APT29
Actor Type | Nation State |
---|---|
Attributed to Nation | Russia |
Directly Linked Intrusion Sets | Cozy Bear , Midnight Blizzard , The Dukes , NOBELIUM |
Associated Threat Actor | SVR - Russian Foreign Intelligence Service |
Associated MITRE ATT&CK Group | APT29 (G0016) |
APT29 is a Russian cyber intrusion set. They have been linked to attacks including the SolarWinds compromise and an attack against the US Democratic National Committee in 2015.
Cyber Threat Graph Context
Explore how this Intrusion Set relates to the wider threat graph
APT29 Threat Reports
SVR cyber actors adapt tactics for initial cloud access
This advisory from the UK's National Cyber Security Centre (NCSC) outlines tactics, techniques and procedures (TTPs) used by the cyber actors ...
APT29 Uses WINELOADER to Target German Political Parties
This blog post by Mandiant describes activity by APT29, linked to Russia's SVR, which targeted German political parties with a new backdoor: ...
Russian Foreign Intelligence Service (SVR) Exploiting JetBrains TeamCity CVE Globally
This Cybersecurity Advisory by CISA with US and international partners outlines activity which they link to APT29 (also known as The Dukes, Cozy ...
Midnight Blizzard: Guidance for responders on nation-state attack
Following a compromise of Microsoft corporate systems by Midnight Blizzard which was detected on 12th January 2024, this blog post outlines ...
References
www.cisa.gov
https://www.cisa.gov/news-events/cybersecurity-advisories/aa22-110awww.cisa.gov
https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-347alearn.microsoft.com
https://learn.microsoft.com/en-gb/microsoft-365/security/intelligence/microsoft-threat-actor-namingblog.f-secure.com
https://blog.f-secure.com/wp-content/uploads/2020/03/F-Secure_Dukes_Whitepaper.pdfwww.mandiant.com
https://www.mandiant.com/resources/blog/apt29-wineloader-german-political-partieswww.microsoft.com
https://www.microsoft.com/en-us/security/blog/2024/01/25/midnight-blizzard-guidance-for-responders-on-nation-state-attack/www.mandiant.com
https://www.mandiant.com/sites/default/files/2021-09/rpt-apt29-hammertoss-1-1.pdfattack.mitre.org
https://attack.mitre.org/groups/G0016/www.ncsc.gov.uk
https://www.ncsc.gov.uk/news/svr-cyber-actors-adapt-tactics-for-initial-cloud-accessMITRE ATT&CK Techniques
MITRE ATT&CK techniques observed in use by this intrusion set.