Trace Id is missing

Nation State Actor

Crimson Sandstorm   

Blue hexagon pattern with O/O text.
Crimson Sandstorm (formerly CURIUM) actors have been observed leveraging a network of fictitious social media accounts to build trust with targets and deliver malware to ultimately exfiltrate data. Additionally in 2021, Crimson Sandstorm conducted a spear-phishing campaign targeting companies that provide IT and engineering services for U.S. defense and intelligence agencies, probably as a part of a supply chain operation to gain access to their customers.

DETAILS

Also known as:

Country of origin:

Countries targeted:

Industries targeted:

Microsoft Threat Intelligence: Recent Crimson Sandstorm Articles

Evolving trends in Iranian threat actor activity – MSTIC presentation at CyberWarCon 2021

Follow Microsoft Security