Detect, Respond, Protect
See how the global Huntress SOC can augment your team
with 24/7 coverage and unmatched human expertise.
Start your free trial today.
Emerging in 2021, Ember Bear—commonly recognized as UAC-0056 or Lorec53—is a Russian state-sponsored cyber espionage group closely tied to the GRU. Known for spear-phishing and wiper malware like WhisperGate, they target critical infrastructure, governments, and defense sectors, often leveraging destructive tactics alongside data theft.
The group primarily focuses on espionage and long-term intelligence gathering but has demonstrated capability for wiper attacks targeting Ukrainian entities.
Their tools and methods include spearphishing with malicious documents, persistence through web shells, and exploitation of remote access tools for lateral movement.
Notable procedures include deploying tools like WhisperGate wiper malware, document stealers such as OutSteel, and backdoor malware like GraphSteel and GrimPlant.
To date, there have been no public reports of successful arrests or law enforcement actions specifically dismantling Ember Bear’s operations.
Organizations should employ robust email security measures to block phishing attempts, monitor web servers for unusual activity, and use endpoint detection tools to detect malicious processes.
Effective network monitoring and regular patching of systems are vital for mitigating threats from Ember Bear.