
SCARS Institute’s Encyclopedia of Scams™ Published Continuously for 25 Years

The Calisto Group Is A Russian State-sponsored Cyberespionage Group Believed To Be Operating Under The Direction Of The Federal Security Service (FSB)
The Calisto Group is also known as Seaborgium, Star Blizzard, ColdRiver, and TA446,
Calisto Group Activities:
- Targeted attacks: The Calisto Group primarily targets military personnel, government officials, think tanks, journalists, and defense-industrial entities in Eastern Europe, the South Caucasus, the Ukraine, and the UK.
- Espionage: The primary goal of the Calisto Group is to steal sensitive information and data for the Russian government.
- Spear-phishing: They commonly use spear-phishing emails as their attack vector, tricking victims into clicking malicious links or opening infected attachments.
- Custom tools: The Calisto Group is known to develop and use sophisticated custom tools for their operations.
- Global reach: Their activities are not limited to specific regions, as they have been observed targeting entities worldwide, including the US and Europe.
Calisto Group’s Tactics and Techniques
The Calisto Group utilizes various tactics and techniques to achieve their goals of cyberespionage and information theft. Here are some of their known methods:
Spear Phishing Emails:
- This is the group’s primary attack vector, involving emails tailored to specific victims with personalized content and attachments designed to entice clicks or downloads.
- These emails often impersonate legitimate individuals or organizations, making them appear trustworthy.
- They may contain links to malicious websites or infected attachments that install malware on the victim’s device.
Social Engineering:
- This involves psychological manipulation techniques to deceive victims into divulging sensitive information or taking actions that benefit the attackers.
- They may use emotional appeals, threats, or fabricated stories to gain trust and exploit vulnerabilities.
- This can include tactics like offering enticing jobs, claiming to have compromising information, or posing as technical support representatives.
Custom Tools:
- The Calisto Group is known for developing and deploying sophisticated custom tools for their operations, including:
- Exploit kits: Code designed to exploit vulnerabilities in software and gain access to systems.
- Malware: Malicious software used to steal data, monitor activity, or control infected devices.
- Command and control (C2) servers: Used to communicate with compromised systems and issue commands.
- Data exfiltration tools: Techniques used to steal and transfer sensitive information from victim systems.
Advanced Techniques:
- The group employs various advanced techniques to remain undetected and evade security measures, such as:
- Zero-day exploits: Exploiting vulnerabilities in software before vendors release patches.
- Sandboxing evasion: Techniques to bypass security software that monitors suspicious activity.
- Lateral movement: Moving within a network after gaining initial access to one system.
- Data encryption: Encrypting stolen information to make it difficult to analyze.
Targeting:
- The Calisto Group strategically chooses its targets, focusing on individuals and organizations with access to sensitive information valuable to the Russian government.
- Their targets typically include:
- Government officials and military personnel: To gather intelligence on military plans, diplomatic relations, and national security strategies.
- Think tanks and research institutions: To access information on critical technologies, economic analysis, and political developments.
- Journalists and media outlets: To monitor public opinion and control narratives.
- Defense-industrial entities: To steal information on weapons development, military capabilities, and strategic partnerships.
Calisto Group Impact:
- Information theft: The Calisto Group has successfully stolen sensitive information from various organizations, potentially impacting national security and diplomatic relations.
- Disruption and instability: Their attacks can disrupt operations, cause financial losses, and erode trust in institutions.
- Escalating tensions: Their activities contribute to the ongoing geopolitical tensions between Russia and the West.
Calisto Group Responses and Investigations:
- Governments and security agencies: Several governments and security agencies, including the UK National Cyber Security Centre (NCSC), Microsoft Threat Intelligence Center, and Google’s Threat Analysis Group, have attributed attacks to the Calisto Group and issued warnings about their activities.
- Sanctions: The UK and the US have imposed sanctions on individuals associated with the Calisto Group.
- Ongoing investigations: Investigations are ongoing to understand the Calisto Group’s capabilities further and track their activities.
Protecting Against the Calisto Group:
- Awareness: Organizations and individuals should be aware of the Calisto Group’s tactics and techniques to avoid falling victim to their attacks.
- Cybersecurity measures: Implementing strong cybersecurity measures, such as using multi-factor authentication and keeping software updated, can help mitigate the risk of successful attacks.
- Reporting: Reporting suspicious activity to authorities and security researchers can help identify and track the Calisto Group’s activities.
Summary
The Calisto Group is a sophisticated and active Russian state-sponsored cyberespionage group posing a significant threat to national security and international stability. By remaining vigilant, implementing strong cybersecurity measures, and collaborating with authorities, we can work together to protect ourselves from their malicious activities.
By understanding the Calisto Group’s tactics and techniques, organizations and individuals can improve their defenses and better prepare for potential attacks. Implementing strong cybersecurity measures, being skeptical of unsolicited communications, and staying informed about emerging threats can significantly reduce the risk of falling victim to this sophisticated cybercrime & cyberespionage group.
Two Russian Nationals Working with Russia’s Federal Security Service Charged in the United States with Global Computer Intrusion Campaign
Indictment Alleges the So-Called “Callisto Group” Hacked Computers in the United States and Allied Countries, and Stole Information Used in Foreign Malign Influence Operations Designed to Influence the U.K.’s 2019 Elections
A federal grand jury in San Francisco returned an indictment on Tuesday charging two individuals with a campaign to hack into computer networks in the United States, the United Kingdom, other North Atlantic Treaty Organization member countries, and Ukraine, all on behalf of the Russian government.
According to court documents, Ruslan Aleksandrovich Peretyatko (Перетятько Руслан Александрович), an officer in Russia’s Federal Security Service (FSB) Center 18, Andrey Stanislavovich Korinets (Коринец Андрей Станиславович) and other unindicted conspirators employed a sophisticated spear phishing campaign to gain unauthorized, persistent access (i.e., “hack”) into victims’ computers and email accounts.
“The Russian government continues to target the critical networks of the United States and our partners, as highlighted by the indictment unsealed today,” said Assistant Attorney General Matthew G. Olsen of the Justice Department’s National Security Division. “Through this malign influence activity directed at the democratic processes of the United Kingdom, Russia again demonstrates its commitment to using weaponized campaigns of cyber espionage against such networks in unacceptable ways. The Department of Justice will respond to such behavior with an even more determined commitment to disrupt those activities and to hold accountable the individuals responsible.”
“Today’s indictment is part of a coordinated international response to send a message to the conspirators that the whole of the United States government stands together and with our partners internationally to identify and disrupt cyber espionage actors, particularly those seeking to obtain government information and attempting to create chaos in democratic processes,” said U.S. Attorney Ismail J. Ramsey for the Northern District of California. “We are grateful to all of our partners for their assistance in addressing these threats posed by the FSB’s action in the Northern District of California, across the United States, and around the world.”
“The FBI will not stand idly by as Russia continues to perpetuate this type of targeted malicious activity,” said Assistant Director Bryan Vorndran of the FBI’s Cyber Division. “Russian interference through malign foreign influence campaigns is deplorable, and we will not tolerate it in the United States or directed against our foreign partners. The FBI is dedicated to combating this pervasive threat and will tirelessly seek to prevent and disrupt these criminal acts carried out by Russia.”
The indictment, which was unsealed today, alleges the conspiracy targeted current and former employees of the U.S. Intelligence Community, Department of Defense, Department of State, defense contractors, and Department of Energy facilities between at least October 2016 and October 2022. In addition, the indictment alleges the conspirators – known publicly by the name “Callisto Group” – targeted military and government officials, think tank researchers and staff, and journalists in the United Kingdom and elsewhere, and that information from certain of these targeted accounts was leaked to the press in Russia and the United Kingdom in advance of U.K. elections in 2019.
As a common example, the conspirators used “spoofed” email accounts designed to look like personal and work-related email accounts of the group’s targets. The conspirators allegedly also sent sophisticated-looking emails that appeared to be from email providers suggesting users had violated terms of service. These messages were designed to trick victims into providing their email account credentials to false login prompts. Once the conspirators fraudulently obtained the victim’s credentials, they were able to use those credentials to access the victims’ email accounts at will.
In addition to the indictment, the Department of the Treasury’s Office of Foreign Assets Control (OFAC) announced that it has sanctioned both Peretyatko and Korinets for their roles in malicious cyber-enabled activity. Moreover, the United Kingdom has issued sanctions of its own, and the U.S. Department of State announced rewards of up to $10 million for information leading to the identification or location of Peretyatko and Korinets, as well as their conspirators.
In addition to the name “Callisto Group,” FSB Center 18 is known by cybersecurity investigators as “Dancing Salome” by Kaspersky Labs, “STAR BLIZZARD” by Microsoft Threat Intelligence Center and “COLDRIVER” by Google’s Threat Analysis Group.
The defendants are each charged with one count of conspiracy to commit an offense against the United States, namely, computer fraud, which carries a maximum sentence of five years in prison for PERETYATKO, and up to 10 years for KORINETS. The maximum potential sentences in this case are prescribed by Congress and are provided here for informational purposes only, as any sentencings of the defendants will be determined by the assigned judge.
The investigation was conducted jointly by the U.S. Attorney’s Office for the Northern District of California, the National Security Cyber Section of the Justice Department’s National Security Division and the FBI San Francisco Field Office. The FBI’s Cyber Division, Cyber Assistant Legal Attachés, and Legal Attachés in countries around the world provided essential support. Numerous victims cooperated and provided valuable assistance in the investigation.
An indictment is merely an allegation. All defendants are presumed innocent until proven guilty beyond a reasonable doubt in a court of law.
More About Organized Crime Groups:
- REKK Fraud Organization – Retail Fraud – 2023 (romancescamsnow.com)
- Scattered Spider Cybercriminals – SIM Swap Cyberattacks 2023 (romancescamsnow.com)
- Octo Tempest Cybercrime Gang – Organized Criminal Enterprise Profile (romancescamsnow.com)
- Nigerian Killer Bee Cybercrime Syndicate – Organized Criminal Enterprise Profile (romancescamsnow.com)
- 14K Triad Cybercrime Gang – Organized Criminal Enterprise Profile (romancescamsnow.com)
- Cavalcante Cybercrime Gang – Organized Criminal Enterprise Profile (romancescamsnow.com)
- Cobalt Cybercrime Gang – Organized Criminal Enterprise Profile (romancescamsnow.com)
- Black Axe – Organized Criminal Enterprise Profile (romancescamsnow.com)
- Red Dragon – Organized Criminal Enterprise Profile (romancescamsnow.com)
Do You Need Support?
Get It Now!
SCARS provides the leading Support & Recovery program for relationship scam victims – completely FREE!
Our managed peer support groups allow victims to talk to other survivors and recover in the most experienced environment possible, for as long as they need. Recovery takes as long as it takes – we put no limits on our support!
SCARS is the most trusted support & education provider in the world. Our team is certified in trauma-informed care, grief counseling, and so much more!
To apply to join our groups visit support.AgainstScams.org
We also offer separate support groups for family & friends too.
Become a
SCARS STAR™ Member
SCARS offers memberships in our STAR program, which includes many benefits for a very low annual membership fee!
SCARS STAR Membership benefits include:
- FREE Counseling or Therapy Benefit from our partner BetterHelp.com
- Exclusive members-only content & publications
- Discounts on SCARS Self-Help Books Save
- And more!
To learn more about the SCARS STAR Membership visit membership.AgainstScams.org
To become a SCARS STAR Member right now visit join.AgainstScams.org
-/ 30 /-
What do you think about this?
Please share your thoughts in a comment below!
Article Rating
Table of Contents
POPULAR ARTICLES
ARTICLE META
RATE THIS ARTICLE?
LEAVE A COMMENT?
Recent Comments
On Other Articles
on Financial Recovery – Avoid Money Triggers – Perspective on Money for Scam Victims – 2023 [UPDATED 2025]: “This article is excellent. This is something I needed to read. Thank you!” Jun 18, 16:26
on Scam Victim Apathy – Scams Are Somebody Else’s Problem: “This is a concept I hadn’t considered before. And the Tall Poppy Syndrome is something I’ve not heard of. I…” Jun 17, 13:17
on After The Scam – Victims Frequently Engage In Self-Defeating Behaviors: “Thank you for this article! I have always been my worst critic. Then it all just spirals down into self…” Jun 17, 10:48
on Scam Victim’s/Survivor’s Guide To Writing Your Own Book About Your Experience – For Healing & Profit – 2024: “I have a friend who has suggested that I write a book about my story, a few times. Just the…” Jun 15, 23:02
on Trauma Grief & Humor As A Coping Mechanism: “My sense of humor has, at times, been what’s pulled me up and helped me cope. In the early stages…” Jun 15, 22:53
on Differences Between Men & Women Scam Victims: “This is very helpful in understanding the differences experienced by men and women. It is sad that most men are…” Jun 15, 22:21
on Sending A Letter To Your Scammer – Getting The Last Word – 2024: “I sent the email and I have to say, I feel a sense of relief. I truly hope there’s no…” Jun 15, 22:04
on Forgiveness and Scams – Why It Matters So Much!: “Forgiveness is one of the hardest parts of recovery for me. That includes forgiving myself along with the scammers. It…” Jun 15, 21:33
on Buried Cell Phones/Smartphones & Hidden Cameras – New Cybercrime – Cyber Surveillance by Local Criminals – 2025: “This is beyond concerning. To be tracked at your home is obviously a huge violation of privacy. Thank you for…” Jun 13, 06:56
on Scam Victim’s Learning Process [INFOGRAPHIC]: “The commitment to learning and recovering from the scam is indeed overwhelming. At first I struggled to comprehend the material…” Jun 12, 20:54
Important Information for New Scam Victims
- Please visit www.ScamVictimsSupport.org – a SCARS Website for New Scam Victims & Sextortion Victims
- Enroll in FREE SCARS Scam Survivor’s School now at www.SCARSeducation.org
- Please visit www.ScamPsychology.org – to more fully understand the psychological concepts involved in scams and scam victim recovery
If you are looking for local trauma counselors please visit counseling.AgainstScams.org or join SCARS for our counseling/therapy benefit: membership.AgainstScams.org
If you need to speak with someone now, you can dial 988 or find phone numbers for crisis hotlines all around the world here: www.opencounseling.com/suicide-hotlines
A Note About Labeling!
We often use the term ‘scam victim’ in our articles, but this is a convenience to help those searching for information in search engines like Google. It is just a convenience and has no deeper meaning. If you have come through such an experience, YOU are a Survivor! It was not your fault. You are not alone! Axios!
A Question of Trust
At the SCARS Institute, we invite you to do your own research on the topics we speak about and publish, Our team investigates the subject being discussed, especially when it comes to understanding the scam victims-survivors experience. You can do Google searches but in many cases, you will have to wade through scientific papers and studies. However, remember that biases and perspectives matter and influence the outcome. Regardless, we encourage you to explore these topics as thoroughly as you can for your own awareness.
Statement About Victim Blaming
Some of our articles discuss various aspects of victims. This is both about better understanding victims (the science of victimology) and their behaviors and psychology. This helps us to educate victims/survivors about why these crimes happened and to not blame themselves, better develop recovery programs, and to help victims avoid scams in the future. At times this may sound like blaming the victim, but it does not blame scam victims, we are simply explaining the hows and whys of the experience victims have.
These articles, about the Psychology of Scams or Victim Psychology – meaning that all humans have psychological or cognitive characteristics in common that can either be exploited or work against us – help us all to understand the unique challenges victims face before, during, and after scams, fraud, or cybercrimes. These sometimes talk about some of the vulnerabilities the scammers exploit. Victims rarely have control of them or are even aware of them, until something like a scam happens and then they can learn how their mind works and how to overcome these mechanisms.
Articles like these help victims and others understand these processes and how to help prevent them from being exploited again or to help them recover more easily by understanding their post-scam behaviors. Learn more about the Psychology of Scams at www.ScamPsychology.org
Psychology Disclaimer:
All articles about psychology and the human brain on this website are for information & education only
The information provided in this article is intended for educational and self-help purposes only and should not be construed as a substitute for professional therapy or counseling.
While any self-help techniques outlined herein may be beneficial for scam victims seeking to recover from their experience and move towards recovery, it is important to consult with a qualified mental health professional before initiating any course of action. Each individual’s experience and needs are unique, and what works for one person may not be suitable for another.
Additionally, any approach may not be appropriate for individuals with certain pre-existing mental health conditions or trauma histories. It is advisable to seek guidance from a licensed therapist or counselor who can provide personalized support, guidance, and treatment tailored to your specific needs.
If you are experiencing significant distress or emotional difficulties related to a scam or other traumatic event, please consult your doctor or mental health provider for appropriate care and support.
Also read our SCARS Institute Statement about Professional Care for Scam Victims – click here to go to our ScamsNOW.com website.
Thank you for your comment. You may receive an email to follow up. We never share your data with marketers.