Gamaredon Group
Gamaredon Group is a threat group that has been active since at least 2013, and has targeted individuals with probable involvement in the Ukrainian government. The threat group’s name originated from a misspelling of the word ’Armageddon’, which was detected in the threat group’s early campaigns.
This is a collection of rules based on the presence of indicators of compromise publicly reported as associated with this malicious actor.
- Suspicious DNS Request - Gamaredon Group Related Domain Observed
- Suspicious Process - Gamaredon Group Related Binary Executed
- Suspicious Web Request - Gamaredon Group Related Domain Observed
Suspicious DNS Request - Gamaredon Group Related Domain Observed
Description
This detection identifies a request to resolve a domain publicly known to be associated with this specific malicious actor. Please be aware that malicious actors will often use compromised legitimate websites for malicious purposes.
Recommendation
The alert may be related to normal web browsing activity by the end user. Review the alert in question. If necessary, rebuild the host from a known, good source and have the user change their password.
Suspicious Process - Gamaredon Group Related Binary Executed
Description
This detection identifies the execution of a file with a hash publicly known to be associated with this specific malicious actor. Please be aware that malicious actors will often use common System Administration tools for malicious purposes.
Recommendation
Review the alert in question. If necessary, rebuild the host from a known, good source and have the user change their password.
Suspicious Web Request - Gamaredon Group Related Domain Observed
Description
This detection identifies a request to a domain publicly known to be associated with this specific malicious actor. Please be aware that malicious actors will often compromise legitimate websites to use for malicious purposes.
Recommendation
The alert may be related to normal web browsing activity by the end user. Review the alert in question. If necessary, rebuild the host from a known, good source and have the user change their password.