www.crowdstrike.com
Open in
urlscan Pro
2606:4700::6811:63a
Public Scan
URL:
https://www.crowdstrike.com/blog/who-is-ember-bear/
Submission: On May 23 via manual from JP — Scanned from JP
Submission: On May 23 via manual from JP — Scanned from JP
Form analysis
0 forms found in the DOMText Content
___ * * * * * * BLOG * Featured * CrowdStrike Named a Leader with “Exceptional” MDR Service: 2023 Forrester Wave for MDR May 18, 2023 * How to Complete Your LogScale Observability Strategy with Grafana May 15, 2023 * Hypervisor Jackpotting, Part 3: Lack of Antivirus Support Opens the Door to Adversary Attacks May 15, 2023 * How to Establish Cross-Border Transfer Systems that Help Protect Privacy May 11, 2023 * Recent * CrowdStrike Named a Leader with “Exceptional” MDR Service: 2023 Forrester Wave for MDR May 18, 2023 * How to Complete Your LogScale Observability Strategy with Grafana May 15, 2023 * Hypervisor Jackpotting, Part 3: Lack of Antivirus Support Opens the Door to Adversary Attacks May 15, 2023 * How to Establish Cross-Border Transfer Systems that Help Protect Privacy May 11, 2023 * Videos * Video Highlights the 4 Key Steps to Successful Incident Response Dec 02, 2019 * Video: How CrowdStrike’s Vision Redefined Endpoint Security Sep 20, 2019 * Mac Attacks Along the Kill Chain: Credential Theft [VIDEO] Apr 19, 2019 * Mac Attacks Along the Kill Chain: Part 2 — Privilege Escalation [VIDEO] Apr 12, 2019 * Categories * Endpoint & Cloud Security Endpoint & Cloud Security How to Establish Cross-Border Transfer Systems that Help Protect Privacy 05/11/2023 May 2023 Patch Tuesday: Three Zero-Days and Six Critical Vulnerabilities Identified 05/09/2023 Leveraging the Dark Side: How CrowdStrike Boosts Machine Learning Efficacy Against Adversaries 05/09/2023 CrowdStrike Expands Falcon Data Replicator Capabilities to Boost SOC Performance 05/08/2023 * Engineering & Tech Engineering & Tech CrowdStrike’s Artificial Intelligence Tooling Uses Similarity Search to Analyze Script-Based Malware Attack Techniques 03/23/2023 CrowdStrike’s Free TensorFlow-to-Rust Conversion Tool Enables Data Scientists to Run Machine Learning Models as Pure Safe Code 03/02/2023 Spotlight on the Log-Structured Merge (LSM) Tree: One of the Keys Enabling CrowdStrike to Process Trillions of Events per Day 11/30/2022 Playing Hide-and-Seek with Ransomware, Part 2 10/21/2022 * Executive Viewpoint Executive Viewpoint CrowdStrike Named a Leader with “Exceptional” MDR Service: 2023 Forrester Wave for MDR 05/18/2023 CrowdStrike and Dell: Making Cybersecurity Fast and Frictionless 03/23/2023 Three Times a Leader: CrowdStrike Named a Leader in Gartner® Magic Quadrant™ for Endpoint Protection Platforms 03/02/2023 CrowdStrike 2023 Global Threat Report: Resilient Businesses Fight Relentless Adversaries 02/28/2023 * From The Front Lines From The Front Lines Behind the Curtain: Falcon OverWatch Hunting Leads Explained 04/27/2023 How Falcon OverWatch Investigates Malicious Self-Extracting Archives, Decoy Files and Their Hidden Payloads 03/31/2023 CrowdStrike Discovers First-Ever Dero Cryptojacking Campaign Targeting Kubernetes 03/15/2023 CrowdStrike Falcon OverWatch Insights: 8 LOLBins Every Threat Hunter Should Know 03/07/2023 * Identity Protection Identity Protection Relentless Threat Activity Puts Identities in the Crosshairs 05/01/2023 CrowdStrike Extends Identity Security Innovations to Protect Customers and Stop Breaches 03/20/2023 Attackers Set Sights on Active Directory: Understanding Your Identity Exposure 12/14/2022 9 Ways a CISO Uses CrowdStrike for Identity Threat Protection 12/07/2022 * Observability & Log Management Observability & Log Management Introducing CrowdStream: Simplifying XDR Adoption and Solving Security’s Data Challenge 04/21/2023 Make Compliance a Breeze with Modern Log Management 02/07/2023 10 Questions to Help You Choose the Right Log Management Solution 12/21/2022 What Makes CrowdStrike Falcon LogScale So Fast 11/22/2022 * People & Culture People & Culture VP of Legal Jeanne Miller-Romero on Women’s History Month and Being a Woman in Leadership 03/22/2023 What International Women’s Day Means to Women of CrowdStrike 03/07/2023 What Martin Luther King Jr. Day Means to Leaders of CrowdStrike’s Black Employee Resource Group 01/13/2023 Cybersecurity Awareness Month 2022: It’s About the People 10/28/2022 * Remote Workplace Remote Workplace CrowdStrike Changes Designation of Principal Executive Office to Austin, Texas 12/28/2021 CrowdStrike and EY Join Forces to Boost Organizational Resiliency 05/24/2021 Go Beyond the Perimeter: Frictionless Zero Trust With CrowdStrike and Zscaler 03/29/2021 Flexible Policy Management for Remote Systems 07/08/2020 * Research & Threat Intel Research & Threat Intel Hypervisor Jackpotting, Part 3: Lack of Antivirus Support Opens the Door to Adversary Attacks 05/15/2023 CrowdStrike Falcon Platform Detects and Prevents Active Intrusion Campaign Targeting 3CXDesktopApp Customers 03/29/2023 QakBot eCrime Campaign Leverages Microsoft OneNote Attachments 03/17/2023 How to Mature Your Threat Intelligence Program 03/09/2023 * Tech Center Tech Center How to Complete Your LogScale Observability Strategy with Grafana 05/15/2023 Securing private applications with CrowdStrike Zero Trust Assessment and AWS Verified Access 04/18/2023 How to Manage USB Devices 03/22/2023 How to Speed Investigations with Falcon Forensics 03/10/2023 * Start Free Trial * Endpoint & Cloud Security Endpoint & Cloud Security How to Establish Cross-Border Transfer Systems that Help Protect Privacy 05/11/2023 May 2023 Patch Tuesday: Three Zero-Days and Six Critical Vulnerabilities Identified 05/09/2023 Leveraging the Dark Side: How CrowdStrike Boosts Machine Learning Efficacy Against Adversaries 05/09/2023 CrowdStrike Expands Falcon Data Replicator Capabilities to Boost SOC Performance 05/08/2023 * Engineering & Tech Engineering & Tech CrowdStrike’s Artificial Intelligence Tooling Uses Similarity Search to Analyze Script-Based Malware Attack Techniques 03/23/2023 CrowdStrike’s Free TensorFlow-to-Rust Conversion Tool Enables Data Scientists to Run Machine Learning Models as Pure Safe Code 03/02/2023 Spotlight on the Log-Structured Merge (LSM) Tree: One of the Keys Enabling CrowdStrike to Process Trillions of Events per Day 11/30/2022 Playing Hide-and-Seek with Ransomware, Part 2 10/21/2022 * Executive Viewpoint Executive Viewpoint CrowdStrike Named a Leader with “Exceptional” MDR Service: 2023 Forrester Wave for MDR 05/18/2023 CrowdStrike and Dell: Making Cybersecurity Fast and Frictionless 03/23/2023 Three Times a Leader: CrowdStrike Named a Leader in Gartner® Magic Quadrant™ for Endpoint Protection Platforms 03/02/2023 CrowdStrike 2023 Global Threat Report: Resilient Businesses Fight Relentless Adversaries 02/28/2023 * From The Front Lines From The Front Lines Behind the Curtain: Falcon OverWatch Hunting Leads Explained 04/27/2023 How Falcon OverWatch Investigates Malicious Self-Extracting Archives, Decoy Files and Their Hidden Payloads 03/31/2023 CrowdStrike Discovers First-Ever Dero Cryptojacking Campaign Targeting Kubernetes 03/15/2023 CrowdStrike Falcon OverWatch Insights: 8 LOLBins Every Threat Hunter Should Know 03/07/2023 * Identity Protection Identity Protection Relentless Threat Activity Puts Identities in the Crosshairs 05/01/2023 CrowdStrike Extends Identity Security Innovations to Protect Customers and Stop Breaches 03/20/2023 Attackers Set Sights on Active Directory: Understanding Your Identity Exposure 12/14/2022 9 Ways a CISO Uses CrowdStrike for Identity Threat Protection 12/07/2022 * Observability & Log Management Observability & Log Management Introducing CrowdStream: Simplifying XDR Adoption and Solving Security’s Data Challenge 04/21/2023 Make Compliance a Breeze with Modern Log Management 02/07/2023 10 Questions to Help You Choose the Right Log Management Solution 12/21/2022 What Makes CrowdStrike Falcon LogScale So Fast 11/22/2022 * People & Culture People & Culture VP of Legal Jeanne Miller-Romero on Women’s History Month and Being a Woman in Leadership 03/22/2023 What International Women’s Day Means to Women of CrowdStrike 03/07/2023 What Martin Luther King Jr. Day Means to Leaders of CrowdStrike’s Black Employee Resource Group 01/13/2023 Cybersecurity Awareness Month 2022: It’s About the People 10/28/2022 * Remote Workplace Remote Workplace CrowdStrike Changes Designation of Principal Executive Office to Austin, Texas 12/28/2021 CrowdStrike and EY Join Forces to Boost Organizational Resiliency 05/24/2021 Go Beyond the Perimeter: Frictionless Zero Trust With CrowdStrike and Zscaler 03/29/2021 Flexible Policy Management for Remote Systems 07/08/2020 * Research & Threat Intel Research & Threat Intel Hypervisor Jackpotting, Part 3: Lack of Antivirus Support Opens the Door to Adversary Attacks 05/15/2023 CrowdStrike Falcon Platform Detects and Prevents Active Intrusion Campaign Targeting 3CXDesktopApp Customers 03/29/2023 QakBot eCrime Campaign Leverages Microsoft OneNote Attachments 03/17/2023 How to Mature Your Threat Intelligence Program 03/09/2023 * Tech Center Tech Center How to Complete Your LogScale Observability Strategy with Grafana 05/15/2023 Securing private applications with CrowdStrike Zero Trust Assessment and AWS Verified Access 04/18/2023 How to Manage USB Devices 03/22/2023 How to Speed Investigations with Falcon Forensics 03/10/2023 * Featured * Recent * Videos * Categories * Start Free Trial WHO IS EMBER BEAR? March 30, 2022 CrowdStrike Threat Intel Team Executive Viewpoint Research & Threat Intel 4/4/22 Editor’s note: The hearing described below has been rescheduled for 10 a.m. EST on Tuesday, April 5. On Wednesday, March 30, 2022, Adam Meyers, CrowdStrike Senior Vice President of Intelligence, will testify in front of CHS (House Committee on Homeland Security) on Russian cyber threats to critical infrastructure. Within his testimony, Adam will speak publicly for the first time about a Russia-nexus state-sponsored actor that CrowdStrike Intelligence tracks as EMBER BEAR. EMBER BEAR (aka UAC-0056, Lorec53, Lorec Bear, Bleeding Bear, Saint Bear) is an adversary group that has operated against government and military organizations in eastern Europe since early 2021, likely to collect intelligence from target networks. EMBER BEAR appears primarily motivated to weaponize the access and data obtained during their intrusions to support information operations (IO) aimed at creating public mistrust in targeted institutions and degrading government ability to counter Russian cyber operations. Meet the Adversary: EMBER BEAR CrowdStrike Intelligence attributes destructive activity against Ukrainian networks using the WhisperGate wiper to EMBER BEAR, assessed at moderate confidence. Additionally, CrowdStrike Intelligence assesses with low confidence that data obtained through EMBER BEAR operations are used to support data leak operations conducted by multiple attribution fronts. While other Russia-state nexus adversaries have also been implicated in the dissemination of stolen data for similar motivations — particularly FANCY BEAR and VOODOO BEAR, both operated by Main Directorate of the General Staff of the Armed Forces of the Russian Federation (GRU) — EMBER BEAR does not present known links with previously tracked adversaries. EMBER BEAR is not currently attributed to a specific Russian organization, although the adversary’s target profile, assessed intent, and their technical tactics, techniques and procedures (TTPs) are consistent with other GRU cyber operations. CROWDSTRIKE INTELLIGENCE CONFIDENCE DESCRIPTIONS High Confidence – Judgments are based on high-quality information from multiple sources. High confidence in the quality and quantity of source information supporting a judgment does not imply that that assessment is an absolute certainty or fact. The judgment still has a marginal probability of being inaccurate. Moderate Confidence – Judgments are based on information that is credibly sourced and plausible, but not of sufficient quantity or corroborated sufficiently to warrant a higher level of confidence. This level of confidence is used to express that judgments carry an increased probability of being incorrect until more information is available or corroborated. Low Confidence – Judgments are made where the credibility of the source is uncertain, the information is too fragmented or poorly corroborated enough to make solid analytic inferences, or the reliability of the source is untested. Further information is needed for corroboration of the information or to fill known intelligence gaps. ADDITIONAL RESOURCES * To watch Adam Meyers’ CHS testimony, visit the Committee on Homeland Security website. * Learn how to incorporate intelligence on dangerous threat actors into your security strategy by visiting the CrowdStrike CROWDSTRIKE FALCON® INTELLIGENCE™ product page. * Request a free CrowdStrike Intelligence threat briefing and learn how to stop adversaries targeting your organization. * Learn more about the CrowdStrike Falcon® platform by visiting the product webpage. * Get a full-featured free trial of CrowdStrike Falcon® Prevent™ to see for yourself how true next-gen AV performs against today’s most sophisticated threats. * Tweet * Share RELATED CONTENT CROWDSTRIKE AND DELL: MAKING CYBERSECURITY FAST AND FRICTIONLESS THREE TIMES A LEADER: CROWDSTRIKE NAMED A LEADER IN GARTNER® MAGIC QUADRANT™ FOR ENDPOINT PROTECTION PLATFORMS CROWDSTRIKE 2023 GLOBAL THREAT REPORT: RESILIENT BUSINESSES FIGHT RELENTLESS ADVERSARIES Categories * Endpoint & Cloud Security (373) * Engineering & Tech (71) * Executive Viewpoint (143) * From The Front Lines (186) * Identity Protection (28) * Observability & Log Management (71) * People & Culture (86) * Remote Workplace (20) * Research & Threat Intel (160) * Tech Center (149) CONNECT WITH US FEATURED ARTICLES CrowdStrike Named a Leader with “Exceptional” MDR Service: 2023 Forrester Wave for MDR May 18, 2023 How to Complete Your LogScale Observability Strategy with Grafana May 15, 2023 Hypervisor Jackpotting, Part 3: Lack of Antivirus Support Opens the Door to Adversary Attacks May 15, 2023 How to Establish Cross-Border Transfer Systems that Help Protect Privacy May 11, 2023 SUBSCRIBE Sign up now to receive the latest notifications and updates from CrowdStrike. Sign Up SEE CROWDSTRIKE FALCON® IN ACTION Detect, prevent, and respond to attacks— even malware-free intrusions—at any stage, with next-generation endpoint protection. See Demo Maintaining Security Consistency from Endpoint to Workload and Everywhere in Between Cloudy with a Chance of Unclear Mailbox Sync: CrowdStrike Services Identifies Logging Inconsistencies in Microsoft 365 TRY CROWDSTRIKE FREE FOR 15 DAYS GET STARTED WITH A FREE TRIAL X * * * * * Copyright © 2023 CrowdStrike * Privacy * Request Info * Blog * Contact Us * 1.888.512.8906 X $H2 $hl X COOKIE PREFERENCE CENTER * YOUR PRIVACY * STRICTLY NECESSARY COOKIES * PERFORMANCE COOKIES * FUNCTIONAL COOKIES * TARGETING COOKIES YOUR PRIVACY When you visit any website, it may store or retrieve information on your browser, mostly in the form of cookies. This information might be about you, your preferences or your device and is mostly used to make the site work as you expect it to. The information does not usually directly identify you, but it can give you a more personalized web experience. Because we respect your right to privacy, you can choose not to allow some types of cookies. Click on the different category headings to find out more and change our default settings. However, blocking some types of cookies may impact your experience of the site and the services we are able to offer. More information STRICTLY NECESSARY COOKIES Always Active These cookies are necessary for the website to function and cannot be switched off in our systems. This includes diagnostic functions such as identifying 404 errors and monitoring page load speed. They are usually only set in response to actions made by you which amount to a request for services, such as setting your privacy preferences, logging in or filling in forms. You can set your browser to block or alert you about these cookies, but some parts of the site will not then work. These cookies do not store any personally identifiable information. Cookies Details PERFORMANCE COOKIES Performance Cookies These cookies allow us to count visits and traffic sources so we can measure and improve the performance of our site. They help us to know which pages are the most and least popular and see how visitors move around the site. All information these cookies collet is aggregated and therefore anonymous. If you do not allow these cookies we will not know when you have visited our site, and will not be able to monitor its performance. Cookies Details FUNCTIONAL COOKIES Functional Cookies These cookies enable the website to provide enhanced functionality and personalisation. They may be set by us or by third party providers whose services we have added to our pages. If you do not allow these cookies then some or all of these services may not function properly. Cookies Details TARGETING COOKIES Targeting Cookies These cookies may be set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant adverts on other sites. They do not store directly personal information, but are based on uniquely identifying your browser and internet device. If you do not allow these cookies, you will experience less targeted advertising. Cookies Details Back Button BACK Filter Button Consent Leg.Interest checkbox label label checkbox label label checkbox label label * View Third Party Cookies * Name cookie name Clear checkbox label label Apply Cancel Confirm My Choices Allow All