• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
five eyes agencies expose apt29's evolving cloud attack tactics

Five Eyes Agencies Expose APT29’s Evolving Cloud Attack Tactics

You are here: Home / General Cyber Security News / Five Eyes Agencies Expose APT29’s Evolving Cloud Attack Tactics
February 27, 2024

Cybersecurity and intelligence companies from the Five Eyes nations have unveiled a joint advisory detailing the evolving ways of the Russian state-sponsored threat actor known as APT29.

The hacking outfit, also known as BlueBravo, Cloaked Ursa, Cozy Bear, Midnight Blizzard (formerly Nobelium), and The Dukes, is assessed to be affiliated with the Overseas Intelligence Provider (SVR) of the Russian Federation.

Formerly attributed to the offer chain compromise of SolarWinds program, the cyber espionage team captivated focus in the latest months for focusing on Microsoft, Hewlett Packard Organization (HPE), and other businesses with an purpose to even more their strategic objectives.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


“As corporations go on to modernize their methods and go to cloud-based mostly infrastructure, the SVR has tailored to these alterations in the working setting,” in accordance to the security bulletin.

Cybersecurity

These include –

  • Obtaining access to cloud infrastructure by means of provider and dormant accounts by signifies of brute-force and password spraying attacks, pivoting away from exploiting program vulnerabilities in on-premise networks
  • Working with tokens to access victims’ accounts with no the will need for a password
  • Leveraging password spraying and credential reuse tactics to seize control of private accounts, use prompt bombing to bypass multi-factor authentication (MFA) requirements, and then registering their possess product to gain obtain to the network
  • Creating it more challenging to distinguish malicious connections from regular users by making use of household proxies to make the destructive visitors look as if it is originating from IP addresses within just internet services service provider (ISP) ranges made use of for household broadband shoppers and conceal their true origins

“For organizations that have moved to cloud infrastructure, the first line of protection in opposition to an actor these types of as SVR must be to guard towards SVR’ TTPs for preliminary access,” the agencies reported. “As soon as the SVR gains original accessibility, the actor is able of deploying hugely advanced post compromise abilities this kind of as MagicWeb.”

Located this report intriguing? Abide by us on Twitter  and LinkedIn to read through far more exclusive information we article.


Some elements of this post are sourced from:
thehackernews.com

Previous Post: «new hugging face vulnerability exposes ai models to supply chain New Hugging Face Vulnerability Exposes AI Models to Supply Chain Attacks
Next Post: From Alert to Action: How to Speed Up Your SOC Investigations from alert to action: how to speed up your soc»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.