DOJ, Microsoft Seize Websites Linked to Alleged Russian Espionage

One hundred web domains were allegedly used by hackers and criminal proxies working for a group under the Russian Federal Security Service.
DOJ, Microsoft Seize Websites Linked to Alleged Russian Espionage
A man types on a computer keyboard on Feb. 28, 2013. Kacper Pempel/Reuters
Katabella Roberts
Updated:
0:00

More than 100 web domains allegedly linked to a cyberespionage campaign run by the Russian government have been seized by the U.S. Department of Justice (DOJ) and tech giant Microsoft, according to court documents unsealed on Oct. 3.

The DOJ unsealed a warrant authorizing agents to seize 41 internet domains they said are being used by Russian intelligence agents and their proxies to “commit computer fraud and abuse in the United States.”

According to the partially unsealed affidavit filed in support of the government’s seizure warrant, the seized domains were used by hackers or criminal proxies working for the Callisto Group—an operational unit within the Russian Federal Security Service, the successor agency to the KGB.

The group ran a “sophisticated spear-phishing campaign,” using the now-seized domains to gain unauthorized access to computers and email accounts belonging to members of the U.S. government and other victims to steal valuable information.

According to the DOJ, victims of the spear-phishing campaign allegedly included U.S.-based companies, former U.S. intelligence employees, former and current Department of Defense and Department of State employees, U.S. military defense contractors, and staff at the Department of Energy.

Deputy Attorney General Lisa Monaco said the seizure of 41 internet domains reflects the DOJ’s “cyber strategy in action,” and that the department uses all available tools to disrupt and deter malicious, state-sponsored cybercriminals.

“The Russian government ran this scheme to steal Americans’ sensitive information, using seemingly legitimate email accounts to trick victims into revealing account credentials,” Monaco said.“With the continued support of our private sector partners, we will be relentless in exposing Russian actors and cybercriminals and depriving them of the tools of their illicit trade.”

Microsoft’s Digital Crimes Unit also seized another 66 domains, which it said are being used by the Callisto Group. The company refers to the group as “Star Blizzard.”

The tech giant said in a blog post that its Threat Intelligence platform observed the group target Microsoft customers globally, including throughout the United States.

Callisto Group Targeting Russian Citizens in America

Between January 2023 and August 2024, the hacking group also targeted more than 30 civil society entities and organizations including journalists, think tanks, and nongovernmental organizations (NGOs), using spear-phishing campaigns to exfiltrate sensitive information and interfere in their activities, according to Microsoft.

Microsoft said the Callisto Group has been engaged in various forms of cyberattacks since at least 2017.

More recently, however, the group has targeted NGOs and think tanks that support government employees and military and intelligence officials, with a strong focus on those providing support to Ukraine and NATO countries.

The group has been “particularly aggressive” in targeting former intelligence officials, Russian affairs experts, and Russian citizens residing in the United States, Microsoft said.

“Since January 2023, Microsoft has identified 82 customers targeted by this group, at a rate of approximately one attack per week,” the tech firm said. “This frequency underscores the group’s diligence in identifying high-value targets, crafting personalized phishing emails, and developing the necessary infrastructure for credential theft.”

The latest seizures come after the DOJ in December 2023 announced charges against two Callisto-affiliated actors, Ruslan Aleksandrovich Peretyatko and Andrey Stanislavovich Korinets.

According to the DOJ, the two men worked with the group on behalf of the Russian government, targeting computer networks in the United States and the United Kingdom as well as in NATO member countries and Ukraine.

The information stolen from the targeted accounts was then leaked to the press in Russia and the UK in advance of the 2019 elections in the latter nation, the DOJ said.

Russia’s Ministry of Foreign Affairs did not respond to a request for comment by press time.

Katabella Roberts
Katabella Roberts
Author
Katabella Roberts is a news writer for The Epoch Times, focusing primarily on the United States, world, and business news.