
A Hacker Group Within Russia's Notorious Sandworm Unit Is Breaching Western Networks
Feb 12, 2025 12:00 PM A team Microsoft calls BadPilot is acting as Sandworm's 'initial access operation,' the company says. And over the last year it's trained its sights on the US, the UK, Canada, and Australia. Photograph:Over the last decade, the Kremlin's most aggressive cyberwar unit, known as Sandworm, has focused its hacking campaigns on tormenting Ukraine, even more so since Russian president Vladimir Putin's full-scale invasion of Russia's neighbor. Now Microsoft is warning that a team within that notorious hacking group has shifted its targeting, indiscriminately working to breach networks worldwide—and, in the last year, has seemed to show a particular interest in networks in English-speaking Western countries.
On Wednesday, Microsoft's threat intelligence team published new research into a group within Sandworm that the company's analysts are calling BadPilot. Microsoft describes the team as an 'initial access operation' focused on breaching and gaining a foothold in victim networks before handing off that access to other hackers within Sandworm's larger organization, which security researchers have for years identified as a unit of Russia's GRU military intelligence agency. After BadPilot's initial breaches, other Sandworm hackers have used its intrusions to move within victim networks and carry out effects such as stealing information or launching cyberattacks, Microsoft says.
Microsoft describes BadPilot as initiating a high volume of intrusion attempts, casting a wide net and then sorting through the results to focus on particular victims. Over the last three years, the company says, the geography of the group's targeting has evolved: In 2022, it set its sights almost entirely on Ukraine, then broadened its hacking in 2023 to networks worldwide, and then shifted again in 2024 to home in on victims in the US, the UK, Canada and Australia.
'We see them spraying out their attempts at initial access, seeing what comes back, and then focusing on the targets they like,' says Sherrod DeGrippo, Microsoft's director of threat intelligence strategy. 'They're picking and choosing what makes sense to focus on. And they are focusing on those Western countries.'
Microsoft didn't name any specific victims of BadPilot's intrusions, but broadly stated that the hacker group's targets have included 'energy, oil and gas, telecommunications, shipping, arms manufacturing,' and 'international governments.' On at least three occasions, Microsoft says, its operations have led to data-destroying cyberattacks carried out by Sandworm against Ukrainian targets.
As for the more recent focus on Western networks, Microsoft's DeGrippo hints that the group's interests have likely been more related to politics. 'Global elections are probably a reason for that,' DeGrippo says. 'That changing political landscape, I think, is a motivator to change tactics and to change targets.'
Over the more than three years that Microsoft has tracked BadPilot, the group has sought to gain access to victim networks using known but unpatched vulnerabilities in internet-facing software, exploiting hackable flaws in Microsoft Exchange and Outlook, as well as applications from OpenFire, JetBrains, and Zimbra. In its targeting of Western networks over the last year in particular, Microsoft warns that BadPilot has specifically exploited a vulnerability in the remote access tool Connectwise ScreenConnect and Fortinet FortiClient EMS, another application for centrally managing Fortinet's security software on PCs.
After exploiting those vulnerabilities, Microsoft found that BadPilot typically installs software that gives it persistent access to a victim machine, often with legitimate remote access tools like Atera Agent or Splashtop Remote Services. In some cases, in a more unique twist, it also sets up a victim's computer to run as so-called onion service on the Tor anonymity network, essentially turning it into a server that communicates via Tor's collection of proxy machines to hide its communications.
Another, separate report Tuesday from the cybersecurity firm EclecticIQ pointed to an entirely distinct hacking campaign that firm also ties to Sandworm. Since late 2023, EclecticIQ found the hacker group has used a malware-infected Windows piracy tool, distributed via Bittorrent, to breach Ukrainian government networks. In those cases, EclecticIQ found, the hackers have installed a remote access tool called Dark Crystal RAT to carry out cyberespionage.
Any sign of Sandworm, which Microsoft refers to by the name Seashell Blizzard, raises alarms in part because the group has a history of hacking operations that go far beyond mere spying. Over the last decade, the group has caused at least three blackouts by targeting electric utilities in Ukraine—still the only such hacker-induced blackouts in history. The group also released the NotPetya malware that spread worldwide and did at least $10 billion in damage, and it used wiper malware to destroy countless networks in more targeted attacks across Ukraine both before and after the 2022 invasion.
Microsoft has so far found no evidence that, in BadPilot's targeting of Western networks specifically, Sandworm has shown any intention to carry out anything other than espionage. 'This seems very early in terms of initial resource gathering, trying to get this much persistent access,' says Microsoft's DeGrippo. 'Then we would have to wait to see what they do with it.'
But she notes that BadPilot is nonetheless tied to a larger group that has a history of highly disruptive cyberattacks. 'Therefore," says DeGrippo, "the potential actions that they could take next is of deep concern.'
Hashtags

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles

Associated Press
28 minutes ago
- Associated Press
FIELDBOSS Wins the 2025 Business Impact of the Year Award from Resco for Excellence in Field Service Software
FIELDBOSS, the leading field service management software platform for HVAC and elevator contractors, is proud to announce it has been awarded the 2025 Business Impact of the Year Award from Resco. Aventura, Florida, United States, June 12, 2025 -- AVENTURA, FL – FIELDBOSS, the award-winning field service management software platform for HVAC and elevator contractors, is proud to announce it has been given the 2025 Business Impact of the Year Award from Resco. The honour recognizes FIELDBOSS for delivering the most impactful vertical solution and generating the highest revenue using Resco technology at its core. Presented at 2025 in Valencia, Spain, this marks the fourth Resco award for FIELDBOSS and underscores the company's commitment to building vertical-specific software that solves real field service problems. 'Our mobile app isn't just a feature – it's a mission-critical tool for contractors in the field,' said Jonathan Taub, President of FIELDBOSS. 'Winning Business Impact of the Year is especially meaningful because it acknowledges the tangible outcomes our customers experience every day—fewer truck rolls, faster inspections, better service. It's a reflection of the hard work, shared passion, and close collaboration between the FIELDBOSS and Resco teams.' The Resco mobile platform powers every FIELDBOSS implementation. With over 95% of HVAC and elevator customers relying on the mobile app daily, FIELDBOSS continues to push the boundaries of what's possible in mobile field service automation. In 2024 alone, FIELDBOSS customers completed over 3.5 million field reports through the Resco-powered app – an all-time high. Customer sentiment remains strong, with satisfaction scores for the FIELDBOSS mobile experience averaging 4.7 out of 5 across post-implementation surveys. A key driver of this success has been the ongoing innovation behind the FIELDBOSS mobile app. In its latest Version 6 release, FIELDBOSS delivered major updates to inspection modules, data capture, and offline capabilities—empowering technicians to work more efficiently, even in remote or low-connectivity environments. Corey Barss, Director of Consulting at FIELDBOSS, added: 'Our commitment to field teams goes beyond just building software – we're constantly asking how we can make work easier, faster, and more accessible, no matter where the job takes them. Version 6 was a leap forward in mobile functionality, and we're not slowing down. We stay tightly aligned with Microsoft's Dynamics 365 roadmap, including upcoming AI capabilities, to ensure that our customers always have the latest, smartest tools in their hands.' FIELDBOSS has long embraced the role of early adopter and trusted advisor within the Resco ecosystem. The product team regularly tests and implements the newest Resco features before public release, providing field-tested feedback that helps guide platform innovation. This collaborative spirit has made FIELDBOSS a model partner for Resco's vision of mobile-first field service. 'Receiving this award at Masia Aldamar, surrounded by craftsmanship and tradition, was especially moving,' added Taub. 'Winemakers pour their hearts into their work, and so do we. This is the result of many hands, much effort, and a relentless focus on quality.' This is FIELDBOSS' fourth Resco award, having previously earned Breakthrough Partner of the Year (2020), Business Impact of the Year (2021), and Partner of the Year (2023). The 2025 Business Impact win affirms the company's long-term growth, deep field service expertise, and sustained product excellence. About FIELDBOSS FIELDBOSS is purpose-built field service management software for HVAC and elevator contractors. It integrates seamlessly with Microsoft Dynamics 365 and leverages Resco mobile technology to help field teams operate more efficiently, reduce operational risk, and better serve customers. With decades of industry expertise and a relentless focus on field operations, FIELDBOSS empowers contractors to run smarter, more profitable businesses. About Resco Resco is a global leader in cross-platform enterprise mobility solutions. Founded in 1999, Resco serves over 800 enterprise customers and more than 160,000 licensed users worldwide. Its mobile platform enables field teams to collect data, streamline workflows, and digitize business operations—anytime, anywhere. Contact Info: Name: Corry Greenbaum Email: Send Email Organization: FIELDBOSS Address: 2875 NE 191st St. STE 500 Aventura, FL 33180 Phone: 647-905-6888 Website: Release ID: 89162167 In case of identifying any problems, concerns, or inaccuracies in the content shared in this press release, or if a press release needs to be taken down, we urge you to notify us immediately by contacting [email protected] (it is important to note that this email is the authorized channel for such matters, sending multiple emails to multiple addresses does not necessarily help expedite your request). Our dedicated team will be readily accessible to address your concerns and take swift action within 8 hours to rectify any issues identified or assist with the removal process. We are committed to delivering high-quality content and ensuring accuracy for our valued readers.
Yahoo
33 minutes ago
- Yahoo
One ChatGPT query uses same energy as a second of baking, OpenAI says
A single query to the AI software ChatGPT consumes as much electricity as roughly one second of baking something in an oven, according to the developer OpenAI. Meanwhile the water consumption from each query - owing to data centres needing to be cooled - comes down to about one-fifteenth of a teaspoon, OpenAI chief executive Sam Altman wrote in a blog post. Experts have for years been warnings about the massively escalating energy demands from the widespread use of AI services. While individual queries may require less energy due to efficiency gains in chip and server technology, the sheer volume of usage continues to drive a sharp increase in energy demand for AI data centres. Companies such as Microsoft, Google and Amazon are planning to rely on nuclear energy in the US to help meet this demand without proportionally increasing emissions of climate-damaging carbon dioxide. The need to cool data centres has also raised concerns about water consumption. In recent years, several studies have attempted to calculate the environmental impact of increased AI usage, but researchers must rely on numerous assumptions. Altman shared OpenAI's energy and water figures in a blog post in which he painted a generally positive picture of the future of AI. He acknowledged that there would be significant disruptions, such as the elimination of entire job categories. "But on the other hand the world will be getting so much richer so quickly that we'll be able to seriously entertain new policy ideas we never could before." In recent years, the idea of a universal basic income, funded by productivity gains, has been discussed in connection with AI. According to the OpenAI chief executive, an average ChatGPT query consumes approximately 0.34 watt-hours of electricity ("about what an oven would use in a little over one second, or a high-efficiency lightbulb would use in a couple of minutes"). He quantified the water consumption at 0.000085 gallons (0.00032176 litres). Altman did not provide further details about the basis for these calculations.
Yahoo
33 minutes ago
- Yahoo
Russian fibre-optic drones no threat to Sumy yet, says Ukrainska Pravda
Russian first-person view drones using fibre-optic communication do not currently pose a significant threat to Sumy's residents. Source: Ukrainska Pravda article: Are you advancing on Tyotkino? We keep making the same mistake: What's happening in Sumy as Russian forces push forward (English translation coming soon) Details: The operational range of these drones is approximately 15 km, while the distance from the nearest Russian positions to Sumy is at least 18-20 km. Moreover, drone launch points are typically set 5 km away from the contact line. Quote from a chief sergeant from a Ukrainian UAV unit operating in Sumy Oblast: "Everyone measures from the grey zone or the edge of the occupied area and says it's 20-25 km to Sumy. But the launch point is at least 5 km from the contact line, so if the Russians are 20-25 km from Sumy, the drone's range needs to cover 35 km." Details: He notes that the effectiveness of these drones decreases significantly with distance: the farther they fly, the less they can carry. At such ranges, a drone might only carry an F-1 grenade, insufficient for causing significant damage. Thus, using such drones to attack a rear city like Sumy is currently impractical. "There's no point in wasting a fibre-optic drone just to scare a civilian in the rear," the sergeant concludes. Russian Telegram channels have claimed that Russia is developing fibre-optic FPV drones with a range of up to 50 kilometres. If this technology is implemented, it could alter the situation around Sumy. However, Ukrainska Pravda has found that such development would likely take several months. Background: In January, analysts at the Institute for the Study of War reported that Russia is increasing its use of drones controlled via fibre optic cable. These drones allow Russian troops to effectively circumvent Ukraine's electronic warfare capabilities. Support Ukrainska Pravda on Patreon!