
In a recent development, Microsoft has identified a new hacking group known as Cadet Blizzard, which has been linked to Russia’s military intelligence agency. The group has been involved in cyberattacks targeting organisations across Europe, Latin America, and Central Asia. This blog post provides an overview of Cadet Blizzard’s activities and their significance in the Russian cyber threat landscape.
Cadet Blizzard has emerged as a novel actor affiliated with Russia’s Main Directorate of the General Staff of the Armed Forces (GRU). First observed in 2020, Cadet Blizzard prioritises targeting government services, law enforcement, non-profit/non-governmental organisations, IT service providers/consulting, and emergency services in Ukraine
Unlike established GRU-affiliated groups such as APT28 (Fancy Bear, Sofacy, Strontium, Sednit, SIG40, Group 74, PawnStorm, Snakemackerel, TG-4127, Tsar Team, Blue Athena, IRON TWILIGHT, Swallowtail, Threat Group-4127, Forest Blizzard) and Sandworm (Electrum, Telebots, BlackEnergy, Quedagh, Voodoo Bear, CTG-7263, Hades, OlympicDestroyer, IRIDIUM, TEMP.Noble, IRON VIKING, Seashell Blizzard), Cadet Blizzard operates independently, focusing on destructive cyber operations to support military objectives in Ukraine. Their actions aim to deliver impact, even at the expense of network operations and the exposure of sensitive information through targeted hack-and-leak operations.
Cadet Blizzard’s operations are centred around Ukraine but have expanded to target European and Latin American entities, seeking tactical and strategic-level insights into Western operations and policies related to the conflict. Cadet Blizzard operates throughout the week, specifically targeting off-business hours of their primary targets to reduce the likelihood of detection.
Microsoft has linked Cadet Blizzard to the WhisperGate data-wiping attacks on Ukrainian government organisations preceding the Russian invasion in February 2022. These cyber offensives coincided with the deployment of Russian tanks and troops along the Ukrainian borders.
WhisperGate disguised itself as ransomware but instead wiped infected devices, resembling the notorious NotPetya wiper that targeted Ukrainian businesses in 2017. The group was also involved in defacing Ukrainian websites and conducting hack-and-leak operations promoted through the ‘Free Civilian’ Telegram channel.
Since February 2023, the GRU hacking group behind Cadet Blizzard has intensified attacks on Ukrainian government organisations and IT providers. Microsoft has connected these incidents to breaches reported by Ukraine’s Computer Emergency Response Team (CERT-UA), uncovering evidence of persistent threats posed by Russian state hackers.
Cadet Blizzard employs a range of tools, tactics, and procedures to achieve their objectives. They frequently initiates intrusions by targeting vulnerable infrastructure via Exploit Public-Facing Application (T1190). Rather than relying solely on phishing, the group actively scans for and exploits vulnerabilities in internet-exposed services to establish an initial foothold. To maintain presence and prepare for further lateral movement, they have been observed deploying Malware (T1588.001, T1587.001) and legitimate utilities disguised for malicious use (T1588.002).
Once inside the network, a primary objective is privilege escalation and credential harvesting. The group specifically targets the Security Account Manager (T1003.002). By accessing the SAM database, typically found on local Windows systems, they attempt to dump password hashes to compromise local administrator accounts. This activity often precedes lateral movement and is a critical choke point for detection.
The group’s intelligence-gathering capabilities are focused on two main areas. First, they execute Data from Local System (T1005), searching compromised endpoints for sensitive files and directories. Second, they employ Email Collection (T1114), targeting mail repositories to extract sensitive communications. This is often facilitated by tools such as Rclone, a command-line program used to manage files on cloud storage, which the group leverages for data exfiltration.
Consistent with their mandate to disrupt and intimidate, Cadet Blizzard continues to utilise External Defacement (T1491.002). This technique involves modifying public-facing websites or messaging systems to broadcast propaganda or signal a breach, often serving as a distraction from concurrent destructive activities involving the WhisperGate wiper.
Microsoft notes that Cadet Blizzard’s attacks have a relatively lower success rate compared to other GRU-affiliated groups such as APT28 and Sandworm. While Cadet Blizzard experienced a decline in activity after June 2022, the group resurfaced in early 2023 and has achieved occasional success in their recent cyber operations. However, they have not matched the impact of their GRU counterparts’ attacks.
Cadet Blizzard’s activities, although not as successful or mature as other GRU-affiliated threat actors, demand attention due to their focus on delivering impact and their potential to gain strategic-level insights into Western operations and policies related to the conflict.
To effectively counter Cadet Blizzard, organisations must move beyond generic security hygiene and implement controls that directly disrupt the group’s specific Tactics, Techniques, and Procedures (TTPs). This is known as Threat-Informed Defence (TID).
Given Cadet Blizzard’s reliance on Email Collection (T1114), organisations should prioritise the auditing of email environments. Specifically, security teams should implement Audit (M1047) mechanisms to regularly review auto-forwarding rules. In Exchange environments, administrators can utilise the Get-InboxRule cmdlet to discover and remove potentially malicious forwarding rules that the group may use to siphon data.
Furthermore, to reduce the impact if mail is exported/intercepted/forwarded, organisations should Encrypt Sensitive Information (M1041). Implementing public key cryptography ensures that even if an adversary accesses email stores, they cannot read the content without the private certificate and encryption key. This should be paired with Multi-factor Authentication (M1032) on all public-facing webmail servers to minimise the value of compromised usernames and passwords.
Cadet Blizzard frequently gains entry via Exploit Public-Facing Application (T1190). To mitigate this, Application Isolation and Sandboxing (M1048) is critical; this limits what system features and processes an exploited application can access, containing the breach. Additionally, deploying Web Application Firewalls (WAFs) under Exploit Protection (M1050) can limit exposure by preventing exploit traffic from ever reaching the application.
Network defenders should also Filter Network Traffic (M1037) by restricting outbound connections from public-facing servers. While this may not prevent the initial exploit, it severely hampers the attacker’s ability to establish command and control (C2) or verify their success post-compromise.
To limit the downstream value of credential access stemming from Security Account Manager (T1003.002) activity, organisations should harden authentication and account design through Operating System Configuration (M1028) and Privileged Account Management (M1026). Specifically, security teams should consider disabling or restricting NTLM authentication wherever feasible.
While this does not inherently stop an attacker from attempting to access the SAM database, it reduces the usefulness of harvested NTLM-based credentials and disrupts common follow-on abuse such as credential replay and lateral movement. This should be paired with strict privileged account controls, enforce least privilege for service accounts, minimise local administrator membership, and implement strong local administrator password hygiene (for example, centrally managed unique local admin passwords) so that even if credentials are exposed, the attacker’s inherited permissions and ability to move are constrained.
To reduce the impact of compromised email accounts being used to trigger high-risk actions, organisations should implement an Out-of-Band Communications Channel (M1060). Security teams should require secure out-of-band verification for critical requests initiated via email, such as password resets, financial transactions, or access approvals, so that an attacker who has gained mailbox access cannot successfully authenticate the request through email alone.
For highly sensitive matters, staff should shift the conversation to a separate trusted channel (for example, a known-good phone callback procedure, a secure internal ticketing portal, or an approved secure messaging platform) rather than relying solely on email.
Finally, Data Loss Prevention (M1057) tools should be tuned to detect and restrict access to sensitive unencrypted data residing on local systems, directly countering the group’s Data from Local System (T1005) collection techniques.
Tool-Specific Coverage
Cadet Blizzard has also been observed using specific tooling and malware, including Rclone (S1040) and WhisperGate (S0689), and defenders should ensure their security stack explicitly recognises and monitors for these artifacts. Security teams should validate that AV/EDR signatures and detection content cover these families/tools, update SIEM detection rules to look for them in the environment, and monitor network telemetry for signs of their use.
Rclone
Because Rclone is a legitimate command-line utility for syncing data to cloud storage services, its presence in production environments can enable fast, low-friction data movement and exfiltration.
Defenders should treat Rclone as high-risk dual-use tooling and restrict or tightly govern its execution on servers and user endpoints that do not have an explicit business requirement for it. In parallel, defenders should apply Filter Network Traffic (M1037) controls to constrain outbound access to unsanctioned cloud storage destinations, reducing the attacker’s ability to transfer collected data off-network even if the tool is executed.
WhisperGate
A multi-stage wiper, WhisperGate is designed to appear like ransomware. Since destructive malware is an impact event rather than simple collection, organisations should ensure they can rapidly contain suspected WhisperGate execution and recover safely. This includes ensuring endpoint security tooling can detect and block WhisperGate, and validating that backups and recovery procedures are resilient to destructive activity (e.g., offline/immutable backups and tested restoration workflows).
To effectively identify Cadet Blizzard’s activity, Security Operations Centers (SOCs) must move beyond general alerts and tune their SIEM, EDR, and XDR platforms to detect specific, high-fidelity artifacts. The following detection logic is mapped directly to the group’s observed operational behaviours.
Endpoint and File Integrity Monitoring (FIM)
Defenders should implement strict monitoring for abnormal file access, a primary indicator of Data from Local System (T1005).
Process and API Telemetry
Cadet Blizzard’s reconnaissance often generates distinct process patterns that can be caught before exfiltration occurs.
Network Traffic Analysis
Network artifacts provide the strongest signal for Email Collection (T1114) and C2 activity.
Identity and Access Monitoring
Credential abuse is a core facilitator of Cadet Blizzard’s lateral movement.
Web and Application Defence
To counter External Defacement (T1491.002), detection must extend to public-facing assets.
Rclone
WhisperGate
Don’t just read about Cadet Blizzard, operationalise this intelligence today.
Arachne Digital helps organisations move from reactive patching to proactive Threat-Informed Defence:
Start building a smarter defence today. Contact Arachne Digital to get started.
The evolution of Cadet Blizzard marks a critical shift in the Russian cyber threat landscape. Merely staying alert is no longer sufficient. To truly counter Cadet Blizzard, organisations must adopt a threat-informed defence strategy that maps directly to Cadet Blizzard’s specific behaviours. This means moving past generic hygiene and implementing targeted controls, such as auditing email forwarding rules to stop Cadet Blizzard’s collection efforts, restricting NTLM to limit their credential theft, and aggressively monitoring for the specific file and network artifacts Cadet Blizzard leaves behind.
By understanding how Cadet Blizzard operates, down to the specific API calls and file extensions they target, defenders can turn the tables. Implementing these precise, intelligence-driven mitigations is the only way to effectively neutralise the risk posed by Cadet Blizzard and safeguard regional security against this evolving adversary.

“Arachne Digital’s team works closely with us in integrating our tool, Speculo, with their data. Speculo is designed to help organisations get a full picture of their cyber risk with reliable analytics and a streamlined risk assessment process. The integration of Arachne Digital’s threat intelligence into Speculo provides evidence-based insights into cyber risks, making the tool more relevant to our customers. Arachne facilitated multiple face-to-face meetings and video calls, provided technical resources, comprehensive documentation, and example reports. This collaboration ensured that we could seamlessly integrate and utilize their data, significantly enriching the value we deliver to our clients.
Arachne Digital’s commitment to excellence and their proactive approach in supporting our needs have made them an indispensable partner. We highly recommend their services to any organisation looking to strengthen their threat intelligence capabilities.”
Arachne Digital is proud to partner with the DISARM Foundation as the inaugural member of their Partner Programme, launched at the beginning of 2024.
This partnership is crucial in supporting the DISARM Foundation’s mission to maintain and enhance the DISARM Framework, ensuring it remains a free and continuously updated resource in the fight against disinformation.
Through our collaboration, Arachne Digital provides valuable feedback, promotes the integration of the framework into our operations, and encourages wider adoption within the defender community. This partnership highlights our commitment to combating evolving threats and fostering a secure digital environment.