BR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/nsfocusglobal.com\/apt-group-gamaredon-intensifies-cyber-offensive-in-ukraine\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/nsfocusglobal.com\/apt-group-gamaredon-intensifies-cyber-offensive-in-ukraine\/","url":"https:\/\/nsfocusglobal.com\/apt-group-gamaredon-intensifies-cyber-offensive-in-ukraine\/","name":"APT Group Gamaredon Intensifies Cyber Offensive in Ukraine (Part 1) - NSFOCUS","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/nsfocusglobal.com\/apt-group-gamaredon-intensifies-cyber-offensive-in-ukraine\/#primaryimage"},"image":{"@id":"https:\/\/nsfocusglobal.com\/apt-group-gamaredon-intensifies-cyber-offensive-in-ukraine\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/09\/Gamaredon-e1664167669467.png","datePublished":"2022-09-28T04:29:00+00:00","dateModified":"2026-04-17T18:07:43+00:00","breadcrumb":{"@id":"https:\/\/nsfocusglobal.com\/apt-group-gamaredon-intensifies-cyber-offensive-in-ukraine\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nsfocusglobal.com\/apt-group-gamaredon-intensifies-cyber-offensive-in-ukraine\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/apt-group-gamaredon-intensifies-cyber-offensive-in-ukraine\/#primaryimage","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/09\/Gamaredon-e1664167669467.png","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/09\/Gamaredon-e1664167669467.png","width":300,"height":125,"caption":"Hooded figure with \"Gamaredon APT Group\" text."},{"@type":"BreadcrumbList","@id":"https:\/\/nsfocusglobal.com\/apt-group-gamaredon-intensifies-cyber-offensive-in-ukraine\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/nsfocusglobal.com\/"},{"@type":"ListItem","position":2,"name":"APT Group Gamaredon Intensifies Cyber Offensive in Ukraine (Part 1)"}]},{"@type":"WebSite","@id":"https:\/\/nsfocusglobal.com\/#website","url":"https:\/\/nsfocusglobal.com\/","name":"NSFOCUS","description":"Security Made Smart and Simple","publisher":{"@id":"https:\/\/nsfocusglobal.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/nsfocusglobal.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/nsfocusglobal.com\/#organization","name":"NSFOCUS","url":"https:\/\/nsfocusglobal.com\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/#\/schema\/logo\/image\/","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","width":248,"height":36,"caption":"NSFOCUS"},"image":{"@id":"https:\/\/nsfocusglobal.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/nsfocusglobal.com\/#\/schema\/person\/fd9ab61c9c77a81bbd870f725cc0c61d","name":"NSFOCUS","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","caption":"NSFOCUS"},"sameAs":["https:\/\/nsfocusglobal.com"],"url":"https:\/\/nsfocusglobal.com\/pt-br\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/21360","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/comments?post=21360"}],"version-history":[{"count":0,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/21360\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media\/21371"}],"wp:attachment":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media?parent=21360"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/categories?post=21360"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/tags?post=21360"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}