Cyber Threat Report: 'APT29 Uses WINELOADER to Target German Political Parties'
Report Author | Mandiant |
---|---|
Publication Date | 2024-03-22 |
Original Reporting | Source |
Attributed to Nation | Russia |
Related Intrusion Sets | APT29 |
Related Threat Actors | SVR - Russian Foreign Intelligence Service |
This blog post by Mandiant describes activity by APT29, linked to Russia's SVR, which targeted German political parties with a new backdoor: WINELOADER. This marks a shift from the group's usual diplomatic targets, indicating an interest in political intelligence. According to the post, victims received phishing emails with a CDU-themed lure, leading to a malicious ZIP file containing the ROOTSAW dropper. The blog includes a technical annex with MITRE ATT&CK techniques and details on WINELOADER's features and functions.
Cyber Threat Graph Context
Explore how this report relates to the wider threat graph