A long-running cyber-espionage campaign called BadPilot has been detected, carried out by the Russian-linked APT group Seashell Blizzard (also known as APT44).
Seashell Blizzard has been active since at least 2009 and primarily targets critical sectors in Ukraine before expanding globally.
The campaign utilizes stealthy initial infiltration and advanced detection evasion techniques to maintain access and carry out cyber espionage.
To mitigate the risks posed by Seashell Blizzard, security teams are advised to consistently evaluate their defenses and utilize advanced threat detection tools.