KAMACITE
Spearphishing, exploiting SOHO routers, and leveraging custom capabilities to enable ELECTRUM operations.
While the group has evolved over time, many aspects of its operations and tradecraft have remained remarkably similar over the past six years as of this writing. Although KAMACITE has not directly caused an ICS disruptive event according to Dragos analysis, the group is responsible for enabling other entities – such as ELECTRUM – to be in a position to deliver ICS-specific attacks.
Date: Since 2014
- Overlap with SANDWORM activity
- Phishing & credential replay for initial access
- Custom malware development & deployment; also known to modify 3rd party criminal malware
- Ukraine, Europe, US
- Primary focus on compromised infrastructure in Europe
- Spoofs legitimate technology & social media services
- Operations linked to five ICS targeting events, proven operations leading to disruption, facilitated the 2015 and 2016 Ukraine power events