{"id":150,"date":"2019-04-02T09:53:50","date_gmt":"2019-04-02T07:53:50","guid":{"rendered":"https:\/\/192.168.10.2\/blog\/?p=150"},"modified":"2024-10-11T09:57:07","modified_gmt":"2024-10-11T07:57:07","slug":"cyber-gru-vi-and-now-what","status":"publish","type":"post","link":"https:\/\/lab52.io\/blog\/cyber-gru-vi-and-now-what\/","title":{"rendered":"(Cyber) GRU (VI): and now what?"},"content":{"rendered":"\n<p>The information that has come to light during 2018, both the official\n information of governments of the United Kingdom, the United States, \nthe Netherlands and Canada, as well as the unofficial additional \ninvestigations, both individuals and from different organizations \n(highlighting Bellingcat and RFE\/RL, Radio Free Europe\/RadioLiberty) has\n exposed a lot of interesting information about the GRU. It has provided\n us with data on its <strong>units<\/strong> (identification, structure, functions, physical location\u2026), on <strong>people<\/strong> who are part of the service (identities, jobs, functions, aliases, relationships, personal scope\u2026) and its <strong>operations<\/strong>\n (objectives, TTP, software, artifacts, IOC\u2026). In addition, they have \nrevealed deficient operational security measures, which have made it \npossible to broaden the initial investigations even further and have \nbrought to light identities, private homes, relatives\u2026 of members \u2013 or \nformer members \u2013 of the GRU.<\/p>\n\n\n\n<p>Of all the research carried out on the basis of data published by \ndifferent governments, the most noteworthy are those carried out by \nBellingcat, an organization that researches issues based mainly on open \nsources. We are now talking about private investigations, not endorsed \nby governments and based mostly on OSINT, something radically different \nfrom the statements of a government with evidentiary material that, of \ncourse, has not been obtained from public sources \u2013 we will talk about \nwhere this information may come from. We can even doubt the credibility \nof these sources, since there are many voices that defend that \neverything they publish is a lie, a Western montage, etc. Who knows\u2026 \nThese investigations are based on open sources and we insist that \nBellingcat is a private organization and therefore its investigations \nare also private; but on December 19, 2018, as we have previously \nadvanced, the US government ([1]) seems to officially endorse one of \nBellingcat\u2019s main investigations, which it identifies as two members of \nthe GRU, Heroes of the Russian Federation, the people who tried to \nassassinate the Skripal in March: from the details published by the \nBritish government about the false identities of the GRU agents that \npoisoned the Skripal (Alexander PETROV and Ruslan BOSHIROV), Bellincat \npublished in the same month of September and early October different \narticles, such as [2], showing the real identities of the suspects and \nconfirming their relationship with the GRU.<\/p>\n\n\n\n<p>In any case, much more interesting for us is the list of members or \nformer members of Unit 26165 of the Service ([3]), published on the same\n day October 4, in which different governments finished off the bad year\n of the GRU. That same day, based on the identities of the members of \nthe Unit brought to light by the Dutch intelligence, Bellingcat \nperformed a tracking in public and semi-public sources and identifies \nmore than 300 members of the Unit thanks to the registration addresses \nof their cars, which coincided with the headquarters of the Service. In \nthe RuNET there is private information of Russian citizens \u2013 homes, \nlicense plates, telephone numbers \u2013 available to any Internet user (we \ndo not buy databases on the black market, which would also be possible);\n from an identity (for example a name, linked to a date of birth or to \nthe address of the Unit) and with a little time it is possible to obtain\n personal data, and also possible to identify, for example, people who \nhave registered a vehicle at a certain address. In this way, Bellingcat \nassociates those potential members of Unit 26165 -or former members, or \npeople who have had a relationship with the Unit- and extracts names, \nlicense plates, personal addresses, social network profiles, in what is \nconsidered one of the most important information leaks in history.<\/p>\n\n\n\n<p>Without being Bellingcat, with a bit of time and using Google \nTranslate for those who do not know Russian, any Internet user can get \nto those same personal data, finding more than interesting \nrelationships. Of course, it is necessary to consider the reliability of\n the sources, although the data that we have been able to contrast \ndirectly suggest that, at least for the most part, the information \nextracted is true. We will talk at another time about the OSINT tracking\n in the RuNET, but in the following sections we will address what we \nhave learned from the GRU during 2018: part of its cyber structure, some\n of its objectives, different TTP of its operations and certain OPSEC \nconsiderations that perhaps should have been taken into account before \ntackling a close access operation.<\/p>\n\n\n\n<p><strong>References<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>[1] US Department of the Treasury. <em>Notice of Intended Removals; Ukraine-\/Russia-related Designations; Cyber-related Designations<\/em>. Diciembre 2018. <a href=\"https:\/\/www.treasury.gov\/resource-center\/sanctions\/OFAC-Enforcement\/Pages\/20181219_33.aspx\">https:\/\/www.treasury.gov\/resource-center\/sanctions\/OFAC-Enforcement\/Pages\/20181219_33.aspx<\/a><\/li><li>[2]&nbsp;Bellingcat. <em>Skripal Suspects Confirmed as GRU Operatives: Prior European Operations Disclosed<\/em>. Septiembre, 2018. <a href=\"https:\/\/www.bellingcat.com\/news\/uk-and-europe\/2018\/09\/20\/skripal-suspects-confirmed-gru-operatives-prior-european-operations-disclosed\/\">https:\/\/www.bellingcat.com\/news\/uk-and-europe\/2018\/09\/20\/skripal-suspects-confirmed-gru-operatives-prior-european-operations-disclosed\/<\/a><\/li><li>[3] Bellingcat. 305 Car Registrations May Point to Massive GRU Security Breach. Octubre, 2018. <a href=\"https:\/\/www.bellingcat.com\/news\/2018\/10\/04\/305-car-registrations-may-point-massive-gru-security-breach\/\">https:\/\/www.bellingcat.com\/news\/2018\/10\/04\/305-car-registrations-may-point-massive-gru-security-breach\/<\/a><\/li><\/ul>\n","protected":false},"excerpt":{"rendered":"<p>The information that has come to light during 2018, both the official information of governments of the United Kingdom, the United States, the Netherlands and Canada, as well as the unofficial additional investigations, both individuals and from different organizations (highlighting Bellingcat and RFE\/RL, Radio Free Europe\/RadioLiberty) has exposed a lot of interesting information about the [&hellip;]<\/p>\n","protected":false},"author":17,"featured_media":83,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[1],"tags":[],"class_list":{"0":"post-150","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-uncategorised","8":"entry"},"featured_image_src":"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2019\/03\/national-security-600x400.jpg","featured_image_src_square":"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2019\/03\/national-security-600x600.jpg","author_info":{"display_name":"BigBoss","author_link":"https:\/\/lab52.io\/blog\/author\/bigboss\/"},"_links":{"self":[{"href":"https:\/\/lab52.io\/blog\/wp-json\/wp\/v2\/posts\/150"}],"collection":[{"href":"https:\/\/lab52.io\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lab52.io\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lab52.io\/blog\/wp-json\/wp\/v2\/users\/17"}],"replies":[{"embeddable":true,"href":"https:\/\/lab52.io\/blog\/wp-json\/wp\/v2\/comments?post=150"}],"version-history":[{"count":3,"href":"https:\/\/lab52.io\/blog\/wp-json\/wp\/v2\/posts\/150\/revisions"}],"predecessor-version":[{"id":324,"href":"https:\/\/lab52.io\/blog\/wp-json\/wp\/v2\/posts\/150\/revisions\/324"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/lab52.io\/blog\/wp-json\/wp\/v2\/media\/83"}],"wp:attachment":[{"href":"https:\/\/lab52.io\/blog\/wp-json\/wp\/v2\/media?parent=150"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lab52.io\/blog\/wp-json\/wp\/v2\/categories?post=150"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lab52.io\/blog\/wp-json\/wp\/v2\/tags?post=150"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}