This website requires JavaScript.
Lineto.com

Atomgrad

Atomgrad
Regular / 15px
Social Engineering Exercise
Regular / 28px

Espi­on­age groups increas­ingly use cloud-based ser­vices and open source tools to create their infra­struc­ture for gath­er­ing data and cyber­at­tacks, attempt­ing to hide their activ­it­ies in the massive quant­ity of ser­vices and resources used by legit­im­ate organ­iz­a­tions. Microsoft sus­pen­ded 18 Azure Active Dir­ect­ory “applic­a­tions” that the com­pany iden­ti­fied as a com­pon­ent of a Chinese espi­on­age group’s com­mand-and-con­trol chan­nel. Dubbed GADO­LI­NIUM by Micro­soft, the cyber­at­tack group has adop­ted a com­bin­a­tion of cloud infra­struc­ture, which can be quickly recon­sti­t­uted in the event of a take­down, and open source tools, which can help attack­ers’ actions blend into more legit­im­ate activ­ity. The group is not the only state-sponsored group to increas­ingly employ cloud infra­struc­ture and open source tools, accord­ing to Microsoft Threat Intel­li­gence Center (MSTIC). “MSTIC has noticed a slow trend of sev­eral nation-state activ­ity groups migrat­ing to open source tools in recent years ... an attempt to make dis­cov­ery and attri­bu­tion more dif­fi­cult,” Microsoft stated in a blog post. “The other added bene­fit to using open-source types of kits is that the devel­op­ment and new fea­ture cre­ation is done and cre­ated by someone else at no cost.” GAD­OLINIUM — also known as APT40, Kryp­to­nite Panda, and Leviathan — has focused on steal­ing mari­time inform­a­tion and asso­ci­ated research from uni­ver­sit­ies to advance China’s expan­sion of its navy, accord­ing to an ana­lysis by cyber­se­cur­ity ser­vices firm Fir­eEye. While the espi­on­age group has toyed with cloud infra­struc­ture since 2016, the use of open source tools has only happened in the past two years, Microsoft said in its own ana­lysis. By using com­mod­ity ser­vices and tools, the attack­ers not only blend into legit­im­ate activ­ity more com­pletely but also become harder to iden­tity as a spe­cific group, says Dennis Wilson, global dir­ector of Spider­Labs at Trust­wave, a secur­ity ser­vices firm. A soph­ist­ic­ated attacker becomes a lot harder to identify when they use open source tools and read­ily avail­able cloud assets to per­form their attacks,” he says, adding that “if 20 or 30 dif­fer­ent groups are using the same mal­ware and the same tech­niques, it becomes much harder to tell them apart by their tools and tac­tics.” Gad­olinium is not the only espi­on­age group to use common tools to attempt to escape detec­tion. Sev­eral secur­ity firms have noted that attack­ers are increas­ingly “living off the land” by using admin­is­trat

Regular / 15px
DDOS
About

Specimen PDF

LL Atomgrad

Stephan Müller based his stencil font, released as FF Chernobyl in 1998, on four Cyrillic letters he had noticed on a newspaper photograph taken at the Chernobyl power plant during a site inspection in 1991, five years after the disaster. The photographer, Igor Kostin, had become known as the first to document the nuclear accident, returning to the site several times in the following years. In this particular picture, the four letters ЧАЭС were seen stencilled on a basement wall, marking the official name of the power plant.

A rich variety of stencilled type is commonly found in the context of industrial design and commercial communication from the Soviet era, as it was easily created by hand and inexpensive to produce. Intrigued by the distinctive letter-shapes born out of the atmosphere of Cold War secrecy and apocalyptic catastrophe, Stephan derived a full Latin alphabet in upper and lower case from the minimal Cyrillic sample.

In 2020, the Ukrainian type designer Yevgeniy Anfalov, born in Kyiv in 1986, the very year of the Chernobyl accident, found himself captivated by Stephan's typeface. He proposed to create a Cyrillic counterpart, thus administering a dialectical homecoming of sorts for the four letters from Chernobyl. In the course of the project, the Latin shapes were entirely redrawn, and the Ukrainian designer Viktoriya Grabowska further contributed to the Cyrillic part with additional refinements.

Finally, Luca Pellegrini brought the project to conclusion with his detailed formal revision and by completing the extensive character set.

Stephan Müller

(*1965) co-founded Lineto with Cornel Windlin and designed LL Office (1999), LL Freundschaft (2001), LL Valentine (2002) and LL Excellent (2004) among others. Since 2011, he has been professor for type design at the Academy of Fine Arts Leipzig. In 2017, he established Forgotten Shapes, a specialist publishing venture dedicated to the digital preservation of abandonded historical typefaces, such as his Gerstner Programm (2008) and Normal Grotesk (2019). Stephan oversaw the reappraisal and expansion of his FF Chernobyl font, now called LL Atomgrad.

Yevgeniy Anfalov

(*1986) moved from Kyiv (Ukraine) to Germany in 2003. He graduated from the Hannover University of Applied Sciences and Arts and completed the MA Art Direction at ECAL in 2017. The award-winning LL Heymland (2020) was his first typeface for Lineto. In 2021, he launched Kyiv Type Foundry which offers a contemporary perspective on the Russian and Ukrainian type heritage.

Luca Pellegrini

(*1989) holds an MA in Type Design from ECAL (2019). His 2016 BA project from SUPSI on Xanti Schawinsky yielded a typeface which was later released as part of Adobe’s ‘Hidden Treasures of Bauhaus’. Luca joined Lineto in 2019 and has since designed the soon-to-be-published LL Unica77 Condensed, LL Unica77 VIP and LL Unica77 Mono families, along with an extensive symbol set for the Unica77 families. He also designed LL Rephlex (2021), and is currently working on a digital reformulation of Schawinsky’s typewriter font used in the Olivetti model ‘Studio 42’.

Credits

Designed by Stephan Müller (1998), Yevgeniy Anfalov (2020) and Luca Pellegrini (2021). Originally released by FontFont in 1998 as FF Chernobyl. Font engineering and mastering by Alphabet, Berlin.