Menu Home

EU, OFSI add 9 to Cyber-Attacks sanctions

Today, as per Council Implementing Regulation (EU) 2020/1125, UK regulators added the following 6 persons:

1. GAO, Qiang
POB: Shandong Province, China Nationality: Chinese Address: Room 1102, Guanfu Mansion, 46 Xinkai Road, Hedong District, Tianjin, China. Other Information: Gender: male. Gao Qiang is involved in “Operation Cloud Hopper”, a series of cyber-attacks. “Operation Cloud Hopper” targeted information systems of multinational companies in six continents, including companies located in the European Union, and gained unauthorised access to commercially sensitive data, resulting in significant economic loss. The actor publicly known as “APT10” (“Advanced Persistent Threat 10”) (a.k.a. “Red Apollo”, “CVNX”, “Stone Panda”, “MenuPass” and “Potassium”) carried out “Operation Cloud Hopper”. Gao Qiang can be linked to APT10, including through his association with APT10 command and control infrastructure. Moreover, Huaying Haitai, an entity designated for providing support to and facilitating “Operation Cloud Hopper”, employed Gao Qiang. He has links with Zhang Shilong, who is also designated in connection with “Operation Cloud Hopper”. Gao Qiang is therefore associated with both Huaying Haitai and Zhang Shilong. Listed on: 31/07/2020 Last Updated: 31/07/2020 Group ID: 13903.
2. MININ, Alexey Valeryevich
DOB: 27/05/1972. POB: Perm Oblast, Russian SFSR (now Russian Federation) Nationality: Russian Passport Details: 120017582. Issued by the Ministry of Foreign Affairs of the Russian Federation. Valid from 17 April 2017 until 17 April 2022 Address: Moscow, Russian Federation. Other Information: Gender: male. Alexey Minin took part in an attempted cyber-attack with a potentially significant effect against the Organisation for the Prohibition of Chemical Weapons (OPCW) in the Netherlands. As a human intelligence support officer of the Main Directorate of the General Staff of the Armed Forces of the Russian Federation (GU/GRU), Alexey Minin was part of a team of four Russian military intelligence officers who attempted to gain unauthorised access to the Wi-Fi network of the OPCW in The Hague, the Netherlands, in April 2018. The attempted cyber-attack was aimed at hacking into the Wi-Fi network of the OPCW, which, if successful, would have compromised the security of the network and the OPCW’s ongoing investigatory work. Listed on: 31/07/2020 Last Updated: 31/07/2020 Group ID: 13905.
3. MORENETS, Aleksei Sergeyvich
DOB: 31/07/1977. POB: Murmanskaya Oblast, Russian SFSR (now Russian Federation) Nationality: Russian Passport Details: 100135556. Issued by the Ministry of Foreign Affairs of the Russian Federation. Valid from 17 April 2017 until 17 April 2022 Address: Moscow, Russian Federation. Other Information: Gender: male. Aleksei Morenets took part in an attempted cyber-attack with a potentially significant effect against the Organisation for the Prohibition of Chemical Weapons (OPCW) in the Netherlands. As a cyber-operator for the Main Directorate of the General Staff of the Armed Forces of the Russian Federation (GU/GRU), Aleksei Morenets was part of a team of four Russian military intelligence officers who attempted to gain unauthorised access to the Wi-Fi network of the OPCW in The Hague, the Netherlands, in April 2018. The attempted cyber-attack was aimed at hacking into the Wi-Fi network of the OPCW, which, if successful, would have compromised the security of the network and the OPCW’s ongoing investigatory work. Listed on: 31/07/2020 Last Updated: 31/07/2020 Group ID: 13906.
4. SEREBRIAKOV, Evgenii Mikhaylovich
DOB: 26/07/1981. POB: Kursk, Russian SFSR (now Russian Federation) Nationality: Russian Passport Details: 100135555. Issued by the Ministry of Foreign Affairs of the Russian Federation. Valid from 17 April 2017 until 17 April 2022 Address: Moscow, Russian Federation. Other Information: Gender: male. Evgenii Serebriakov took part in an attempted cyber-attack with a potentially significant effect against the Organisation for the Prohibition of Chemical Weapons (OPCW) in the Netherlands. As a cyber-operator for the Main Directorate of the General Staff of the Armed Forces of the Russian Federation (GU/GRU), Evgenii Serebriakov was part of a team of four Russian military intelligence officers who attempted to gain unauthorised access to the Wi-Fi network of the OPCW in The Hague, the Netherlands, in April 2018. The attempted cyber-attack was aimed at hacking into the Wi-Fi network of the OPCW, which, if successful, would have compromised the security of the network and the OPCW’s ongoing investigatory work. Listed on: 31/07/2020 Last Updated: 31/07/2020 Group ID: 13907.
5. SOTNIKOV, Oleg Mikhaylovich
DOB: 24/08/1972. POB: Ulyanovsk, Russian SFSR (now Russian Federation) Nationality: Russian Passport Details: 120018866. Issued by the Ministry of Foreign Affairs of the Russian Federation. Valid from 17 April 2017 until 17 April 2022 Address: Moscow, Russian Federation. Other Information: Gender: male. Oleg Sotnikov took part in an attempted cyber-attack with a potentially significant effect against the Organisation for the Prohibition of Chemical Weapons (OPCW), in the Netherlands. As a human intelligence support officer of the Main Directorate of the General Staff of the Armed Forces of the Russian Federation (GU/GRU), Oleg Sotnikov was part of a team of four Russian military intelligence officers who attempted to gain unauthorised access to the Wi-Fi network of the OPCW in The Hague, the Netherlands, in April 2018. The attempted cyber-attack was aimed at hacking into the Wi-Fi network of the OPCW, which, if successful, would have compromised the security of the network and the OPCW’s ongoing investigatory work. Listed on: 31/07/2020 Last Updated: 31/07/2020 Group ID: 13908.
6. ZHANG, Shilong
Nationality: Chinese Address: Hedong, Yuyang Road No 121, Tianjin, China. Other Information: Gender: male. Zhang Shilong is involved in “Operation Cloud Hopper”, a series of cyber‐attacks. “Operation Cloud Hopper” has targeted information systems of multinational companies in six continents, including companies located in the European Union, and gained unauthorised access to commercially sensitive data, resulting in significant economic loss. The actor publicly known as “APT10” (“Advanced Persistent Threat 10”) (a.k.a. “Red Apollo”, “CVNX”, “Stone Panda”, “MenuPass” and “Potassium”) carried out “Operation Cloud Hopper”. Zhang Shilong can be linked to APT10, including through the malware he developed and tested in connection with the cyber-attacks carried out by APT10. Moreover, Huaying Haitai, an entity designated for providing support to and facilitating “Operation Cloud Hopper”, employed Zhang Shilong. He has links with Gao Qiang, who is also designated in connection with “Operation Cloud Hopper”. Zhang Shilong is therefore associated with both Huaying Haitai and Gao Qiang. Listed on: 31/07/2020 Last Updated: 31/07/2020 Group ID: 13904.

and 3 entities:

1. CHOSUN EXPO
a.k.a: (1) Chosen Expo (2) Korea Export Joint Venture Address: DPRK. Other Information: Chosun Expo provided financial, technical or material support for and facilitated a series of cyberattacks, including the cyber-attacks publicly known as “WannaCry” and cyber-attacks against the Polish Financial Supervision Authority and Sony Pictures Entertainment, as well as cyber-theft from the Bangladesh Bank and attempted cyber-theft from the Vietnam Tien Phong Bank. WannaCry” disrupted information systems around the world by targeting information systems with ransomware and blocking ccess to data. It affected information systems of companies in the European Union, including information systems relating to services necessary for the maintenance of essential services and economic activities within Member States. The actor publicly known as “APT38” (“Advanced Persistent Threat 38”) or the “Lazarus Group” carried out “WannaCry”. Chosun Expo can be linked to APT38 / the Lazarus Group, including through the accounts used for the cyber-attacks. Listed on: 31/07/2020 Last Updated: 31/07/2020 Group ID: 13910.
2. MAIN CENTRE FOR SPECIAL TECHNOLOGIES (GTSST) OF THE MAIN DIRECTORATE OF THE GENERAL STAFF OF THE ARMED FORCES OF THE RUSSIAN FEDERATION (GU/GRU) Address: 22 Kirova Street, Moscow, Russian Federation. Other Information: The Main Centre for Special Technologies (GTsST) of the Main Directorate of the General Staff of the Armed Forces of the Russian Federation (GU/GRU), also known by its field post number 74455, is responsible for cyber-attacks, including the cyber-attacks publicly known as “NotPetya” or “EternalPetya” in June 2017 and the cyber-attacks directed at an Ukrainian power grid in the winter of 2015 and 2016. “NotPetya” or “EternalPetya” rendered data inaccessible in a number of companies in the European Union, wider Europe and worldwide, by targeting computers with ransomware and blocking access to data, resulting amongst others in significant economic loss. The cyber-attack on a Ukrainian power grid resulted in parts of it being switched off during winter. The actor publicly known as “Sandworm” (a.k.a. “Sandworm Team”, “BlackEnergy Group”, “Voodoo Bear”, “Quedagh”, “Olympic Destroyer” and “Telebots”), which is also behind the attack on the Ukrainian power grid, carried out “NotPetya” or “EternalPetya”. The Main Centre for Special Technologies of the Main Directorate of the General Staff of the Armed Forces of the Russian Federation has an active role in the cyber‐activities undertaken by Sandworm and can be linked to Sandworm. Listed on: 31/07/2020 Last Updated: 31/07/2020 Group ID: 13911.
3. TIANJIN HUAYING HAITAI SCIENCE AND TECHNOLOGY DEVELOPMENT CO. LTD (HUAYING HAITAI)
a.k.a: Haitai Technology Development Co. Ltd Address: Tianjin, China. Other Information: Huaying Haitai provided financial, technical or material support for and facilitated “Operation Cloud Hopper”, a series of cyber-attacks. “Operation Cloud Hopper” has targeted information systems of multinational companies in six continents, including companies located in the European Union, and gained unauthorised access to commercially sensitive data, resulting in significant economic loss. The actor publicly known as “APT10” (“Advanced Persistent Threat 10”) (a.k.a. “Red Apollo”, “CVNX”, “Stone Panda”, “MenuPass” and “Potassium”) carried out “Operation Cloud Hopper”. Huaying Haitai can be linked to APT10. Moreover, Huaying Haitai employed Gao Qiang and Zhang Shilong, who are both designated in connection with “Operation Cloud Hopper”. Huaying Haitai is therefore associated with Gao Qiang and Zhang Shilong. Listed on: 31/07/2020 Last Updated: 31/07/2020 Group ID: 13909.

to its Cyber-Attacks sanctions program.

Links:

OFSI Notice

Council Implementing Regulation (EU) 2020/1125

Categories: Cyber sanctions EU Updates OFSI Updates Sanctions Lists

eric9to5

1 reply

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

%d bloggers like this: