Operation Ghostwriter

Description

(FireEye) Mandiant Threat Intelligence has tied together several information operations that we assess with moderate confidence comprise part of a broader influence campaign—ongoing since at least March 2017—aligned with Russian security interests. The operations have primarily targeted audiences in Lithuania, Latvia, and Poland with narratives critical of the North Atlantic Treaty Organization’s (NATO) presence in Eastern Europe, occasionally leveraging other themes such as anti-U.S. and COVID-19-related narratives as part of this broader anti-NATO agenda. We have dubbed this campaign “Ghostwriter.”

Many, though not all of the incidents we suspect to be part of the Ghostwriter campaign, appear to have leveraged website compromises or spoofed email accounts to disseminate fabricated content, including falsified news articles, quotes, correspondence and other documents designed to appear as coming from military officials and political figures in the target countries.

Names

NameName-Giver
Operation GhostwriterFireEye
UNC1151FireEye
TA445Proofpoint
UAC-0051CERT-UA
UAC-0057CERT-UA
PUSHCHAGoogle
DEV-0257Microsoft
Storm-0257Microsoft
White LynxPalo Alto

Country

State-sponsored

Motivation

  • Information theft and espionage
  • Sabotage and destruction

First Seen

2017

Observed Sectors

Observed Countries

Tools

Operations

Counter Operations

Information

Other Information

Uuid

163127e3-2716-4f45-b24e-49dc8987d9e2

Last Card Change

2025-06-27