*NEW REPORT*: Today our Information Operations analysis, Cyber Espionage, and Mandiant Research teams released a new report on the #Ghostwriter influence campaign. We highlight two important updates in our understanding of this activity: fireeye.com/blog/threat-re…
First, we note the expansion of Ghostwriter targeting and TTPs, detailing a number of incidents in which the legitimate social media accounts of Polish politicians were compromised and used to publish fabrications seemingly intended to undermine domestic Polish politics.
This domestic Polish focus, primarily targeting members of parties in the ruling United Right political coalition, is a notable expansion of focus beyond the typical anti-NATO narratives - which we still also continue to see - that we documented in our original 2020 public report
Second, we now assess with high confidence that UNC1151, a suspected state-sponsored cyber espionage actor that engages in credential harvesting and malware campaigns, conducts at least some components of the Ghostwriter influence activity.
However, current intelligence gaps pertaining to some aspects of Ghostwriter, notably website compromises and the operation of false personas we have previously documented, mean we cannot conclusively attribute all aspects of the Ghostwriter campaign to UNC1151 at this time.
We do not associate UNC1151 with any previously tracked threat groups, and in the report provide detailed analysis of the group's credential harvesting and malware activity, including a very detailed tech annex with indicators (appendix 3)
What might fly a little under the radar, but that I think is particularly valuable, is appendix 1 of the report, which documents every incident we have investigated and assess to have been part of the Ghostwriter campaign. We hope this can be a useful repository of GW cases.
Lastly, thank you to the amazing Mandiant Intel team for all their fantastic investigative work over the past year that made this report possible. @RiddellSam , @aldenwahlstrom, David Mainor, @gabby_roncone, @bread08, Lindsay Smith, and the Mandiant Research team!
• • •
Missing some Tweet in this thread? You can try to
force a refresh