To install click the Add extension button. That's it.

The source code for the WIKI 2 extension is being checked by specialists of the Mozilla Foundation, Google, and Apple. You could also do it yourself at any point in time.

4,5
Kelly Slayton
Congratulations on this excellent venture… what a great idea!
Alexander Grigorievskiy
I use WIKI 2 every day and almost forgot how the original Wikipedia looks like.
Live Statistics
English Articles
Improved in 24 Hours
Added in 24 Hours
Languages
Recent
Show all languages
What we do. Every page goes through several hundred of perfecting techniques; in live mode. Quite the same Wikipedia. Just better.
.
Leo
Newton
Brights
Milds

Ghostwriter (hacker group)

From Wikipedia, the free encyclopedia

Ghostwriter
Formationc. 2016
Typethreat actor
PurposeDisinformation attack
HeadquartersMinsk, Belarus[1]
Region
Belarus
Methodsphishing
AffiliationsArmed Forces of Belarus[1]

Ghostwriter, also known as UNC1151 and Storm-0257 by Microsoft,[2] is a hacker group allegedly originating from Belarus. According to the cybersecurity firm Mandiant, the group has spread disinformation critical of NATO since at least 2016.[3]

YouTube Encyclopedic

  • 1/3
    Views:
    1 410
    6 652
    184 977
  • Managing Your Red Team Operations with Ghostwriter – Christopher Maddalena (SO-CON 2020)
  • [Attack]tive Directory: Compromising a Network in 20 Minutes Through Active Directory
  • Top Cyber Attacks In History | Biggest Cyber Attacks Of All Time | Cyber Security | Simplilearn

Transcription

History

The name Ghostwriter comes from the group's first attacks, whereby they would steal credentials of journalists or publishers and publish fake articles using those credentials. Hence, the group effectively became unwanted ghostwriters for those with stolen credentials.[4] UNC1151 is an internal company name by Mandiant given to uncategorized groups of "cyber intrusion activity."[5]

The European Union has blamed this group for hacking German government officials.

EU's foreign policy chef Josep Borrell has threatened Russia for sanctions.[6]

According to Serhiy Demedyuk, deputy secretary of the national security and defense council of Ukraine, the group was responsible for defacement of Ukrainian government websites in January 2022.[7]

In February 2022 The Register reported that a Ukrainian CERT had announced that the group was targeting "private ‘i.ua’ and ‘meta.ua’ [email] accounts of Ukrainian military personnel and related individuals" as part of a phishing attack during the invasion of Ukraine.[8] Mandiant said that two domains mentioned by the CERT, i[.]ua-passport[.]space and id[.]bigmir[.]space were known command and control domains of the group.[8] Mandiant also said "We are able to tie the infrastructure reported by CERT.UA to UNC1151, but have not seen the phishing messages directly. However, UNC1151 has targeted Ukraine and especially its military extensively over the past two years, so this activity matches their historical pattern."[8][7]

Characteristics and techniques

The group has executed spear-phishing campaigns against members of legitimate press to infiltrate the content management systems of those organizations. Then, the group uses the system to publish their own fake stories.[9]

References

  1. ^ a b Satter, Raphael (2022-02-25). "Ukraine says its military is being targeted by Belarusian hackers". Reuters. Retrieved 2022-03-07.
  2. ^ "How Microsoft names threat actors". Microsoft. Retrieved 21 January 2024.
  3. ^ "Ghostwriter Update: Cyber Espionage Group UNC1151 Likely Conducts Ghostwriter Influence Activity | Mandiant". www.mandiant.com. Retrieved 2022-03-02.
  4. ^ "'Ghostwriter' Influence Campaign" (PDF). FireEye. Retrieved 5 March 2022.
  5. ^ "DebUNCing Attribution: How Mandiant Tracks Uncategorized Threat Actors | Mandiant". www.mandiant.com. Retrieved 2022-03-07.
  6. ^ "EU threatens sanctions on Russia over 'malicious cyber activities'". euronews. 2021-09-24. Retrieved 2021-09-24.
  7. ^ a b Polityuk, Pavel (2022-01-16). "EXCLUSIVE Ukraine suspects group linked to Belarus intelligence over cyberattack". Reuters. Retrieved 2022-03-07.
  8. ^ a b c Corfield, Gareth (2022-02-25). "Ukraine seeks volunteers to defend networks as Russian troops menace Kyiv". The Register. Retrieved 2022-02-26.
  9. ^ Greenberg, Andy. "Hackers Broke Into Real News Sites to Plant Fake Stories". Wired. ISSN 1059-1028. Retrieved 2022-03-02.
This page was last edited on 21 January 2024, at 02:24
Basis of this page is in Wikipedia. Text is available under the CC BY-SA 3.0 Unported License. Non-text media are available under their specified licenses. Wikipedia® is a registered trademark of the Wikimedia Foundation, Inc. WIKI 2 is an independent company and has no affiliation with Wikimedia Foundation.