Ghostwriter in the Shell: Expanding on Mandiant’s Attribution of UNC1151 to Belarus

Ghostwriter in the Shell: Expanding on Mandiant’s Attribution of UNC1151 to Belarus

insikt-logo-blog.png
Editor’s Note: The following post is an excerpt of a full report. To read the entire analysis, click here to download the report as a PDF.

This research expands on Mandiant’s public attribution of UNC1151 and Ghostwriter activity to entities in Belarus and describes Russian military organizational influence in Minsk, substantiating a likely nexus to Russian interests. The time frame for our research spans between March 2017 through the present and employs data from the Recorded Future Platform with open source enrichment. It is intended to provide a foundation for understanding the relationship between the threat actor(s) and the broader influences and drivers for activity, as well as augment existing cybersecurity industry reporting and address established knowledge gaps in the understanding of UNC1151 and Ghostwriter activity. This report will be of interest to cybersecurity professionals who track advanced persistent threat actors as well as those seeking greater information on UNC1151 and Ghostwriter.

Executive Summary

On November 16, 2021, Mandiant analysts presented their recent research findings on activity conducted by the cyber threat actor they have designated as UNC1151 and provided insights into the joint cyber and information operations-enabled campaign designated Ghostwriter. The Mandiant team assessed with high confidence that the Belarusian government was responsible for UNC1151 activity that primarily targets European entities and assessed with moderate confidence that the same entity or entities were largely behind the Ghostwriter information operations activity. Nevertheless, Mandiant research did not rule out the possibility of potential Russian government, or other international, involvement in the campaign.

Thus far, there has been a lack of technical evidence indicating Russian involvement, but this is very likely an intended component of the threat activity. We have found many overlaps in tactics, techniques, and procedures (TTPs) used by UNC1151 and Ghostwriter activity and Russian threat activity groups. Additionally, we note that false flags are prevalent among Russian military advanced persistent threat groups, almost certainly due to their training in the Russian military discipline of maskirovka, or deception. Such activity enables Russian military aligned advanced persistent threat (APT) groups to plan and conduct activity in a way that enables plausible deniability. We also emphasize the widespread presence of the Russian military in Belarus, as well as evidence of other Russian high-level influence and training, which all suggest likely Russian involvement and influence in Belarus.

Key Judgments

Editor’s Note: This post was an excerpt of a full report. To read the entire analysis, click here to download the report as a PDF.