| Name | Identifying information | Reasons | Date of listing |
---|
1. | GAO Qiang | Date of birth: 4 October 1983Place of birth: Shandong Province, ChinaAddress: Room 1102, Guanfu Mansion, 46 Xinkai Road, Hedong District, Tianjin, ChinaNationality: ChineseGender: male | Gao Qiang is involved in "Operation Cloud Hopper", a series of cyber-attacks with a significant effect originating from outside the Union and constituting an external threat to the Union or its Member States and of cyber-attacks with a significant effect against third States."Operation Cloud Hopper" has targeted information systems of multinational companies in six continents, including companies located in the Union, and gained unauthorised access to commercially sensitive data, resulting in significant economic loss.The actor publicly known as "APT10" ("Advanced Persistent Threat 10") (a.k.a. "Red Apollo", "CVNX", "Stone Panda", "MenuPass" and "Potassium") carried out "Operation Cloud Hopper".Gao Qiang can be linked to APT10, including through his association with APT10 command and control infrastructure. Moreover, Huaying Haitai, an entity designated for providing support to and facilitating "Operation Cloud Hopper", employed Gao Qiang. He has links with Zhang Shilong, who is also designated in connection with "Operation Cloud Hopper". Gao Qiang is therefore associated with both Huaying Haitai and Zhang Shilong. | 30.7.2020 |
2. | ZHANG Shilong | Date of birth: 10 September 1981Place of birth: ChinaAddress: Hedong, Yuyang Road No 121, Tianjin, ChinaNationality: ChineseGender: male | Zhang Shilong is involved in "Operation Cloud Hopper", a series of cyber-attacks with a significant effect originating from outside the Union and constituting an external threat to the Union or its Member States and of cyber-attacks with a significant effect against third States."Operation Cloud Hopper" has targeted information systems of multinational companies in six continents, including companies located in the Union, and gained unauthorised access to commercially sensitive data, resulting in significant economic loss.The actor publicly known as "APT10" ("Advanced Persistent Threat 10") (a.k.a. "Red Apollo", "CVNX", "Stone Panda", "MenuPass" and "Potassium") carried out "Operation Cloud Hopper".Zhang Shilong can be linked to APT10, including through the malware he developed and tested in connection with the cyber-attacks carried out by APT10. Moreover, Huaying Haitai, an entity designated for providing support to and facilitating "Operation Cloud Hopper", employed Zhang Shilong. He has links with Gao Qiang, who is also designated in connection with "Operation Cloud Hopper". Zhang Shilong is therefore associated with both Huaying Haitai and Gao Qiang. | 30.7.2020 |
3. | Alexey Valeryevich MININ | Алексей Валерьевич МИНИНDate of birth: 27.5.1972Place of birth: Perm Oblast, Russian SFSR (now Russian Federation)Passport number: 120017582Issued by: Ministry of Foreign Affairs of the Russian FederationValidity: from 17.4.2017 until 17.4.2022Location: Moscow, Russian FederationNationality: RussianGender: male | Alexey Minin took part in an attempted cyber-attack with a potentially significant effect against the Organisation for the Prohibition of Chemical Weapons (OPCW) in the Netherlands and in cyber-attacks with a significant effect against third States.As a human intelligence support officer of the Main Directorate of the General Staff of the Armed Forces of the Russian Federation (GU/GRU), Alexey Minin was part of a team of four Russian military intelligence officers who attempted to gain unauthorised access to the Wi-Fi network of the OPCW in The Hague, the Netherlands, in April 2018. The attempted cyber-attack was aimed at hacking into the Wi-Fi network of the OPCW, which, if successful, would have compromised the security of the network and the OPCW’s ongoing investigatory work. The Netherlands Defence Intelligence and Security Service (Militaire Inlichtingen- en Veiligheidsdienst) disrupted the attempted cyber-attack, thereby preventing serious damage to the OPCW.A grand jury in the Western District of Pennsylvania (United States of America) has indicted Alexey Minin, as an officer of the Russian Main Intelligence Directorate (GRU), for computer hacking, wire fraud, aggravated identity theft and money laundering. | 30.7.2020 |
4. | Aleksei Sergeyvich MORENETS | Алексей Сергеевич МОРЕНЕЦDate of birth: 31.7.1977Place of birth: Murmanskaya Oblast, Russian SFSR (now Russian Federation)Passport number: 100135556Issued by: Ministry of Foreign Affairs of the Russian FederationValidity: from 17.4.2017 until 17.4.2022Location: Moscow, Russian FederationNationality: RussianGender: male | Aleksei Morenets took part in an attempted cyber-attack with a potentially significant effect against the Organisation for the Prohibition of Chemical Weapons (OPCW) in the Netherlands and in cyber-attacks with a significant effect against third States.As a cyber-operator for the Main Directorate of the General Staff of the Armed Forces of the Russian Federation (GU/GRU), Aleksei Morenets was part of a team of four Russian military intelligence officers who attempted to gain unauthorised access to the Wi-Fi network of the OPCW in The Hague, the Netherlands, in April 2018. The attempted cyber-attack was aimed at hacking into the Wi-Fi network of the OPCW, which, if successful, would have compromised the security of the network and the OPCW’s ongoing investigatory work. The Netherlands Defence Intelligence and Security Service (Militaire Inlichtingen- en Veiligheidsdienst) disrupted the attempted cyber-attack, thereby preventing serious damage to the OPCW.A grand jury in the Western District of Pennsylvania (United States of America) has indicted Aleksei Morenets, as assigned to Military Unit 26165, for computer hacking, wire fraud, aggravated identity theft and money laundering. | 30.7.2020 |
5. | Evgenii Mikhaylovich SEREBRIAKOV | Евгений Михайлович СЕРЕБРЯКОВDate of birth: 26.7.1981Place of birth: Kursk, Russian SFSR (now Russian Federation)Passport number: 100135555Issued by: Ministry of Foreign Affairs of the Russian FederationValidity: from 17.4.2017 until 17.4.2022Location: Moscow, Russian FederationNationality: RussianGender: male | Evgenii Serebriakov took part in an attempted cyber-attack with a potentially significant effect against the Organisation for the Prohibition of Chemical Weapons (OPCW) in the Netherlands and in cyber-attacks with a significant effect against third States.As a cyber-operator for the Main Directorate of the General Staff of the Armed Forces of the Russian Federation (GU/GRU), Evgenii Serebriakov was part of a team of four Russian military intelligence officers who attempted to gain unauthorised access to the Wi-Fi network of the OPCW in The Hague, the Netherlands, in April 2018. The attempted cyber-attack was aimed at hacking into the Wi-Fi network of the OPCW, which, if successful, would have compromised the security of the network and the OPCW’s ongoing investigatory work. The Netherlands Defence Intelligence and Security Service (Militaire Inlichtingen- en Veiligheidsdienst) disrupted the attempted cyber-attack, thereby preventing serious damage to the OPCW.Since spring 2022, Evgenii Serebriakov is leading "Sandworm" (a.k.a. "Sandworm Team", "BlackEnergy Group", "Voodoo Bear", "Quedagh", "Olympic Destroyer" and "Telebots"), an actor and hacking group affiliated with Unit 74455 of the Russian Main Intelligence Directorate. Sandworm has carried out cyber-attacks on Ukraine, including Ukrainian government agencies, following Russia’s war of aggression against Ukraine. | 30.7.2020 |
6. | Oleg Mikhaylovich SOTNIKOV | Олег Михайлович СОТНИКОВDate of birth: 24.8.1972Place of birth: Ulyanovsk, Russian SFSR (now Russian Federation)Passport number: 120018866Issued by: Ministry of Foreign Affairs of the Russian FederationValidity: from 17.4.2017 until 17.4.2022Location: Moscow, Russian FederationNationality: RussianGender: male | Oleg Sotnikov took part in an attempted cyber-attack with a potentially significant effect against the Organisation for the Prohibition of Chemical Weapons (OPCW) in the Netherlands and in cyber-attacks with a significant effect against third States.As a human intelligence support officer of the Main Directorate of the General Staff of the Armed Forces of the Russian Federation (GU/GRU), Oleg Sotnikov was part of a team of four Russian military intelligence officers who attempted to gain unauthorised access to the Wi-Fi network of the OPCW in The Hague, the Netherlands, in April 2018. The attempted cyber-attack was aimed at hacking into the Wi-Fi network of the OPCW, which, if successful, would have compromised the security of the network and the OPCW’s ongoing investigatory work. The Netherlands Defence Intelligence and Security Service (Militaire Inlichtingen- en Veiligheidsdienst) disrupted the attempted cyber-attack, thereby preventing serious damage to the OPCW.A grand jury in the Western District of Pennsylvania has indicted Oleg Sotnikov, as an officer of the Russian Main Intelligence Directorate (GRU), for computer hacking, wire fraud, aggravated identity theft and money laundering. | 30.7.2020 |
7. | Dmitry Sergeyevich BADIN | Дмитрий Сергеевич БАДИНDate of birth: 15.11.1990Place of birth: Kursk, Russian SFSR (now Russian Federation)Nationality: RussianGender: male | Dmitry Badin took part in a cyber-attack with a significant effect against the German federal parliament (Deutscher Bundestag) and in cyber-attacks with a significant effect against third States.As a military intelligence officer of the 85th Main Centre for Special Services (GTsSS) of the Main Directorate of the General Staff of the Armed Forces of the Russian Federation (GU/GRU), Dmitry Badin was part of a team of Russian military intelligence officers who conducted a cyber-attack against the German federal parliament in April and May 2015. That cyber-attack targeted the parliament’s information system and affected its operation for several days. A significant amount of data was stolen and the email accounts of several MPs, as well as of former Chancellor Angela Merkel, were affected.A grand jury in the Western District of Pennsylvania (United States of America) has indicted Dmitry Badin, as assigned to Military Unit 26165, for computer hacking, wire fraud, aggravated identity theft and money laundering. | 22.10.2020 |
8. | Igor Olegovich KOSTYUKOV | Игорь Олегович КОСТЮКОВDate of birth: 21.2.1961Nationality: RussianGender: male | Igor Kostyukov is the current Head of the Main Directorate of the General Staff of the Armed Forces of the Russian Federation (GU/GRU), where he previously served as First Deputy Head. One of the units under his command is the 85th Main Centre for Special Services (GTsSS) (a.k.a. "Military Unit 26165", "APT28", "Fancy Bear", "Sofacy Group", "Pawn Storm" and "Strontium").In this capacity, Igor Kostyukov is responsible for cyber-attacks carried out by the GTsSS, including those with a significant effect constituting an external threat to the Union or its Member States.In particular, military intelligence officers of the GTsSS took part in the cyber-attack against the German federal parliament (Deutscher Bundestag) in April and May 2015 and the attempted cyber-attack aimed at hacking into the Wi-Fi network of the Organisation for the Prohibition of Chemical Weapons (OPCW) in the Netherlands in April 2018.The cyber-attack against the German federal parliament targeted the parliament’s information system and affected its operation for several days. A significant amount of data was stolen and email accounts of several MPs, as well as of former Chancellor Angela Merkel, were affected. | 22.10.2020 |
9. | Ruslan Aleksandrovich PERETYATKO | Руслан Александрович ПЕРЕТЯТЬКОDate of birth: 3.8.1985Nationality: RussianGender: Male | Ruslan Peretyatko took part in cyberattacks with a significant effect, which constitute an external threat to the Union or its Member States.Ruslan Peretyatko is part of the "Callisto group" of Russian intelligence officers conducting cyber operations against EU Member States and third states.Callisto Group (a.k.a. "Seaborgium", "Star Blizzard", "ColdRiver", "TA446") has launched multi-year phishing campaigns used to steal account credentials and data. Furthermore, the Callisto group is responsible for campaigns targeting individuals and critical state functions, including in the areas of defence and external relations.Therefore, Ruslan Peretyatko is involved in cyberattacks with a significant effect, which constitute an external threat to the Union or its Member States. | 24.6.2024 |
10. | Andrey Stanislavovich KORINETS | Андрей Станиславович КОРИНЕЦDate of birth: 18.5.1987Place of birth: City of Syktyvkar, RussiaNationality: RussianGender: Male | Andrey Stanislavovich Korinets took part in cyberattacks with a significant effect, which constitute an external threat to the Union or its Member States.Andrey Stanislavovich Korinets is an officer of "Center 18" of the Federal Security Service (FSB) of the Russian Federation. Andrey Stanislavovich Korinets is part of the "Callisto group" of Russian intelligence officers conducting cyber operations against EU Member States and third states.Callisto Group (a.k.a. "Seaborgium", "Star Blizzard", "ColdRiver", "TA446") has launched multi-year phishing campaigns used to steal account credentials and data. Furthermore, the Callisto group is responsible for campaigns targeting individuals and critical state functions, including in the areas of defence and external relations.Therefore, Andrey Stanislavovich Korinets is involved in cyberattacks with a significant effect, which constitute an external threat to the Union or its Member States. | 24.6.2024 |
11. | Oleksandr SKLIANKO | Александр СКЛЯНКО (Russian spelling)Олександр СКЛЯНКО (Ukrainian spelling)Date of birth: 5.8.1973Passport: EC 867868, issued on 27.11.1998 (Ukraine)Gender: male | Oleksandr Sklianko took part in cyberattacks with a significant effect against EU Member States, as well as cyberattacks with a significant effect against third states.Oleksandr Sklianko is part of the "Armageddon" hacker group supported by the Federal Security Service (FSB) of the Russian Federation that carried out various cyberattacks with a significant effect on the government of Ukraine and on EU Member States and their government officials, including by using phishing emails and malware campaigns.Therefore, Oleksandr Sklianko is involved in cyberattacks with a significant effect against third states, as well as in cyberattacks with a significant effect, which constitute an external threat to the Union or its Member States. | 24.6.2024 |
12. | Mykola CHERNYKH | Николай ЧЕРНЫХ (Russian spelling)Микола ЧЕРНИХ (Ukrainian spelling)Date of birth: 12.10.1978Passport: EC 922162, issued on 20.01.1999 (Ukraine)Gender: male | Mykola Chernykh took part in cyberattacks with a significant effect against EU Member States, as well as cyberattacks with a significant effect against third states.Mykola Chernykh is part of the "Armageddon" hacker group supported by the Federal Security Service (FSB) of the Russian Federation that carried out various cyberattacks with a significant effect on the government of Ukraine and on EU Member States and their government officials, including by using phishing emails and malware campaigns.As a former employee of the Security Service of Ukraine, he is charged in Ukraine with treason and unauthorised interference in the operation of electronic computing machines and automated systems.Therefore, Mykola Chernykh is involved in cyberattacks with a significant effect, which constitute an external threat to the Union or its Member States. | 24.6.2024 |
13. | Mikhail Mikhailovich TSAREV | Михаил Михайлович ЦАРЕВDate of birth: 20.4.1989Place of birth: Serpukhov, Russian FederationNationality: RussianAddress: SerpukhovGender: male | Mikhail Mikhailovich Tsarev took part in cyberattacks with a significant effect, which constitute an external threat to EU Member States.Mikhail Mikhailovich Tsarev, also known by the online monikers "Mango", "Alexander Grachev", "Super Misha", "Ivanov Mixail", "Misha Krutysha", and "Nikita Andreevich Tsarev" is a key-player in the deployment of the "Conti" and "Trickbot" malware programs, and is involved in the Russia-based threat group "Wizard Spider".The Conti and Trickbot malware programs were created and developed by Wizard Spider. Wizard Spider has conducted ransomware campaigns in a variety of sectors, including essential services such as health and banking. The group has infected computers worldwide and their malware has been developed into a highly modular malware suite. Campaigns by Wizard Spider, using malware such as Conti, "Ryuk" and TrickBot, are responsible for substantial economic damage in the European Union.Mikhail Mikhailovich Tsarev is therefore involved in cyberattacks with a significant effect, which constitute an external threat to the Union or its Member States. | 24.6.2024 |
14. | Maksim Sergeevich GALOCHKIN | Максим Сергеевич ГАЛОЧКИНDate of birth: 19.5.1982Place of birth: Abakan, Russian FederationNationality: RussianGender: male | Maksim Galochkin took part in cyberattacks with a significant effect, which constitute an external threat to EU Member States.Maksim Galochkin is also known by the online monikers "Benalen", "Bentley", "Volhvb", "volhvb", "manuel", "Max17" and "Crypt". Galochkin is a key player in the deployment of the "Conti" and "Trickbot" malware programs and is involved in the Russia-based threat group "Wizard Spider". He has led a group of testers, with responsibilities for the development, supervision, and implementation of tests for the TrickBot malware program, created and deployed by Wizard Spider.Wizard Spider has conducted ransomware campaigns in a variety of sectors, including essential services such as health and banking. The group has infected computers worldwide and their malware has been developed into a highly modular malware suite. Campaigns by Wizard Spider, using malware such as Conti, "Ryuk" and TrickBot, are responsible for substantial economic damage in the European Union.Maksim Galochkin is therefore involved in cyberattacks with a significant effect, which constitute an external threat to the Union or its Member States. | 24.6.2024 |