Arsenal attributed to Sandworm.
Following MITRE ATT&CK Flow methodology.
| CVE | Year | Description |
|---|---|---|
| CVE-2014-4114 | 2014 | Windows OLE RCE (BlackEnergy campaigns) |
| CVE-2017-0144 | 2017 | EternalBlue SMB β NotPetya worm propagation |
| CVE-2023-38831 | 2023 | WinRAR RCE in 2023 Ukraine campaigns |
Documented in MITRE ATT&CK, vendor intelligence, and government advisories.
Mitigations with MITRE ATT&CK IDs. Click badges for implementation guidance.
| Plan | Source | Type | Description | Link |
|---|---|---|---|---|
| MITRE CTID - Sandworm Full Emulation Plan | MITRE CTID | Open Source | Complete Sandworm emulation with detection and protection scenarios, YARA rules, and ICS focus | Open |
| Sandworm Emulation Plan - Scenario 1 | MITRE CTID | Open Source | Step-by-step walkthrough: SSH compromise, webshell, lateral movement, data destruction | Open |
| ATT&CK Evaluations Library - Sandworm | MITRE Engenuity | Framework | Official Sandworm evaluation plan with destructive operations | Open |
| AttackIQ - Sandworm Emulation Part 1 | AttackIQ | Commercial | Destructive operations validation for Sandworm TTPs | Open |
| ESET Industroyer2 Technical Analysis | ESET | Guide | Deep technical analysis of Industroyer2 ICS malware with YARA rules | Open |
| Sandworm Emulation - Scenario 2 Protection | MITRE CTID | Open Source | Protection scenario: 3 independent tests for CaddyWiper, Exaramel, and NotPetya-style propagation | Open |
| AttackIQ: Emulating Sandworm Part 2 | AttackIQ | Commercial | ICS targeting and wiper deployment validation scenarios | Open |
| Emulating Sandworm - Part 1 | AttackIQ | Blog Post | Post-compromise TTP emulation: ICS targeting, wiper deployment, EternalBlue propagation | Open |
| Emulating Sandworm - Part 2 | AttackIQ | Blog Post | HermeticWiper, HermeticWizard spreader, and destructive operations validation | Open |
| Emulating the Destructive Sandworm Adversary (2025) | AttackIQ | Blog Post | Latest 2025 Sandworm emulation: nano.exe and system.exe samples, scheduled task persistence | Open |
| Unearthing APT44: Russia's Sandworm | Google Cloud / Mandiant | Blog Post | Mandiant's comprehensive analysis of Sandworm graduating to APT44 designation | Open |