We thought it was time to return to highlighting some of the tech companies with ties to the Russian intelligence services. Today we introduce you to Special Technological Centre Ltd. #STC#СТЦ
In late 2016 STC was sanctioned by the U.S. in the amendment to Executive Order 13964 issued by President Obama.
STC was named as one of three companies that provided material support to the #GRU interference of the Presidential election in 2016 and assisting them in conducting signals intelligence operations.
In 2017 the U.S. designated STC as part of Russia's intelligence complex and prohibited any significant transactions with the company.
STC is located in St. Petersburg and, according to its LinkedIn profile, has between 1000 and 5000 employees. The company works on UAV's, radar systems and RF measurement/monitoring equipment. According to investigations STC manufactures the Orlan-10 UAV used against Ukraine.
In 2019, it was identified by security company Lookout as responsible for mobile phone surveillance software, named Monokle, hidden in fake apps, which had been in circulation since 2016. lookout.com/documents/thre…
Lookout assessed some of the potential targets to be individuals interested in Islam and the Ahrar al-Sham militant group in Syria, individuals associated with the Caucasus region and users of the messaging app UzbekChat.
It would seem that STC still has ties to the GRU. According to an istories report in conjunction with Reuters and RUSI, STC received more than 3 billion rubles via contracts with the GRU in 2022.
Drovorub-A1 was originally developed for the GRU 85th Main Special Service Center (85th GTsSS, в/ч 26165) and dubbed the 'Swiss Army Knife' for hacking Linux. #APT28#GRU#FANCYBEAR
US agencies warned of the threat posed in a 45-page security alert released in August 2020 and companies such as Schneider Electric offered mitigation to customers in advance of fixes to their operating systems. media.defense.gov/2020/Aug/13/20…
We have become aware of a large #ICS/#SCADA malware project apparently conducted under a state contract on behalf of the Russian General Staff Main Intelligence Directorate (#GRU), Main Centre for Special Technologies (#GTsST), military unit 74455.
This military unit also known as #Sandworm is located at the GRU Ulitsa Kirova facility in the Khimki suburb of Moscow. In the past Sandworm has targeted ICS/SCADA, one of the most renowned being the #INDUSTROYER2 hacking attempt of a Ukrainian electrical substation in April 22.
The ongoing project is to cost more than 100 million rubles across three phases and undertaken by several technical defense contractors.
If the Russian Intelligence Services work with other companies, which ones? According to the US, one company working with the FSB, GRU and SVR is Advanced System Technologies (AST).
According to the US Treasury press release of April 15 21 (home.treasury.gov/news/press-rel…) AST is a "Russian IT security firm whose clients include Russian Ministry of Defense, SVR and FSB. AST provided technical support to cyber operations conducted by the FSB, GRU and SVR."
Some additional background information on the company is available on the TADVISER website, a Russian business knowledge base, including information on the largest 100 IT companies in Russia.