Threat Actor Profile
Primitive Bear Threat Actor Profile
Primitive Bear is a Russia-aligned threat actor closely affiliated with the Russian Federal Security Service (FSB), specifically FSB Center 18. First observed active during the annexation of Crimea in 2014, this group specializes in psychological operations, disinformation, and phishing campaigns. They play a significant role within Russia’s hybrid warfare doctrine, blending cyber operations with propaganda to destabilize adversaries, specifically targeting Ukraine, NATO, and Eastern European political organizations.
Threat Actor Profile
Primitive Bear Threat Actor Profile
Country of Origin
Members
Leadership
Primitive Bear TTPs
Tactics
Primitive Bear primarily aims to discredit Ukraine’s government and civil society, influence public perception, and support Russian geopolitical goals through information warfare. Their operations prioritize high strategic impact over technical sophistication.
Techniques
Key techniques used by Primitive Bear include spear phishing campaigns with malicious attachments, the creation of fake social media personas, and the dissemination of forged documents aimed at disinformation. They also amplify their messages via Russian state-sponsored media channels.
Procedures
Procedurally, Primitive Bear employs rapid dissemination of propaganda alongside malware deployment. Notable tools include phishing emails coupled with custom malware such as Pterodo backdoor and PowerPunch loader, often targeting government officials, journalists, and NGOs in Ukraine.
Want to Shut Down Threats Before They Start?
Notable Cyberattacks
CyberBerkut Operations (2014–2016)
Ukrainian Elections (2018–2019)
Russian Invasion of Ukraine (2022–2024)
Law Enforcement & Arrests
To date, there are no public reports of arrests directly tied to Primitive Bear’s operations. However, global law enforcement remains vigilant and actively tracks Russian-backed cyber activities to mitigate their impact
How to Defend Against
Phishing Resilience: Implement robust email filtering, sandboxing of attachments, and phishing-resistant MFA.
Media Literacy Training: Educate teams to recognize disinformation tactics, especially vital for NGOs operating in affected areas.
IOC Monitoring: Hunt for Gamaredon-style implants such as Pterodo backdoor and PowerPunch loader.
Network Security: Focus on segmentation, endpoint protection, and strict access controls.
References
Detect, Respond, Protect
See how the global Huntress SOC can augment your team
with 24/7 coverage and unmatched human expertise.
Start your free trial today.