Advertisement · 728 × 90
#
Hashtag
#apt29
Advertisement · 728 × 90
Preview
Hunting APT29 Part 2: I Searched One ProcessID. 1,129 Events Came Back. Inside The Breach #3

PART 2 is LIVE: open.substack.com/pub/manishra...

#Substack #Bluesky #Sysmon #Splunk #Cybersecurity #ThreatHunting #DetectionEngineering #APT29

1 0 0 0
Preview
AI Agents Are Reshaping Cyber Threats, Making Traditional Kill Chains Less Relevant   In September 2025, Anthropic disclosed a case that highlights a major evolution in cyber operations. A state-backed threat actor leveraged an AI-powered coding agent to conduct an automated cyber espionage campaign targeting 30 organizations globally. What stands out is the level of autonomy involved. The AI system independently handled approximately 80 to 90 percent of the tactical workload, including scanning targets, generating exploit code, and attempting lateral movement across systems at machine speed. While this development is alarming, a more critical risk is emerging. Attackers may no longer need to progress through traditional stages of intrusion. Instead, they can compromise an AI agent already embedded within an organization’s environment. Such agents operate with pre-approved access, established permissions, and a legitimate role that allows them to move across systems as part of daily operations. This removes the need for attackers to build access step by step. A Security Model Designed for Human Attackers The widely used cyber kill chain framework, introduced by Lockheed Martin in 2011, was built on the assumption that attackers must gradually work their way into a system. It describes how adversaries move from an initial breach to achieving their final objective. The model is based on a straightforward principle. Attackers must complete a sequence of steps, and defenders can interrupt them at any stage. Each step increases the likelihood of detection. A typical attack path includes several phases. It begins with initial access, often achieved by exploiting a vulnerability. The attacker then establishes persistence while avoiding detection mechanisms. This is followed by reconnaissance to understand the system environment. Next comes lateral movement to reach valuable assets, along with privilege escalation when higher levels of access are required. The final stage involves data exfiltration while bypassing data loss prevention controls. Each of these stages creates opportunities for detection. Endpoint security tools may identify the initial payload, network monitoring systems can detect unusual movement across systems, identity solutions may flag suspicious privilege escalation, and SIEM platforms can correlate anomalies across different environments. Even advanced threat groups such as APT29 and LUCR-3 invest heavily in avoiding detection. They often spend weeks operating within systems, relying on legitimate tools and blending into normal traffic patterns. Despite these efforts, they still leave behind subtle indicators, including unusual login locations, irregular access behavior, and small deviations from established baselines. These traces are precisely what modern detection systems are designed to identify. However, this model does not apply effectively to AI-driven activity. What AI Agents Already Possess AI agents function very differently from human users. They operate continuously, interact across multiple systems, and routinely move data between applications as part of their designed workflows. For example, an agent may pull data from Salesforce, send updates through Slack, synchronize files with Google Drive, and interact with ServiceNow systems. Because of these responsibilities, such agents are often granted extensive permissions during deployment, sometimes including administrative-level access across multiple platforms. They also maintain detailed activity histories, which effectively act as a map of where data is stored and how it flows across systems. If an attacker compromises such an agent, they immediately gain access to all of these capabilities. This includes visibility into the environment, access to connected systems, and permission to move data across platforms. Importantly, they also gain a legitimate operational cover, since the agent is expected to perform these actions. As a result, the attacker bypasses every stage of the traditional kill chain. There is no need for reconnaissance, lateral movement, or privilege escalation in a detectable form, because the agent already performs these functions. In this scenario, the agent itself effectively becomes the entire attack chain. Evidence That the Threat Is Already Looming  This risk is not theoretical. The OpenClaw incident provides a clear example. Investigations revealed that approximately 12 percent of the skills available in its public marketplace were malicious. In addition, a critical remote code execution vulnerability enabled attackers to compromise systems with minimal effort. More than 21,000 instances of the platform were found to be publicly exposed. Once compromised, these agents were capable of accessing integrated services such as Slack and Google Workspace. This included retrieving messages, documents, and emails, while also maintaining persistent memory across sessions. The primary challenge for defenders is that most security tools are designed to detect abnormal behavior. When attackers operate through an AI agent’s existing workflows, their actions appear normal. The agent continues accessing the same systems, transferring similar data, and operating within expected timeframes. This creates a significant detection gap. How Visibility Solutions Address the Problem Defending against this type of threat begins with visibility. Organizations must identify all AI agents operating within their environments, including embedded features, third-party integrations, and unauthorized shadow AI tools. Solutions such as Reco are designed to address this challenge. These platforms can discover all AI agents interacting within a SaaS ecosystem and map how they connect across applications. They provide detailed visibility into which systems each agent interacts with, what permissions it holds, and what data it can access. This includes visualizing SaaS-to-SaaS connections and identifying risky integration patterns, including those formed through MCP, OAuth, or API-based connections. These integrations can create “toxic combinations,” where agents unintentionally bridge systems in ways that no single application owner would normally approve. Such tools also help identify high-risk agents by evaluating factors such as permission scope, cross-system access, and data sensitivity. Agents associated with increased risk are flagged, allowing organizations to prioritize mitigation. In addition, these platforms support enforcing least-privilege access through identity and access governance controls. This limits the potential impact if an agent is compromised. They also incorporate behavioral monitoring techniques, applying identity-centric analysis to AI agents in the same way as human users. This allows detection systems to distinguish between normal automated activity and suspicious deviations in real time. What This Means for Security Teams The traditional kill chain model is based on the assumption that attackers must gradually build access. AI agents fundamentally disrupt this assumption. A single compromised agent can provide immediate access to systems, detailed knowledge of the environment, extensive permissions, and a legitimate channel for moving data. All of this can occur without triggering traditional indicators of compromise. Security teams that focus only on detecting human attacker behavior risk overlooking this emerging threat. Attackers operating through AI agents can remain hidden within normal operational activity. As AI adoption continues to expand, it is increasingly likely that such agents will become targets. In this context, visibility becomes critical. The ability to monitor AI agents and understand their behavior can determine whether a threat is identified early or only discovered during incident response. Solutions like Reco aim to provide this visibility across SaaS environments, enabling organizations to detect and manage risks associated with AI-driven systems more effectively.

AI Agents Are Reshaping Cyber Threats, Making Traditional Kill Chains Less Relevant #aiagents #Anthropic #APT29

0 0 0 0
Post image

Hunted through 196,071 APT29 logs in #Splunk. Process creation had 449 events. Memory access had 39,286. APT29 was nearly invisible at the layer most detections watch.

Still working through the lateral movement and credential access layers. Link is in comments.
#substack #Cybersecurity #bsky #APT29

1 0 1 0
The Internet Was Weeks Away From Disaster and No One Knew
The Internet Was Weeks Away From Disaster and No One Knew YouTube video by Veritasium

🚨 #Internet var uger fra at bryde totalt sammen igennem #Linux #Fedora bagdør.
#APT29 #hacking
Softwaren styrer servere, banker, mobiler & statslige it. #OpenSource

Det blev opdaget ved en tilfældighed af en tysk programmør #AndresFreund ( #postgresql) fra #Microsoft.
youtu.be/aoag03mSuXQ?...

4 1 0 0
Preview
The APTs That Defined 2025 How State-Aligned Threat Actors Shaped the Global Cyber Battlefield

The APTs That Defined 2025 open.substack.com/pub/malwhere...

#APT #China #Russia #DPRK #Iran #ThreatIntel #CyberSecurity #SaltTyphoon #FlaxTyphoon #MustangPanda #APT17 #APT28 #APT29 #Sandworm #LazarusGroup #Kimsuky #APT42

0 0 0 0
Preview
Catching APT29’s Favorite Evasion Trick: Detecting DLL Sideloading with Sigma (T1574.002) A multi-tiered detection strategy to uncover one of the stealthiest persistence techniques used by nation-state threat actors.

I just published Catching APT29’s Favorite Evasion Trick: Detecting DLL Sideloading with Sigma (T1574.002) devsecopsai.today/catching-apt...

#Cybersecurity #CISO #APT29 #Sigma #Evasion #Published #Detection #Threat #Medium #Blog #Bluesky #bsky #Analysis

1 0 0 0
Preview
How I Built a Sigma Detection Rule to Catch APT29’s Encoded PowerShell Attacks A deep dive into threat hunting methodology, detection engineering, and building effective defenses against nation-state adversaries

I just published How I Built a Sigma Detection Rule to Catch APT29’s Encoded PowerShell Attacks systemweakness.com/how-i-built-...

#Apt29 #Cybersecurity #ThreatHunting #Threat #Hunting #SIGMA #Sysmon #Medium #Blog #Bluesky #CISO #CTO

2 0 1 0
Preview
Cyber warfare groups: APT29 (Cozy Bear) - PID Perspectives APT29 is a cyber unit that operates behind the world’s most powerful governments. Their intrusions rarely make headlines because, unlike other groups, they

They're called "cozy" because they're in no hurry: once they enter a system, they stay there for months undetected, gathering intel from sensitive targets. This is how Russia spies on the West.

#APT29 #cozyBear #espionage #Russia #cyberwarfare

0 0 0 0
Preview
SEC Drops SolarWinds Case After Years of High-Stakes Cybersecurity Scrutiny The U.S. Securities and Exchange Commission (SEC) has abandoned its lawsuit against SolarWinds and its chief information security officer, alleging that the company had misled investors about the security practices that led to the 2020 supply chain attack. In a joint motion filed November 20, 2025, the SEC, along with SolarWinds and its CISO Timothy G. Brown, asked the court to voluntarily

iT4iNT SERVER SEC Drops SolarWinds Case After Years of High-Stakes Cybersecurity Scrutiny VDS VPS Cloud #Cybersecurity #SolarWinds #SEC #SupplyChainAttack #APT29

2 0 0 0
Preview
Russian APTs: OAuth Abuse, RDP Phish, and Takedowns Russia-linked actors leaned hard on OAuth device codes and RDP phishing from Oct 2024–Aug 2025. Providers pushed back in concert. Here’s what changed, what to watch in your logs, and the quickest…

APT29 shopped the OAuth device-code aisle and served .RDP phish 🎣 Amazon/Microsoft/Cloudflare cut the power—temporarily. Upgrade MFA 🔒 choke consent, fence RDP.

Curious? Tap in now and subscribe for the next move.

blog.alphahunt.io/russian-apts...

#AlphaHunt #CyberSecurity #APT29 #InfoSec

1 0 0 0
Preview
Russian APTs: OAuth Abuse, RDP Phish, and Takedowns Russia-linked actors leaned hard on OAuth device codes and RDP phishing from Oct 2024–Aug 2025. Providers pushed back in concert. Here’s what changed, what to watch in your logs, and the quickest…

OAuth is the new skeleton key: Russian APTs consent-grab, RDP-phish, and shrug off takedowns. 🔐🇷🇺 Get the playbook—and a risk edge—before they log in as you.

Read more + subscribe -> blog.alphahunt.io/russian-apts...

#AlphaHunt #CyberSecurity #APT29 #OAuth

1 0 0 0
Preview
Russian APTs: OAuth Abuse, RDP Phish, and Takedowns Russia-linked actors leaned hard on OAuth device codes and RDP phishing from Oct 2024–Aug 2025. Providers pushed back in concert. Here’s what changed, what to watch in your logs, and the quickest…

Russian APTs moved from love letters to .rdp lures and device-code OAuth theft—then Amazon/Microsoft/Cloudflare pulled the plug. 🔌🛡️ Log tells + quick wins inside: blog.alphahunt.io/russian-apts...

#AlphaHunt #CyberSecurity #APT29 #OAuth

1 0 0 0

Russian APTs raided the OAuth device-code aisle and mailed weaponized .rdp invites. Amazon+Microsoft+Cloudflare clipped dwell time. Want the fixes (FIDO2, consent lock)? 🔒🕵️

#AlphaHunt #CyberSecurity #APT29 #OAuth

1 0 1 0

“Approve to own yourself.” APT29 hijacked device-code OAuth and booby-trapped .rdp—until Amazon/Microsoft/Cloudflare yanked the cord. Kill legacy auth, go FIDO2, govern consent. Read more 👀

#AlphaHunt #CyberSecurity #APT29

1 0 1 0
Preview
Russian APTs: OAuth Abuse, RDP Phish, and Takedowns Russia-linked actors leaned hard on OAuth device codes and RDP phishing from Oct 2024–Aug 2025. Providers pushed back in concert. Here’s what changed, what to watch in your logs, and the quickest…

Russian APTs didn’t “hack” in—OAuth held the door while a “helpful” .rdp arrived. Then Amazon/Microsoft/Cloudflare played whack‑a‑mole with takedowns. 🔐⚡

Get the playbook—subscribe: -> blog.alphahunt.io/russian-apts...

#AlphaHunt #CyberSecurity #APT29 #InfoSec

0 0 0 0
Preview
Russian APTs: OAuth Abuse, RDP Phish, and Takedowns Russia-linked actors leaned hard on OAuth device codes and RDP phishing from Oct 2024–Aug 2025. Providers pushed back in concert. Here’s what changed, what to watch in your logs, and the quickest…

Cozy Bear’s new trick: fake device-code popups. The clouds tag-teamed the takedown. Watch for app-consent spikes + weird device-code grants, then kill legacy auth. Breakdown 🔐🧹

#AlphaHunt #CyberSecurity #APT29 #CloudSecurity

0 0 1 0
Post image

Cozy Bear moved from “.rdp phish” to “fake device-code popups.” The clouds finally played defense together. Check device-code grants + app consents—then kill legacy auth. 🔐🧹
👇 blog.alphahunt.io/russian-apts...

Read & subscribe for detections. #AlphaHunt #CyberSecurity #APT29

1 0 0 0
Original post on securityweek.com

Amazon Disrupts Russian Hacking Campaign Targeting Microsoft Users The Midnight Blizzard cyberspies used compromised websites to trick users into authorizing devices they controlled. The post Amazo...

#Cloud #Security #Identity #& #Access #APT29 #Cozy #Bear […]

[Original post on securityweek.com]

0 0 0 0
Post image

Amazon disrupts watering hole campaign by Russia’s APT29 aka Cozy Bear

aws.amazon.com/blogs/securi...

#CyberSecurity #NationState #Putin #APT29 #CozyBear

0 0 0 0
Preview
Amazon Disrupts Russian APT29 Watering Hole Targeting Microsoft Authentication Follow us on Bluesky, Twitter (X), Mastodon and Facebook at @Hackread

Amazon has disrupted a Russian #APT29 watering hole campaign that used compromised websites to target Microsoft’s device code authentication.

Read: hackread.com/amazon-disru...

#CyberSecurity #CyberAttack #Russia #Amazon #Microsoft

6 1 0 0
Preview
Amazon Disrupts APT29 Watering Hole Campaign Abusing Microsoft Device Code Authentication Ukrainian companies read more about Amazon Disrupts APT29 Watering Hole Campaign Abusing Microsoft Device Code Authentication

Amazon Disrupts APT29 Watering Hole Campaign Abusing Microsoft Device Code Authentication reconbee.com/amazon-disru...

#Amazon #APT29 #wateringholecampaign #microsoft #authentication #cyberattack

1 1 0 0
Post image

Amazon ferma campagna watering-hole di APT29: redirect offuscati imitano la verifica Microsoft, blocco domini con Cloudflare e Microsoft.

#Amazon #apt29 #Microsoft #wateringhole
www.matricedigitale.it/2025/08/31/a...

0 0 0 0
Post image

⚠️ APT29’s watering hole trick uncovered

#Amazon disrupted a watering‑hole campaign by Russia’s #APT29, who hijacked legitimate websites to redirect 10% of visitors into a malicious #Microsoft device‑code auth flow, tricking them into granting unauthorized access.

#ransomNews #APT29 #AuthPhishing

3 2 0 0
Preview
Amazon Disrupts APT29 Watering Hole Campaign Abusing Microsoft Device Code Authentication Amazon disrupted APT29’s June 2025 campaign exploiting Microsoft device code authentication, redirecting 10% of visitors to malicious domains.

Russia’s #APT29 hacked legit websites—secretly redirecting ~10% of visitors into fake “Cloudflare” pages to hijack Microsoft accounts.

Amazon flagged and disrupted the campaign, but the group quickly spun up new domains. #CyberSecurity thehackernews.com/2025/08/amaz...

17 11 0 1
Post image

Amazon disrupts APT29's latest cyber espionage campaign exploiting Microsoft's device code authentication. Stay vigilant against evolving threats. #CyberSecurity #APT29 #Phishing #AmazonSecurity Link: thedailytechfeed.com/amazon-thwar...

0 0 0 0
Preview
Russian Threat Actors Circumvent Gmail Security with App Password Theft   As part of Google's Threat Intelligence Group (GTIG), security researchers discovered a highly sophisticated cyber-espionage campaign orchestrated by Russian threat actors. They succeeded in circumventing Google's multi-factor authentication (MFA) protections for Gmail accounts by successfully circumventing it.  A group of researchers found that the attackers used highly targeted and convincing social engineering tactics by impersonating Department of State officials in order to establish trust with their victims in the process. As soon as a rapport had been built, the perpetrators manipulated their victims into creating app-specific passwords.  These passwords are unique 16-character codes created by Google which enable secure access to certain applications and devices when two-factor authentication is enabled. As a result of using these app passwords, which bypass conventional two-factor authentication, the attackers were able to gain persistent access to sensitive emails through Gmail accounts undetected.  It is clear from this operation that state-sponsored cyber actors are becoming increasingly inventive, and there is also a persistent risk posed by seemingly secure mechanisms for recovering and accessing accounts. According to Google, this activity was carried out by a threat cluster designated UNC6293, which is closely related to the Russian hacking group known as APT29. It is believed that UNC6293 has been closely linked to APT29, a state-sponsored hacker collective.  APT29 has garnered attention as one of the most sophisticated and sophisticated Advanced Persistent Threat (APT) groups sponsored by the Russian government, and according to intelligence analysts, that group is an extension of the Russian Foreign Intelligence Service (SVR). It is important to note that over the past decade this clandestine collective has orchestrated a number of high-profile cyber-espionage campaigns targeting strategic entities like the U.S. government, NATO member organizations, and prominent research institutes all over the world, including the U.S. government, NATO, and a wide range of academic institutions.  APT29's operators have a reputation for carrying out prolonged infiltration operations that can remain undetected for extended periods of time, characterised by their focus on stealth and persistence. The tradecraft of their hackers is consistently based on refined social engineering techniques that enable them to blend into legitimate communications and exploit the trust of their intended targets through their tradecraft.  By crafting highly convincing narratives and gradually manipulating individuals into compromising security controls in a step-by-step manner, APT29 has demonstrated that it has the ability to bypass even highly sophisticated technical defence systems. This combination of patience, technical expertise, and psychological manipulation has earned the group a reputation as one of the most formidable cyber-espionage threats associated with Russian state interests.  A multitude of names are used by this prolific group in the cybersecurity community, including BlueBravo, Cloaked Ursa, Cosy Bear, CozyLarch, ICECAP, Midnight Blizzard, and The Dukes. In contrast to conventional phishing campaigns, which are based on a sense of urgency or intimidation designed to elicit a quick response, this campaign unfolded in a methodical manner over several weeks.  There was a deliberate approach by the attackers, slowly creating a sense of trust and familiarity with their intended targets. To make their deception more convincing, they distributed phishing emails, which appeared to be official meeting invitations that they crafted. Often, these messages were carefully constructed to appear authentic and often included the “@state.gov” domain as the CC field for at least four fabricated email addresses.  The aim of this tactic was to create a sense of legitimacy around the communication and reduce the likelihood that the recipients would scrutinise it, which in turn increased the chances of the communication being exploited effectively. It has been confirmed that the British writer, Keir Giles, a senior consulting fellow at Chatham House, a renowned global affairs think tank, was a victim of this sophisticated campaign.  A report indicates Giles was involved in a lengthy email correspondence with a person who claimed to be Claudia S Weber, who represented the U.S. Department of State, according to reports. More than ten carefully crafted messages were sent over several weeks, deliberately timed to coincide with Washington's standard business hours. Over time, the attacker gradually gained credibility and trust among the people who sent the messages.  It is worth noting that the emails were sent from legitimate addresses, which were configured so that no delivery errors would occur, which further strengthened the ruse. When this trust was firmly established, the adversary escalated the scheme by sending a six-page PDF document with a cover letter resembling an official State Department letterhead that appeared to be an official State Department document.  As a result of the instructions provided in the document, the target was instructed to access Google's account settings page, to create a 16-character app-specific password labelled "ms.state.gov, and to return the code via email under the guise of completing secure onboarding. As a result of the app password, the threat actors ended up gaining sustained access to the victim's Gmail account, bypassing multi-factor authentication altogether as they were able to access their accounts regularly.  As the Citizen Lab experts were reviewing the emails and PDF at Giles' request, they noted that the emails and PDF were free from subtle language inconsistencies and grammatical errors that are often associated with fraudulent communications. In fact, based on the precision of the language, researchers have suspected that advanced generative AI tools have been deployed to craft polished, credible content for the purpose of evading scrutiny and enhancing the overall effectiveness of the deception as well.  There was a well-planned, incremental strategy behind the attack campaign that was specifically geared towards increasing the likelihood that the targeted targets would cooperate willingly. As one documented instance illustrates, the threat actor tried to entice a leading academic expert to participate in a private online discussion under the pretext of joining a secure State Department forum to obtain his consent. In order to enable guest access to Google's platform, the victim was instructed to create an app-specific password using Google's account settings. In fact, the attacker used this credential to gain access to the victim's Gmail account with complete control over all multi-factor authentication procedures, enabling them to effectively circumvent all of the measures in place.  According to security researchers, the phishing outreach was carefully crafted to look like a routine, legitimate onboarding process, thus making it more convincing. In addition to the widespread trust that many Americans place in official communications issued by U.S. government institutions, the attackers exploited the general lack of awareness of the dangers of app-specific passwords, as well as their widespread reliance on official communications.  A narrative of official protocol, woven together with professional-sounding language, was a powerful way of making the perpetrators more credible and decreasing the possibility of the target questioning their authenticity in their request. According to cybersecurity experts, several individuals who are at higher risk from this campaign - journalists, policymakers, academics, and researchers - should enrol in Google's Advanced Protection Program (APP).  A major component of this initiative is the restriction of access to only verified applications and devices, which offers enhanced safeguards. The experts also advise organisations that whenever possible, they should disable the use of app-specific passwords and set up robust internal policies that require any unusual or sensitive requests to be verified, especially those originating from reputable institutions or government entities, as well as implement robust internal policies requiring these types of requests.  The intensification of training for personnel most vulnerable to these prolonged social engineering attacks, coupled with the implementation of clear, secure channels for communication between the organisation and its staff, would help prevent the occurrence of similar breaches in the future. As a result of this incident, it serves as an excellent reminder that even mature security ecosystems remain vulnerable to a determined adversary combining psychological manipulation with technical subterfuge when attempting to harm them.  With threat actors continually refining their methods, organisations and individuals must recognise that robust cybersecurity is much more than merely a set of tools or policies. In order to combat cyberattacks as effectively as possible, it is essential to cultivate a culture of vigilance, scepticism, and continuous education. In particular, professionals who routinely take part in sensitive research, diplomatic relations, or public relations should assume they are high-value targets and adopt a proactive defence posture.  Consequently, any unsolicited instructions must be verified by a separate, trusted channel, hardware security keys should be used to supplement authentication, and account settings should be reviewed regularly for unauthorised changes. For their part, institutions should ensure that security protocols are both accessible and clearly communicated as they are technically sound by investing in advanced threat intelligence, simulating sophisticated phishing scenarios, and investing in advanced threat intelligence.  Fundamentally, resilience against state-sponsored cyber-espionage is determined by the ability to plan in advance not only how adversaries are going to deploy their tactics, but also the trust they will exploit in order to reach their goals.

Russian Threat Actors Circumvent Gmail Security with App Password Theft #APT29 #CyberCrime #Cybersecurity

0 0 0 0