© 2025 CoolTechZone - Latest tech news,
product reviews, and analyses.

FBI and Microsoft seize dozens of internet domains used in computer fraud scheme


The FBI and Microsoft have commandeered over a hundred internet domains used by Russian hackers to commit computer fraud and abuse in the United States.

According to the Department of Justice, the seized domains belonged to the Calisto Group, also known as Star Blizzard and COLDRIVER, and formerly SEABORGIUM. It’s a Russian hacking group with close ties to Russia’s Federal Security Service FSB.

The websites were used in an ongoing spear-phishing campaign to obtain login credentials from United States government agencies, gain unauthorized access, collect valuable information, and cause damage to protected computers.

The Russian hackers targeted former employees of the US intelligence community, former and current employees of the Department of Defense and Department of State, military defense contractors, and staff members at the Department of Energy.

Microsoft’s Digital Crimes Unit (DCU) played a major role in disrupting the technical infrastructure used by the Calisto Group. The Redmond-based tech company was ordered by the District Court of the District of Columbia to seize 66 unique domains used by Russians hackers.

According to Microsoft, the hacking group targeted over 30 institutions, including think tanks, non-governmental organizations (NGOs), and journalist organizations providing support to Ukraine, by deploying spear-phishing campaigns to exfiltrate sensitive information and interfere in their activities between January 2023 and August 2024.

Microsoft doesn’t think this will be the end of the Russian hacking group, but for now we can catch our breath. “Rebuilding infrastructure takes time, absorbs resources, and costs money. By collaborating with the DOJ, we have been able to expand the scope of disruption and seize more infrastructure, enabling us to deliver greater impact against Star Blizzard,” the company states.

“The Russian government ran this scheme to steal Americans’ sensitive information, using seemingly legitimate email accounts to trick victims into revealing account credentials. With the continued support of our private sector partners, we will be relentless in exposing Russian actors and cybercriminals and depriving them of the tools of their illicit trade,” Deputy Attorney General Lisa Monaco said in a statement.

The Calisto Group has been involved in various forms of cyberattacks and other evil activities since at least 2017. Since 2022, the hacking group has improved its detection evasion capabilities while remaining focused on email credential theft against the same targets. Microsoft has identified 82 customers targeted by this group at a rate of approximately one attack per week since January 2023.


Leave a Reply

Your email address will not be published. Required fields are marked