{"id":2798,"date":"2025-02-03T11:01:48","date_gmt":"2025-02-03T10:01:48","guid":{"rendered":"https:\/\/lab52.io\/blog\/?p=2798"},"modified":"2025-02-03T11:01:50","modified_gmt":"2025-02-03T10:01:50","slug":"gru-military-unit-54777","status":"publish","type":"post","link":"https:\/\/lab52.io\/blog\/gru-military-unit-54777\/","title":{"rendered":"GRU: Military Unit 54777"},"content":{"rendered":"\n<p>The main units of the Russian GRU engaged in cyberspace operations have been discussed in this blog: from our old posts (from 2018) about unit <a href=\"https:\/\/lab52.io\/blog\/cyber-gru-vii-structure-unit-26165\/\">26165 <\/a>and <a href=\"https:\/\/lab52.io\/blog\/cyber-gru-viii-structure-unit-74455\/\">74455<\/a>, to the recent rise of unit <a href=\"https:\/\/lab52.io\/blog\/gru-military-unit-29155\/\">29155<\/a>. All these units have something in common, in addition to their cyberspace capabilities: they have been assigned an APT group name. Military unit <a href=\"https:\/\/lab52.io\/blog\/cyber-gru-vii-structure-unit-26165\/\">26165 <\/a>is commonly referred as APT28, while unit <a href=\"https:\/\/lab52.io\/blog\/cyber-gru-viii-structure-unit-74455\/\">74455 <\/a>is known as Sandworm Team and unit <a href=\"https:\/\/lab52.io\/blog\/gru-military-unit-29155\/\">29155 <\/a>is named Ember Bear (please note the mess about APT groups nomenclature, referred in the <a href=\"https:\/\/www.securityartwork.es\/2020\/12\/04\/exploiting-apt-data-for-fun-and-no-profit-iv-conclusions\/\">Security ArtWork blog<\/a>). However, not all GRU units operating on cyberspace have the honor of being assigned an APT group. In this post, unit <strong>54777 <\/strong>is presented, a GRU military unit engaged in PSYOP -also through cyberspace- but, until now, without a particular common name.<\/p>\n\n\n\n<p>Soviet Union, and now Russia, has a long history on disinformation and psychological warfare. In fact, Information Confrontation&#8217;s aim is to influence the perception and behavior of the enemy, population, and international community. Psychological warfare has been used since the roots of Soviet intelligence by spymaster and Cheka founder Felix DZERZHINSKI, to the current Ukrainian conflict. Just a fact to highlight the relevance of psychological warfare in modern Russia: Aleksandr Gennadyevich STARUNSKY, a former commander of military unit <strong>54777<\/strong>, was appointed by Vladimir PUTIN to the Scientific Council, under the Security Council of the Russian Federation.<\/p>\n\n\n\n<p>Soviet GRU, and whole Soviet Red Army, considered special propaganda as part of their active measures. Although propaganda was supposed to influence on enemy troops, the Soviet regime used it to strengthen the spirit of its own troops. When Soviet Union collapsed, the Special Propaganda Directorate, responsible for military psychological operations, were transferred into the GRU, and few years later, in 1994, it was established as military unit <strong>54777<\/strong>. This transference was not only a bureaucratic question: it made Russian PSYOP more aggressive than they were during Soviet times. While in Soviet times special propaganda units operated only during military operations, with this transference operations began to be carried out \u201cin peace time and war time\u201d.<\/p>\n\n\n\n<p>Military unit <strong>54777 <\/strong>(VCh 54777, 72nd Special Service Center, 72nd Main Intelligence Information Center -GRITs- or Foreign Information and Communications Service), is still responsible for the GRU\u2019s PSYOP. A detailed description of this unit, together with historical Soviet propaganda efforts and current Russian psychological warfare, can be found on <a href=\"https:\/\/agentura.ru\/centr-zarubezhnoj-voennoj-informacii-i-kommunikacii-czvik-gu-gsh\/\">Agentura <\/a>website and on <a href=\"https:\/\/thinktank.4freerussia.org\/aquarium-leaks-inside-the-gru-s-psychological-warfare-program\/\">Aquarium Leaks<\/a> (Inside the GRU\u2019s Psychological Warfare Program).<\/p>\n\n\n\n<p>Among its most notable operations, unit <strong>54777 <\/strong>has been involved in disinformation campaigns related to the 2014 annexation of Crimea, to the Syrian civil war and to the Ukraine conflict. In peace time, this unit has been involved in propaganda campaigns during elections in Europe and in the United States, as well as in disinformation campaigns related to COVID-19 pandemic.<\/p>\n\n\n\n<p>In addition to conventional PSYOP, unit <strong>54777 <\/strong>includes both SIGINT and cyberspace capabilities. Related to SIGINT, unit <strong>54777 <\/strong>gathers and analyzes communications to produce intelligence that can be used in further disinformation and influence campaigns. In the cyber arena, this unit works complementing Cyberspace Operations not only with digital PSYOP: its activities include operating in support of other GRU cyber units, creating and disseminating fake versions of their cyberspace operations, as well as operating on the tactical level by conducting electronic warfare and psychological operations.<\/p>\n\n\n\n<p>Unit 54777 conducts most of its online operations through social media, an activity which began with the Maidan revolution. In addition to social media, this unit engages in spreading disinformation and manipulating public opinion through online digital platforms and public forums. It works through several front organizations, including InfoRos and the Institute of the Russian Diaspora, founded by Aleksandr Gennadyevich STARUNSKY. These are \u201cinformation agencies\u201d focused on political, economic and social life in the Russian Federation and other ex Soviet Republics, posting both in Russian and in English.<\/p>\n\n\n\n<p>Probably, unit <strong>54777 <\/strong>is located within the GRU 12th Directorate, which focuses on information operations. It is believed that unit <strong>54777 <\/strong>is overseen by unit 55111. In fact, Aleksandr Gennadyevich STARUNSKY, former commander of unit <strong>54777<\/strong>, was the deputy commander of unit 55111 when he was appointed to the Scientific Council. According to open sources, military unit <strong>54777 <\/strong>has, or has had, different subordinate units performing PSYOP in every Russian military district in addition to the Moscow one:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>PSYOP Leningrad Military District, military unit 03126, located in Leningrad region.<\/li>\n\n\n\n<li>PSYOP Central Military District, military unit 03138, located in Yekaterinburg.<\/li>\n\n\n\n<li>PSYOP Southern Military District, military unit 03128, located in Rostov-on-Don.<\/li>\n\n\n\n<li>PSYOP Eastern Military District, military unit 03134, located in Khabarovsk.<\/li>\n<\/ul>\n\n\n\n<p>A characteristic feature of all these units is their emblem: a combination of the international symbol for psychology, \u03a8 (\u201cPsi\u201d), and a red carnation, the heraldic symbol of Russian military intelligence, as shown in image (from <a href=\"https:\/\/agentura.ru\/centr-zarubezhnoj-voennoj-informacii-i-kommunikacii-czvik-gu-gsh\/\">Agentura <\/a>website):<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"328\" height=\"417\" src=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2025\/02\/image.png\" alt=\"\" class=\"wp-image-2799\" srcset=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2025\/02\/image.png 328w, https:\/\/lab52.io\/blog\/wp-content\/uploads\/2025\/02\/image-236x300.png 236w\" sizes=\"(max-width: 328px) 100vw, 328px\" \/><\/figure><\/div>\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The main units of the Russian GRU engaged in cyberspace operations have been discussed in this blog: from our old posts (from 2018) about unit 26165 and 74455, to the recent rise of unit 29155. All these units have something in common, in addition to their cyberspace capabilities: they have been assigned an APT group [&hellip;]<\/p>\n","protected":false},"author":17,"featured_media":2799,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[1],"tags":[],"class_list":{"0":"post-2798","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-uncategorised","8":"entry"},"featured_image_src":"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2025\/02\/image-328x400.png","featured_image_src_square":"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2025\/02\/image.png","author_info":{"display_name":"BigBoss","author_link":"https:\/\/lab52.io\/blog\/author\/bigboss\/"},"_links":{"self":[{"href":"https:\/\/lab52.io\/blog\/wp-json\/wp\/v2\/posts\/2798"}],"collection":[{"href":"https:\/\/lab52.io\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lab52.io\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lab52.io\/blog\/wp-json\/wp\/v2\/users\/17"}],"replies":[{"embeddable":true,"href":"https:\/\/lab52.io\/blog\/wp-json\/wp\/v2\/comments?post=2798"}],"version-history":[{"count":3,"href":"https:\/\/lab52.io\/blog\/wp-json\/wp\/v2\/posts\/2798\/revisions"}],"predecessor-version":[{"id":2804,"href":"https:\/\/lab52.io\/blog\/wp-json\/wp\/v2\/posts\/2798\/revisions\/2804"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/lab52.io\/blog\/wp-json\/wp\/v2\/media\/2799"}],"wp:attachment":[{"href":"https:\/\/lab52.io\/blog\/wp-json\/wp\/v2\/media?parent=2798"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lab52.io\/blog\/wp-json\/wp\/v2\/categories?post=2798"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lab52.io\/blog\/wp-json\/wp\/v2\/tags?post=2798"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}