CIO Influence
CIO Influence News IT and DevOps Networking

RiskIQ Uncovers Infrastructure Patterns Leading to 35 Active Russian APT29, aka Cozy Bear, C2 Servers

RiskIQ Uncovers Infrastructure Patterns Leading to 35 Active Russian APT29, aka Cozy Bear, C2 Servers

RiskIQ, a leader in internet security intelligence, has uncovered more than 30 active command and control (C2) servers under the control of APT29 (The Dukes, Yttrium, Cozy Bear), which the US government associates with Russiaโ€™s Foreign Intelligence Service (SVR), actively serving malware (WellMess, WellMail). This malware was previously used in espionage campaigns targeting COVID-19 research in the UK, US, and Canada.

The report will be of particular interest to those tracking APT29 and targets and victims of WellMess/WellMail malware, who may benefit from the tactical intelligence, including APT29โ€™s network footprint, SSL certifications, and IP addresses.

Recommendedย ITechย News: ย Zerto Announces General Availability of Zerto 9 to Deliver Instant Ransomware Recovery

Key Findings

  • Russia’s APT29, which the US government associated with Russia’s foreign intelligence service, is actively serving malware (WellMess, WellMail) previously used in espionage campaigns targeting COVID-19 research in the UK, US, and Canada.
  • RiskIQ’s Team Atlas identified nearly three dozen C2 servers we assessed are under the control of APT29 and serving WellMess.
  • The activity uncovered was notable given the context in which it appeared, coming on the heels of a public reproach of Russian hacking by President Joe Biden in a recent summit with President Vladimir Putin.

One year ago, amid a global pandemic, the UK, US, and Canadian governments issuedย a joint advisoryย detailing a Russian espionage campaign that targeted COVID-19 vaccine research efforts in their respective countries. They attributed the campaign to APT29 and explicitly identified the group as an extension of the SVR. They attributed the malware used in the campaign, known as WellMess and WellMail, with APT29, for the first time publicly.

Recommendedย ITechย News: ย Red Hat and Nutanix Announce Strategic Partnership to Deliver Open Hybrid Multicloud Solutions

Only one month ago, the American and Russian heads of stateย held a summitย wherein Russia’s aggressive cyber campaigns topped the list of President Biden’s strategic concerns. Given this context, RiskIQโ€™s Threat Intelligence Team Atlas paid particular attention to APT29 activity around and after this summit, which took place on June 16.

โ€œRiskIQโ€™s Team Atlas assesses with high confidence that these IP addresses and certificates are in active use by APT29 at the time of this writeup,โ€ said Kevin Livelli, Director of Threat Intelligence, RiskIQ Team Atlas. โ€œWe were unable to locate any malware which communicated with this infrastructure, but we suspect it is likely similar to previously identified samples.โ€

RiskIQโ€™s Team Atlas will continue to update the community as they identify additional infrastructure related to this malware.ย You can read the full article hereย and explore the IOCs from the investigation and other known APT29 infrastructure byย joining the RiskIQ Community.

Recommendedย ITechย News: ย Red Hat and Nutanix Announce Strategic Partnership to Deliver Open Hybrid Multicloud Solutions

Related posts

Komprise COO, President and Co-Founder Krishna Subramanian Honored As A Top Woman of Influence In Silicon Valley

CIO Influence News Desk

Verizon Business to Create Next-Generation Global Network Infrastructure for FM Logistic

CIO Influence News Desk

Safe-T Group To Present Its Zero Trust Network Access Solution With Integrated Thales SafeNet Trusted Access Cloud Management Service At Thales Trusted Access Summit

CIO Influence News Desk