APT29 is a threat actor (APT) active since 2008 and considered to be a product of the Russian government’s Foreign Intelligence Service (SVR).
APT29 is an advanced persistent threat actor (APT) that has been active since 2008 and is considered a product of the Russian government's Foreign Intelligence Service (SVR). Few threat actors show the technical discipline and sophistication of APT29, especially in its ability to adapt to defensive IT security tactics, penetrate well-defended networks, and deploy malware with anti-forensic capabilities.
APT29's primary targets are governments and government subcontractors, political organizations, research firms, and critical industries such as energy, healthcare, education, finance, and technology in the US and Europe. APT29 primarily intends to disrupt national security, impact critical infrastructure, and cause political interference.
APT29 is a well-resourced, highly dedicated, and structured cyberespionage operation that we believe has been operating for the Russian Federation since at least 2008 to collect intelligence in support of foreign and security policy decision-making,' according to a 2015 assessment from F-Secure. Cozy Bear has an unusual amount of faith in its ability to keep effectively compromising its targets, as well as in its ability to operate without being detected.
APT29 is also known as CozyBear, The Dukes, Group 100, CozyDuke, EuroAPT, CozyCar, Cozer, Office Monkey, YTTRIUM, Iron Hemlock, Iron Ritual, Cloaked Ursa, Nobelium, Group G0016, UNC2452, Dark Halo, NobleBarron.
2015: APT29 gains initial access to the Pentagon's network via phishing and introduced the "Hammertoss" technique to use dummy Twitter accounts for C2 communication
2016: In a campaign known as "GRIZZLY STEPPE," APT29 breached the Democratic National Committee servers close to the US election via a phishing campaign directing victims to change their passwords using a spoofed website
2019: Compromises three EU National Affairs ministries and a Washington D.C.-based embassy of an EU nation-state
2020: Conducts vulnerability scanning of public-facing IP addresses to compromise COVID-19 vaccine developers in Canada, the US, and the United Kingdom
2020: Distributes SUNBURST malware attacking SolarWinds Orion software to drop a remote access trojan (RAT) that impacted many global organizations
2021: In April 2021, the US and UK governments attributed the SolarWinds Compromise to the SVR; public statements included citations to APT29, Cozy Bear, and The Dukes. Industry reporting also referred to the actors involved in this campaign as UNC2452, NOBELIUM, StellarParticle, Dark Halo, and SolarStorm.
2024: In June of 2024, TeamViewer was compromised.
APT29 and its activities are closely monitored by The Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI), and the National Security Agency (NSA). In April 2021, CISA released a vital advisory on the critical vulnerabilities exploited by APT29.
The vulnerabilities exploited by the APT29 are listed below:
Patch management and other strategies can assist in the defence against APT29 and other similar threats:
CISA, the UK National Cyber Security Centre (NCSC), and other international partners released a joint advisory titled "SVR Cyber Actors Adapt Tactics for Initial Cloud Access." This advisory outlines recent TTPs utilized by APT29 to gain initial access to cloud environments and recommends mitigations for network defenders and organizations.
As organizations shift to cloud-based infrastructure, the SVR has adjusted its tactics, targeting cloud services rather than exploiting on-premises network vulnerabilities for initial access. Also, the NCSC has observed the expansion of APT29's targets, including government, healthcare, energy, aviation, education, law enforcement, and military organizations.
According to the advisory, threat actors have been employing the following TTPs over the last 12 months:
Access via Service and Dormant Accounts:
Cloud-Based Token Authentication:
Enrolling New Devices to the Cloud:
Residential Proxies:
According to CISA, TTPs such as using residential proxies and exploiting system accounts align with those reported by Microsoft as recently as January 2024.
The advisory also warns that once APT29 actors gain initial access, they can deploy advanced post-compromise capabilities like MagicWeb.
Preventing initial access to the cloud environment can effectively combat SVR's attempts, unlike on-premises systems, where more of the network is typically exposed to threat actors. By mitigating the mentioned initial cloud access vectors outlined in the joint advisory, organizations can significantly bolster their defences against this sophisticated threat.
With SOC365, ongoing vigilance ensures that potential security gaps are promptly identified and addressed, strengthening the organization's environment against threats.