Threat Actor Characterization
Gamaredon Group
ID: a79eedbea3cb8cfa8731d28ba87430b385281| ACTINIUM | Aqua Blizzard | Ar******** | DE****** |
| Hi****** | IR********* | Pr************ | Sh******* |
| UA****** | — | — | — |
Actor Network Graph
Open Network GraphMITRE ATT&CK®
Gamaredon Group (a.k.a. Armageddon/Primitive Bear/ACTINIUM/Shuckworm/UAC-0010) — Russia-nexus actor focused on Ukraine since 2013, using high-volume phishing, VBA/VBS/PowerShell chains, rapid C2 rotation (fast-flux), and automated collection/exfiltration.
| Technique | Technique name | Tactics | Evidence |
|---|---|---|---|
| T1566 | Phishing | TA0001 |
|
| T1059.001 | PowerShell | TA0002 |
|
| T1059.005 | Visual Basic | TA0002 |
|
| T1547.001 | Registry Run Keys / Startup Folder | TA0003 TA0004 |
|
| T1568.001 | Fast Flux DNS | TA0011 | |
| T1119 | Automated Collection | TA0009 |
|
| T1041 | Exfiltration Over C2 Channel | TA0010 |
|
| T1491.001 | Internal Defacement | TA0040 |
|
CLASSIFICATION: Unclassified / Open Source
Executive Summary
Gamaredon Group (a.k.a. Armageddon, Primitive Bear, ACTINIUM, Shuckworm, IRON TILDEN, DEV-0157/Aqua Blizzard, UAC-0010/Hive0051) is a Russia-nexus espionage actor focused overwhelmingly on Ukrainian government, military, law-enforcement, judiciary, NGO and civil-society targets since at least 2013. Tradecraft centers on spearphishing, document/template macro abuse (VBA/VBS), rapid C2/domain rotation (incl. fast-flux), and automated collection/exfiltration rather than stealthy long-term intrusion. In Nov 2021, Ukraine publicly attributed the group to the FSB (Center 18); activity has remained intense through the war, with 2024–2025 research detailing evolved “Gamma” malware, DNS fluxing, and continued macro/PowerShell playbooks. Capability: medium, tempo/volume: very high. Confidence: high (multi-source).
Assessed to be FSB-aligned; MITRE notes Ukraine’s public attribution to FSB Center 18. Vendors track overlapping labels due to analytic schema differences (e.g., ACTINIUM/Aqua Blizzard by Microsoft; UAC-0010/Hive0051 by CERT-UA/IBM).