Article Details
Scrape Timestamp (UTC): 2024-02-27 10:43:59.835
Source: https://thehackernews.com/2024/02/five-eyes-agencies-expose-apt29s.html
Original Article Text
Click to Toggle View
Five Eyes Agencies Expose APT29's Evolving Cloud Attack Tactics. Cybersecurity and intelligence agencies from the Five Eyes nations have released a joint advisory detailing the evolving tactics of the Russian state-sponsored threat actor known as APT29. The hacking outfit, also known as BlueBravo, Cloaked Ursa, Cozy Bear, Midnight Blizzard (formerly Nobelium), and The Dukes, is assessed to be affiliated with the Foreign Intelligence Service (SVR) of the Russian Federation. Previously attributed to the supply chain compromise of SolarWinds software, the cyber espionage group attracted attention in recent months for targeting Microsoft, Hewlett Packard Enterprise (HPE), and other organizations with an aim to further their strategic objectives. "As organizations continue to modernize their systems and move to cloud-based infrastructure, the SVR has adapted to these changes in the operating environment," according to the security bulletin. These include - "For organizations that have moved to cloud infrastructure, the first line of defense against an actor such as SVR should be to protect against SVR' TTPs for initial access," the agencies said. "Once the SVR gains initial access, the actor is capable of deploying highly sophisticated post compromise capabilities such as MagicWeb." ⚡ Free Risk Assessment from Vanta Generate a gap assessment of your security and compliance posture, discover shadow IT, and more.
Daily Brief Summary
The Five Eyes intelligence alliance has issued a joint advisory about APT29, a Russian state-sponsored cyber threat actor.
APT29, also known as The Dukes or Cozy Bear, is linked with the Russian Foreign Intelligence Service and is known for sophisticated cyber espionage.
The threat group has recently targeted Microsoft, Hewlett Packard Enterprise (HPE), and other entities, capitalizing on the shift to cloud infrastructures.
The advisory underscores the need for robust defenses against APT29's methods of gaining initial access to cloud systems.
Upon breaching a network, APT29 deploys advanced techniques like MagicWeb for maintaining access and control.
The bulletin emphasizes the importance of vigilance as organizations modernize and transition to cloud-based systems, which APT29 is exploiting.