Microsoft
The group, also called APT28, has been linked to the Russian government, Microsoft said in a blog post.
At least 16 national and international sporting and anti-doping organizations across three continents were targeted in the attacks which began on Sept. 16, according to the company.
The company said some of these attacks had been successful, but the majority had not. Microsoft has notified all customers targeted in these attacks.
Strontium, one of the world's oldest cyber espionage groups, has also been called Sofancy and Pawn Storm by a range of security firms and government officials. Security firm CrowdStrike has said the group may be associated with the Russian military intelligence agency GRU.
Microsoft said Strontium reportedly released medical records and emails taken from sporting organizations and anti-doping officials in 2016 and 2018, resulting in an indictment in a federal court in the United States in 2018.
The software giant added that the methods used in the most recent attacks were similar to those used by Strontium to target governments, militaries, think-tanks, law firms, human rights organizations, financial firms and universities around the world.
Strontium's methods include spear-phishing, password spray, exploiting internet-connected devices and the use of both open-source and custom malware, it added.
Microsoft has in the past taken legal steps o prevent Strontium from using fake Microsoft internet domains to execute its attacks.
By August last year, Microsoft had shut down 84 fake websites in 12 court-approved actions over the past two years.
Microsoft said at the time that hackers linked to Russia's government sought to launch cyber attacks on US political groups.
© Thomson Reuters 2019
For the latest tech news and reviews, follow Gadgets 360 on X, Facebook, WhatsApp, Threads and Google News. For the latest videos on gadgets and tech, subscribe to our YouTube channel. If you want to know everything about top influencers, follow our in-house Who'sThat360 on Instagram and YouTube.