Russian hacker group APT29 is one of the most technically skilled and organized threat actors operating today. It is especially good at adapting to defensive IT security strategies, breaking into well-defended networks, and spreading malware that can’t be found using investigative tools.
APT29’s main targets are political groups, study firms, governments and government contractors, as well as important industries in the US and Europe, like energy, healthcare, education, finance, and technology.
APT29’s main goals are to, well, mess up national security, damage important assets, and get involved in politics. Here’s a quick primer on the hacking group.
This particular group has a lot of nicknames, including:
They have been active since 2008 and are thought to have come from Russia’s Foreign Intelligence Service (SVR), which we’ll explain a bit later in the article.
APT29 first made headlines in 2015 when it accessed the Pentagon’s network through the use of phishing. It uses an approach called the Hammertoss, which involves the utilization of false Twitter accounts for communication with C2 personnel.
As part of a campaign that was referred to as “GRIZZLY STEPPE,” APT29 hacked the servers of the Democratic National Committee in the days leading up to the 2016 election in the US. The hackers used a phishing attempt to get victims to reset their passwords by utilizing a bogus website.
In 2019, the Russian hackers managed to compromise the ministries of several European Union countries, as well as the US-based embassy.
In 2020, the threat actor conducted vulnerability scanning of public-facing IP addresses in order to gain access to the system of vaccine developers working on the COVID-19 virus in Canada, the United States of America, and the United Kingdom.
The year 2020 saw the distribution of the SUNBURST virus. In a series of highly targeted attacks, the group hacked SolarWinds Orion software and dropped a remote access trojan (RAT), harming multiple businesses all over the world, including several government entities.
APT29 is widely believed to be funded and sponsored by the Russian state based on several factors:
However, the group has widened its attacks, targeting multinational businesses with no ties to specific governments, causing widespread concern.
Microsoft announced that the company was one of many targeted organizations that APT29 attempted to hack in late 2023. The full scope of affected organizations is still unknown.
APT29 uses various techniques to gain access and maintain their foothold, including:
Attack methods vary. In general, the APT29 virus uses a backdoor and dropper to exfiltrate data to a C2 server. APT29 droppers and spyware components frequently have similar traits. However, the files’ functionality varies slightly according to the actor’s requirements.
APT29 frequently spearheads phishing targets via emails that link to a website that hosts a ZIP archive. The bundle includes a RAR SFX that instals the malware and displays an empty PDF fake.
The group has also sent out fake Flash videos via email attachments, e.g., ‘Office Monkeys LOL video.zip.’ When opened, it plays a goofy video and then drops an APT29 application that quickly spreads through computers. Many of APT’s components were signed with forged Intel and AMD digital certificates, infecting devices through entire companies. The file then gathers system information before invoking a WMI instance in the “rootsecuritycenter” namespace to identify security products on the system before dropping additional data-gathering malware. The code attempts to circumvent many security systems, including antivirus tools like Kaspersky.
APT29 has been linked to cyberattacks against major organizations like Microsoft and Hewlett-Packard Enterprise (HPE) in late 2023 and early 2024. These attacks targeted corporate email accounts and potentially other sensitive data.
Microsoft’s announcement in 2024 implies the attacks might be more widespread than initially thought, targeting other organizations beyond the disclosed ones. This raises concerns about the group’s potential reach and impact.
The group uses various sophisticated techniques like password spraying, compromising legitimate accounts, and abusing OAuth applications to gain access and maintain footholds within target systems. This makes them difficult to detect and remove.
One of the reasons some believe that the group is funded by the Russian Foreign Intelligence Service is because APT29 seeks to gather sensitive information that is strategically valuable to Russia. This might include political secrets, industrial espionage, or personal data. As a Russian state-sponsored group, APT29’s activities have geopolitical implications. Their targets suggest an interest in gathering intelligence for strategic purposes, potentially fueling tensions between Russia and other countries.
These incidents highlight the importance of robust cybersecurity measures for organizations, including multi-factor authentication, monitoring for suspicious activity, and securing OAuth applications.
Securing your business against sophisticated groups like APT29 requires a layered approach, focusing on both technical measures and employee awareness. There are a few steps you have to take:
Finally, close gaps in your cybersecurity by moving to a consolidated platform like Coro. Too many organizations are relying on a heavy amount of tools to defend against different threats, but the danger lies in the exploitable spaces created by disperate tools.
To learn more, read our post: “Why a Cybersecurity Platform Beats Standalone Applications.”
*** This is a Security Bloggers Network syndicated blog from Blog – Coro Cybersecurity authored by Kevin Smith. Read the original post at: https://www.coro.net/blog/threats/who-are-apt29