Cyber Threat Report: 'APT29 Uses WINELOADER to Target German Political Parties'

Report Author Mandiant
Publication Date 2024-03-22
Original Reporting Source
Attributed to Nation Russia
Related Intrusion Sets APT29
Related Threat Actors SVR - Russian Foreign Intelligence Service

This blog post by Mandiant describes activity by APT29, linked to Russia's SVR, which targeted German political parties with a new backdoor: WINELOADER. This marks a shift from the group's usual diplomatic targets, indicating an interest in political intelligence. According to the post, victims received phishing emails with a CDU-themed lure, leading to a malicious ZIP file containing the ROOTSAW dropper. The blog includes a technical annex with MITRE ATT&CK techniques and details on WINELOADER's features and functions.

Cyber Threat Graph Context

Explore how this report relates to the wider threat graph

Mitigations to defend against the techniques in this report

Identified MITRE ATT&CK Techniques