Sandworm (hacker group)

Sandworm
Formationc. 2004–2007[1]
TypeAdvanced persistent threat
PurposeCyberespionage, cyberwarfare
Headquarters22 Kirova Street
Khimki, Russia
Region
Russia
MethodsZero-days, spearphishing, malware
Official language
Russian
Parent organization
GRU
AffiliationsFancy Bear
Formerly called
Voodoo Bear [1]
Iron Viking [2]
Telebots [2]

Sandworm is an advanced persistent threat operated by Military Unit 74455, a cyberwarfare unit of the GRU, Russia's military intelligence service.[3] Other names for the group, given by cybersecurity researchers, include APT44,[4] Telebots, Voodoo Bear, IRIDIUM, Seashell Blizzard,[5] and Iron Viking.[6][7][8]

The team is believed to be behind the December 2015 Ukraine power grid cyberattack,[9][10][11] the 2017 cyberattacks on Ukraine using the NotPetya malware,[12] various interference efforts in the 2017 French presidential election,[6] and the cyberattack on the 2018 Winter Olympics opening ceremony.[13][14] Then-United States Attorney for the Western District of Pennsylvania Scott Brady described the group's cyber campaign as "representing the most destructive and costly cyber-attacks in history."[6]

History

2014

On 3 September 2014 iSIGHT Partners (now Mandiant) discovered a spear-phishing campaign exploiting a zero-day vulnerability via weaponized Microsoft Office documents. The vulnerability, dubbed CVE-2014-4114, affected all versions of Windows from Vista to 8.1 and allowed attackers to execute arbitrary code on a target machine. Researchers were able to attribute the attack to the Sandworm group and observed that the Ukrainian government was one target of the campaign. Notably, this attack coincided with a NATO summit on Ukraine in Wales.[15]

2015 Ukraine power grid hack

On 23 December 2015, hackers launched a coordinated cyberattack against 3 energy companies in Ukraine and succeeded in temporarily disrupting the supply of electricity to about 230,000 Ukrainians for 1-6 hours.

In January, iSight Partners released a report linking the attack to Sandworm based on the usage of BlackEnergy 3. [16]

2016 Ukraine power grid hack

On 17 December 2016, a year after the previous power grid attack, hackers again disrupted the Ukrainian power grid with a cyber attack. About one fifth of Kyiv lost power for an hour. While the outage was ultimately short, a report released 3 years after the attack by security firm Dragos outlines a theory that the malware, known as Industroyer or CRASHOVERRIDE, was meant to destroy physical electrical equipment. By exploiting a known vulnerability in the protective relays, the malware may have been designed to obfuscate any safety issues such that when engineers worked to restore power, an overload of current would be sent to destroy transformers or power lines. Such destruction would have potentially harmed utility workers as well as led to a much longer power outage if it had succeeded. [17]

2018 Winter Olympics

On 9 February 2018 during the opening ceremony of the Winter Olympics in Pyeongchang, South Korea hackers launched a cyberattack and successfully disrupted IT infrastructure including WiFi, televisions around the Pyeongchang Olympic Stadium showing the ceremony, RFID-based security gates, and the official Olympics app which was used for digital ticketing. Staff were able to restore most critical functions before the opening ceremony was over, but the entire network had to be rebuilt from scratch. Wiper malware had wormed through every domain controller and rendered them inoperable.[13]

3 days later Cisco Talos published a report dubbing the malware "Olympic Destroyer." The report listed similarities in the malware's propagation techniques to the "BadRabbit" and "Nyetya" malware strains and stated disruption of the games as the attack's objective.[18]

Attribution of the Olympic Destroyer malware proved difficult as it appeared the author(s) had included code samples belonging to multiple threat actors as false flags. Intezer published a report on 12 February showing code similarities to samples attributed to 3 Chinese threat actors while a follow-up Talos report noted a "weak" clue pointing to another wiper created by a spinoff of the Lazarus Group, a North Korean APT.[19][20]

The Kaspersky GReAT team on 8 March published 2 blog posts discussing the current industry theories and their own original research. In the technical article Kaspersky, a Russian company, showed in detail how they discovered file headers pointing to Lazarus Group were forged but stopped short of attributing the Olympic Destroyer malware to any non-North Korean group.[21][22]

US indictment (2020)

FBI wanted poster listing 6 Russian military officers indicted for cyber crimes.

On 19 October 2020, a US-based grand jury released an indictment charging six alleged Unit 74455 officers with cybercrimes.[23][24][25] The officers, Yuriy Sergeyevich Andrienko, Sergey Vladimirovich Detistov, Pavel Valeryevich Frolov, Anatoliy Sergeyevich Kovalev, Artem Valeryevich Ochichenko, and Petr Nikolayevich Pliskin, were all individually charged with conspiracy to conduct computer fraud and abuse, conspiracy to commit wire fraud, wire fraud, damaging protected computers, and aggravated identity theft. Five of the six were accused of overtly developing hacking tools, while Ochichenko was accused of participating in spearphishing attacks against the 2018 Winter Olympics and conducting technical reconnaissance on and attempting to hack the official domain of the Parliament of Georgia.[6][a]

Concurrent with the US indictment announcement, the UK's National Cyber Security Centre (NCSC) published a report which publicly associated Sandworm with the 2018 Winter Olympics attack.[2]

Exim exploitation (2020)

On 28 May 2020 the National Security Agency published a cybersecurity advisory warning that the Sandworm group was actively exploiting a remote code execution vulnerability (referred to as CVE-2019-10149) in Exim[32] to gain full control of mail servers.[33] At the time the advisory was published, an updated version of Exim had been available for a year and the NSA urged administrators to patch their mail servers.[citation needed]

In February 2022, Sandworm allegedly released the Cyclops Blink as malware. The malware is similar to VPNFilter.[34] The malware allows a botnet to be constructed, and affects Asus routers and WatchGuard Firebox and XTM appliances. CISA issued a warning about this malware.[35]

War crimes request (March 2022)

In late March 2022, human rights investigators and lawyers in the UC Berkeley School of Law sent a formal request to the Prosecutor of the International Criminal Court in The Hague.[36] They urged the International Criminal Court to consider war crimes charges against Russian hackers for cyberattacks against Ukraine.[36] Sandworm was specifically named in relation to December 2015 attacks on electrical utilities in western Ukraine and 2016 attacks on utilities in Kyiv in 2016.[36]

Ukrainian power grid attack (April 2022)

In April 2022, Sandworm attempted a power blackout in Ukraine.[37] It is said to be the first attack in five years to use an Industroyer malware variant called Industroyer2.[38]

SwiftSlicer (January 2023)

On 25 January 2023, ESET attributed an Active Directory vulnerability wiper to Sandworm.[39]

Infamous Chisel (August 2023)

On 31 August 2023, the cybersecurity agencies of the US, UK, Canada, Australia, and New Zealand (collectively known as Five Eyes) jointly published a report on a new malware campaign and attributed it to Sandworm. The malware, dubbed "Infamous Chisel", targeted Android devices used by the Ukrainian military. After initial infection, the malware establishes persistent access then periodically collects and exfiltrates data from the compromised device. Collected information includes:

  • Device system information
  • Application data from many types of apps:
    • chat - Skype, Telegram, WhatsApp, Signal, Viber, Discord
    • browser - Opera, Brave, Firefox, Chrome
    • two-factor authentication (2FA) - Google Authenticator
    • VPN - OpenVPN, VPN Proxy Master
    • file sync - OneDrive, Dropbox
    • finance - Binance, PayPal, Trust Wallet, Google Wallet
  • Applications specific to the Ukrainian military

The malware also periodically collects open ports and banners of services running on other hosts on the local network. Additionally, an SSH server is created and configured to run as a Tor hidden service. An attacker could then connect remotely to the infected device without revealing their true IP address.[40]

Name

The name "Sandworm" was dubbed by researchers at iSight Partners (now Mandiant) due to references in the malware source code to Frank Herbert's novel Dune.[41]

In 2024, given the active and persistent threats Sandworm posed to governments and critical infrastructure operators globally, Mandiant "graduated" Sandworm into an APT group, dubbing it APT44.[4]

See also

Notes

  1. ^ The United States Department of State Diplomatic Security Service: Rewards for Justice is offering a reward of up to $10 million for information leading to the identification or location of the GRU officers Petr Nikolayevich Pliskin (Russian: Петр Николаевич Плискин), Artem Valeryevich Ochichenko (Russian: Артем Валерьевич Очиченко), Anatoliy Sergeyevich Kovalev (Russian: Анатолий Сергеевич Ковалев), Pavel Valeryevich Frolov (Russian: Павел Валерьевич Фролов), Sergey Vladimirovich Detistov (Russian: Сергей Владимирович Детистов) and Yuriy Sergeyevich Andrienko (Russian: Юрий Сергеевич Андриенко) of the Main Center for Technologies Special Forces of the GRU Russian Ground Forces (Unit 74455) which is associated with "Sandworm Team," Telebots," "Voodoo Bear," and "Iron Viking."[26][27][28][29][30][31]

References

  1. ^ Adam Meyers (29 January 2018). "VOODOO BEAR | Threat Actor Profile | CrowdStrike". Crowdstrike.
  2. ^ a b c "UK exposes series of Russian cyber attacks against Olympic and Paralympic Games". National Cyber Security Centre. 19 October 2020.
  3. ^ Greenberg, Andy (2019). Sandworm: a new era of cyberwar and the hunt for the Kremlin's most dangerous hackers. Knopf Doubleday. ISBN 978-0-385-54441-2.
  4. ^ a b "APT44: Unearthing Sandworm" (PDF). Retrieved 12 September 2024.
  5. ^ "How Microsoft names threat actors". Microsoft. Retrieved 21 January 2024.
  6. ^ a b c d "Six Russian GRU Officers Charged in Connection with Worldwide Deployment of Destructive Malware and Other Disruptive Actions in Cyberspace". DOJ Office of Public Affairs. United States Department of Justice. 19 October 2020. Retrieved 23 July 2021.
  7. ^ Timberg, Craig; Nakashima, Ellen; Munzinger, Hannes; Tanriverdi, Hakan (30 March 2023). "Secret trove offers rare look into Russian cyberwar ambitions". The Washington Post. Retrieved 31 March 2023.
  8. ^ "Russia's FSB malign activity: factsheet: Cyber operations and the Russian intelligence services". National Cyber Security Centre (NCSC) and Foreign, Commonwealth and Development Office. 7 December 2023. Archived from the original on 8 December 2023. Retrieved 18 October 2024.
  9. ^ "Hackers shut down Ukraine power grid". www.ft.com. 5 January 2016. Retrieved 28 October 2020.
  10. ^ Volz, Dustin (25 February 2016). "U.S. government concludes cyber attack caused Ukraine power outage". Reuters. Retrieved 28 October 2020.
  11. ^ Hern, Alex (7 January 2016). "Ukrainian blackout caused by hackers that attacked media company, researchers say". The Guardian. ISSN 0261-3077. Retrieved 28 October 2020.
  12. ^ "The Untold Story of NotPetya, the Most Devastating Cyberattack in History". Wired. ISSN 1059-1028. Retrieved 28 October 2020.
  13. ^ a b Greenberg, Andy. "Inside Olympic Destroyer, the Most Deceptive Hack in History". Wired. ISSN 1059-1028. Retrieved 28 October 2020.
  14. ^ Andrew S. Bowen (24 November 2020). Russian Military Intelligence: Background and Issues for Congress (PDF) (Report). Congressional Research Service. p. 16. Retrieved 21 July 2021.
  15. ^ Stephen Ward (14 October 2014). "iSIGHT discovers zero-day vulnerability CVE-2014-4114 used in Russian cyber-espionage campaign". Archived from the original on 14 October 2014. Retrieved 5 November 2023.
  16. ^ Hultquist, John (7 January 2016). "Sandworm Team and the Ukrainian Power Authority Attacks". iSIGHT Partners. Archived from the original on 29 January 2016.
  17. ^ Joe Slowik (15 August 2019). "CRASHOVERRIDE: Reassessing the 2016 Ukraine Electric Power Event as a Protection-Focused Attack" (PDF). Dragos Inc.
  18. ^ Warren Mercer (12 February 2018). "Olympic Destroyer Takes Aim At Winter Olympics". Cisco Talos.
  19. ^ Rascagneres, Paul; Lee, Martin (26 February 2018). "Who Wasn't Responsible for Olympic Destroyer?". Cisco Talos.
  20. ^ Jay Rosenberg (12 February 2018). "2018 Winter Cyber Olympics: Code Similarities with Cyber Attacks in Pyeongchang". Archived from the original on 30 June 2020.
  21. ^ Kaspersky GReAT Team (8 March 2018). "OlympicDestroyer is here to trick the industry". Archived from the original on 31 January 2019.
  22. ^ Kaspersky GReAT Team (8 March 2018). "The devil's in the Rich header". Archived from the original on 22 February 2019.
  23. ^ Cimpanu, Catalin. "US charges Russian hackers behind NotPetya, KillDisk, OlympicDestroyer attacks". ZDNet. Retrieved 28 October 2020.
  24. ^ "Russian cyber-attack spree shows what unrestrained internet warfare looks like". The Guardian. 19 October 2020. Retrieved 28 October 2020.
  25. ^ "US Indicts Sandworm, Russia's Most Destructive Cyberwar Unit". Wired. ISSN 1059-1028. Retrieved 28 October 2020.
  26. ^ "Petr Nikolayevich Pliskin". United States Department of State Diplomatic Security Service: Rewards for Justice. Archived from the original on 9 October 2024. Retrieved 9 October 2024.
  27. ^ "Artem Valeryevich Ochichenko". United States Department of State Diplomatic Security Service: Rewards for Justice. Archived from the original on 9 October 2024. Retrieved 9 October 2024.
  28. ^ "Anatoliy Sergeyevich Kovalev". United States Department of State Diplomatic Security Service: Rewards for Justice. Archived from the original on 9 October 2024. Retrieved 9 October 2024.
  29. ^ "Pavel Valeryevich Frolov". United States Department of State Diplomatic Security Service: Rewards for Justice. Archived from the original on 9 October 2024. Retrieved 9 October 2024.
  30. ^ "Sergey Vladimirovich Detistov". United States Department of State Diplomatic Security Service: Rewards for Justice. Archived from the original on 9 October 2024. Retrieved 9 October 2024.
  31. ^ "Yuriy Sergeyevich Andrienko". United States Department of State Diplomatic Security Service: Rewards for Justice. Archived from the original on 9 October 2024. Retrieved 9 October 2024.
  32. ^ Satnam Narang (6 June 2019). "CVE-2019-10149: Critical Remote Command Execution Vulnerability Discovered In Exim". Retrieved 4 November 2023.
  33. ^ "Exim Mail Transfer Agent Actively Exploited by Russian GRU Cyber Actors". National Security Agency. Archived from the original on 24 March 2023.
  34. ^ Hardcastle, Jessica Lyons. "Cyclops Blink malware sets up shop in ASUS routers". www.theregister.com. Retrieved 21 March 2022.
  35. ^ "CISA Adds Eight Known Exploited Vulnerabilities to Catalog | CISA". www.cisa.gov. 11 April 2022. Retrieved 13 April 2022.
  36. ^ a b c Greenberg, Andy (12 May 2022). "The Case for War Crimes Charges Against Russia's Sandworm Hackers". Wired. Retrieved 7 July 2022.
  37. ^ Greenberg, Andy. "Russia's Sandworm Hackers Attempted a Third Blackout in Ukraine". Wired. ISSN 1059-1028. Retrieved 13 April 2022.
  38. ^ "Industroyer2: Industroyer reloaded". www.welivesecurity.com. Retrieved 13 April 2022.
  39. ^ Živé.sk (27 January 2023). "Na Ukrajine maže počítače nový trójsky kôň. Hackeri majú byť prepojení na Rusko". Živé.sk (in Slovak). Retrieved 27 January 2023.
  40. ^ "Infamous Chisel Malware Analysis Report". Cybersecurity & Infrastructure Security Agency. 31 August 2023. Retrieved 6 November 2023.
  41. ^ Kim Zetter (14 October 2014). "Russian 'Sandworm' Hack Has Been Spying on Foreign Governments for Years". Wired. Archived from the original on 14 October 2014.

Further reading

Read other articles:

العلاقات السريلانكية الغيانية سريلانكا غيانا   سريلانكا   غيانا تعديل مصدري - تعديل   العلاقات السريلانكية الغيانية هي العلاقات الثنائية التي تجمع بين سريلانكا وغيانا.[1][2][3][4][5] مقارنة بين البلدين هذه مقارنة عامة ومرجعية للدولتين: وجه الم...

 

Japanese volleyball club Pioneer Red WingsFounded1979Dissolved2014GroundYamagata Prefectural General Sports Park Gymnasium, Tendo, Yamagata and Kawagoe, Saitama Japan.Manager &Head Coach Mitsuo Shimazu Tsutomu TozawaLeagueV.Premier League2013-148th place (V.Premier League)WebsiteClub home pageUniforms Home Away Pioneer Red Wings was a women's volleyball team based in Tendo city, Yamagata, Japan. It played in V.Premier League. The club was founded in 1979. The owner of the team is Tohoku P...

 

Constituency of Bangladesh's Jatiya Sangsad Brahmanbaria-2Constituencyfor the Jatiya SangsadDistrictBrahmanbaria DistrictDivisionChittagong DivisionElectorate292,593 (2014)[1]Current constituencyCreated1984Party  IndependentMember(s)Md. Shahjahan Alam Shaju Brahmanbaria-2 is a constituency represented in the Jatiya Sangsad (National Parliament) of Bangladesh since 2024 by Md. Mainuddin of the Awami League.[2] Boundaries The constituency encompasses Sarail Upazila and...

Pour les articles homonymes, voir Anonymous. AnonymousEmblème des Anonymou We are Anonymous. We are Legion. We do not forgive. We do not forget. Expect us.(version en français : « Nous sommes Anonymous. Nous sommes Légion. Nous ne pardonnons pas. Nous n’oublions pas. Redoutez-nous. »[N 1],[1]HistoireFondation 2003CadreZone d'activité MondeType Communauté virtuelleCybermilitantismeCybermanifestationHacktivismeLangue InternationalOrganisationMembres Groupe d'affinité d...

 

Men's basketball of Santa Clara University Santa Clara Broncos 2023–24 Santa Clara Broncos men's basketball team UniversitySanta Clara UniversityFirst season1904All-time record1,418-1,019 (.582)Head coachHerb Sendek (8th season)ConferenceWest Coast ConferenceLocationSanta Clara, CaliforniaArenaLeavey Center (Capacity: 4,500)NicknameBroncosColorsMaroon and white[1]   Uniforms Home Away Alternate NCAA tournament Final Four1952NCAA tournament Elite Eight1952, 1...

 

USS Barnegat (AVP-10), lead ship of the Barnegat-class small seaplane tenders, in Puget Sound on 14 October 1941 Class overview NameBarnegat Builders Puget Sound Navy Yard, Bremerton, Washington (4 ships) Boston Navy Yard, Boston, Massachusetts (2 ships) Lake Washington Shipyard, Houghton, Washington (24 ships) Puget Sound Navy Yard and Lake Washington Shipyard (1 ship) Associated Shipbuilders, Inc.,[1] Seattle, Washington (4 ships) Operators  United States Navy  United Sta...

Map of Iran This is a list of airports in Iran, grouped by type and sorted by location. As of 2013, Iran had 319 airports which made Iran the 22nd country in the world with most airports.[1] Iran, officially the Islamic Republic of Iran, is a country in Central Eurasia and/or Western Asia. It is bordered on the north by Armenia, Azerbaijan, the Caspian Sea and Turkmenistan, on the east by Afghanistan and Pakistan, on the south by the Gulf of Oman and the Persian Gulf, on the west by ...

 

Geoff Stults nel 2018 Geoffrey Manton Stults (Detroit, 15 dicembre 1977) è un attore ed ex giocatore di football americano statunitense. Indice 1 Biografia 2 Football americano 3 Filmografia parziale 3.1 Cinema 3.2 Televisione 4 Doppiatori italiani 5 Altri progetti 6 Collegamenti esterni Biografia Cresciuto in Colorado, si trasferisce a Los Angeles e comincia a recitare a teatro mentre studia allo Whittier College. Giocatore di football professionista, ha giocato come ricevitore nei Klostern...

 

この項目には、一部のコンピュータや閲覧ソフトで表示できない文字が含まれています(詳細)。 数字の大字(だいじ)は、漢数字の一種。通常用いる単純な字形の漢数字(小字)の代わりに同じ音の別の漢字を用いるものである。 概要 壱万円日本銀行券(「壱」が大字) 弐千円日本銀行券(「弐」が大字) 漢数字には「一」「二」「三」と続く小字と、「壱」「�...

  此條目介紹的是2012年在上海创办的一家民营新闻媒体。关于1946年在上海创刊的一份周刊,请见「观察 (杂志)」。关于2013年在上海创办、原名「上海觀察」的网络应用程序,请见「上觀新聞」。关于“观察者”的其他含义,请见「观察者」。 此條目過於依赖第一手来源。 (2021年1月17日)请補充第二手及第三手來源,以改善这篇条目。 观察者网观察者网首页在2019年7月...

 

В статье есть список источников, но не хватает сносок. Без сносок сложно определить, из какого источника взято каждое отдельное утверждение. Вы можете улучшить статью, проставив сноски на источники, подтверждающие информацию. Сведения без сносок могут быть удалены. (26 се�...

 

费迪南德·马科斯Ferdinand Marcos 菲律賓第10任總統任期1965年12月30日—1986年2月25日副总统費爾南多·洛佩斯(1965-1972)阿圖羅·托倫蒂諾前任奧斯達多·馬卡帕加爾继任柯拉蓉·阿基诺 菲律賓第4任總理任期1978年6月12日—1981年6月30日前任佩德羅·帕特諾(1899年)继任塞薩爾·維拉塔 个人资料出生1917年9月11日 美屬菲律賓北伊羅戈省薩拉特(英语:Sarrat)逝世1989年9月28日(...

2016年美國總統選舉 ← 2012 2016年11月8日 2020 → 538個選舉人團席位獲勝需270票民意調查投票率55.7%[1][2] ▲ 0.8 %   获提名人 唐納·川普 希拉莉·克林頓 政党 共和黨 民主党 家鄉州 紐約州 紐約州 竞选搭档 迈克·彭斯 蒂姆·凱恩 选举人票 304[3][4][註 1] 227[5] 胜出州/省 30 + 緬-2 20 + DC 民選得票 62,984,828[6] 65,853,514[6]...

 

Chinmayi has the most wins (3). The Tamil Filmfare Best Female Playback Award is given by Filmfare magazine as part of its annual Filmfare Awards for Tamil films. The first Tamil award was given in 2006. However, since 1997 till 2005, a common award for playback was available for both male and female singers of all the four South Indian languages. Superlative Artist Record Most wins Chinmayi 3 Most nominations Shreya Ghoshal 7 Most nominations without a win Saindhavi 4 Most consecutive nomin...

 

Former religious house in Herefordshire This article needs additional citations for verification. Please help improve this article by adding citations to reliable sources. Unsourced material may be challenged and removed.Find sources: Wigmore Abbey – news · newspapers · books · scholar · JSTOR (June 2013) (Learn how and when to remove this message) Remains of Wigmore Abbey. Wigmore Abbey was an abbey of Canons Regular with a grange, from 1179 to 1530, ...

Part of a series onPersecutionsof the Catholic Church Overview Historical persecution of Christians Catholic Church persecutions 1939–1958 Eradication of the Church under Stalinism Eastern Catholic persecutions Persecution of Christians in the modern era Roman Empire Persecution of Christians in the Roman Empire Diocletianic Persecution Neo-Persian Empire Sasanian conquest of Jerusalem Byzantine Empire Massacre of the Latins Muslim world Muslim conquests Conversion of non-Islamic places of ...

 

Universitetet i OsloUniversitetet i Oslo(Det Kongelige Frederiks Universitet) Latin: Universitas Osloensis(Universitas Regia Fredericiana)Grundat1811ÄgandeformStatligtLärarkår3,212 (2010)Admin. personal2,598 (2010)Studerande27,628 (2010)Säte Oslo, NorgeMedlemskapEUAWebbplatswww.uio.no Universitetet i Oslo (latin: Universitas Osloensis) är det äldsta, näst största och mest framstående universitet i Norge.[1] Det grundades 1811 som Det Kgl. Frederiks Universitet (latin Universitas Regi...

 

Swimming while inhaling through a snorkel A snorkeler amid corals on a coral reef near Fiji Snorkeling (British and Commonwealth English spelling: snorkelling) is the practice of swimming face down on or through a body of water while breathing the ambient air through a shaped tube called a snorkel, usually with swimming goggles or a diving mask, and swimfins. In cooler waters, a wetsuit may also be worn. The snorkel may be an independent item or integrated with the mask. The use of this equip...

新花月(しんかげつ)は、かつて大阪府大阪市浪速区の歓楽街「新世界」のジャンジャン町(ジャンジャン横丁/南陽通り商店街)にあった劇場である。 主に松竹芸能系の若手の登竜門的な存在の場であったが、吉本興業など他のプロダクションに現在所属するベテラン芸人の中にも、初舞台を踏んだ者は少なくない。 概要 1980年代の楽屋風景。中央は西川ヒノデ。 「...

 

ガラパゴスゾウガメ ゾウガメとは、大型のリクガメ、特に甲長1mを超すリクガメ。 肉食獣による捕食の危険に乏しいインド洋や太平洋などの島嶼において、互いに異なるリクガメから、独立に大型化の進化をたどったものが多い。 人類の大航海時代の到来と共に船員らの食料として乱獲され(動きが鈍い上、捕獲後に餌を与えなくても長期間生存し新鮮な肉が得られた...