{
	"id": "51ce2b32-fcf7-4381-9050-ea6e569e14bc",
	"created_at": "2026-04-06T01:29:05.904586Z",
	"updated_at": "2026-04-10T13:12:41.54634Z",
	"deleted_at": null,
	"sha1_hash": "d69d466186e607dd236595826bac22223ee88d34",
	"title": "Russia: UK and US expose global campaign of malign activity by Russian intelligence services",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 34317,
	"plain_text": "Russia: UK and US expose global campaign of malign activity by\r\nRussian intelligence services\r\nBy Foreign, Commonwealth \u0026 Development Office\r\nPublished: 2021-04-15 · Archived: 2026-04-06 00:44:48 UTC\r\nUK shares US concerns about a continuing pattern of Russian malign activity\r\nUK attributes Russia’s Foreign Intelligence Service (SVR) was behind SolarWinds compromise\r\nThe UK and US are today calling out Russia for carrying out the SolarWinds compromise, part of a wider pattern\r\nof activities by the Russian Intelligence Services against the UK and our allies.\r\nRussia’s pattern of malign behaviour around the world – whether in cyberspace, in election interference or in the\r\naggressive operations of their intelligence services – demonstrates that Russia remains the most acute threat to the\r\nUK’s national and collective security.\r\nThe UK, alongside its international partners, will continue to defend against Russia’s attempts to destabilise our\r\nsocieties.\r\nForeign Secretary Dominic Raab, said:\r\nWe see what Russia is doing to undermine our democracies. The UK and US are calling out Russia’s\r\nmalicious behaviour, to enable our international partners and businesses at home to better defend and\r\nprepare themselves against this kind of action.\r\nThe UK will continue to work with allies to call out Russia’s malign behaviour where we see it.\r\nThe UK can today also reveal for the first time that Russia’s Foreign Intelligence Service (SVR) was behind a\r\nseries of cyber intrusions, including the SolarWinds compromise.\r\nGCHQ’s National Cyber Security Centre (NCSC) assess that it is highly likely the SVR was responsible for\r\ngaining unauthorised access to SolarWinds “Orion” software and subsequent targeting.\r\nThese incidents are part of a wider pattern of cyber intrusions by the SVR who have previously attempted to gain\r\naccess to governments across Europe and NATO members.\r\nSince the SolarWinds vulnerability was uncovered, NCSC have been conducting extensive activity to understand\r\nand mitigate the compromise. While the overall impact on the UK of the SVR’s exploitation of this software is\r\nlow, the NCSC has identified a low single digit number of public sector organisations targeted through the\r\nSolarWinds vulnerability. The government, including the NCSC, has been working hard to ensure those affected\r\nwere rapidly mitigated.\r\nIn addition, the UK government is today making available further information about the SVR’s cyber programme\r\navailable here\r\nhttps://www.gov.uk/government/news/russia-uk-and-us-expose-global-campaigns-of-malign-activity-by-russian-intelligence-services\r\nPage 1 of 2\n\nSource: https://www.gov.uk/government/news/russia-uk-and-us-expose-global-campaigns-of-malign-activity-by-russian-intelligence-services\r\nhttps://www.gov.uk/government/news/russia-uk-and-us-expose-global-campaigns-of-malign-activity-by-russian-intelligence-services\r\nPage 2 of 2",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"MITRE"
	],
	"origins": [
		"web"
	],
	"references": [
		"https://www.gov.uk/government/news/russia-uk-and-us-expose-global-campaigns-of-malign-activity-by-russian-intelligence-services"
	],
	"report_names": [
		"russia-uk-and-us-expose-global-campaigns-of-malign-activity-by-russian-intelligence-services"
	],
	"threat_actors": [
		{
			"id": "5d2bd376-fcdc-4c6a-bc2c-17ebbb5b81a4",
			"created_at": "2022-10-25T16:07:23.667223Z",
			"updated_at": "2026-04-10T02:00:04.705778Z",
			"deleted_at": null,
			"main_name": "GCHQ",
			"aliases": [
				"Government Communications Headquarters",
				"Operation Socialist"
			],
			"source_name": "ETDA:GCHQ",
			"tools": [
				"Prax",
				"Regin",
				"WarriorPride"
			],
			"source_id": "ETDA",
			"reports": null
		}
	],
	"ts_created_at": 1775438945,
	"ts_updated_at": 1775826761,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/d69d466186e607dd236595826bac22223ee88d34.pdf",
		"text": "https://archive.orkl.eu/d69d466186e607dd236595826bac22223ee88d34.txt",
		"img": "https://archive.orkl.eu/d69d466186e607dd236595826bac22223ee88d34.jpg"
	}
}