www.secnews.physaphae.fr This is the RSS 2.0 feed from www.secnews.physaphae.fr. IT's a simple agragated flow of multiple articles soruces. Liste of sources, can be found on www.secnews.physaphae.fr. 2025-05-10T14:30:10+00:00 www.secnews.physaphae.fr Recorded Future - FLux Recorded Future L'Azerbaïdjan blâme les pirates d'État russes pour les cyberattaques sur les médias locaux<br>Azerbaijan blames Russian state hackers for cyberattacks on local media The Kremlin-backed hacking group known as APT29 was responsible for a February cyberattack on local media, said Azerbaijan\'s government, which has moved to reduce Russian influence recently.]]> 2025-05-05T13:21:50+00:00 https://therecord.media/azerbaijan-blames-media-cyberattacks-russia-apt29 www.secnews.physaphae.fr/article.php?IdArticle=8671846 False None APT 29 3.0000000000000000 eSecurityPlanet - Blog Les pirates russes ciblent les diplomates européens avec des escroqueries de phishing \\ '<br>Russian Hackers Target European Diplomats with \\'Wine-Tasting\\' Phishing Scams Un groupe de piratage lié à l'État russe accélère ses cyberattaques contre des cibles diplomatiques à travers l'Europe, en utilisant un nouvel outil de logiciel malveillant furtif connu sous le nom de «grapeloader» pour fournir des charges utiles malveillantes par des e-mails de phishing intelligemment déguisés. Selon Check Point Research, la campagne a commencé en janvier 2025 et est réalisée par APT29 - également connue sous le nom de […]
>A Russian state-linked hacking group is ramping up its cyberattacks against diplomatic targets across Europe, using a new stealthy malware tool known as “GrapeLoader” to deliver malicious payloads through cleverly disguised phishing emails. According to Check Point Research, the campaign began in January 2025 and is being carried out by APT29 - also known as […] ]]>
2025-04-21T08:11:18+00:00 https://www.esecurityplanet.com/cybersecurity/russian-hackers-wine-tasting-phishing/ www.secnews.physaphae.fr/article.php?IdArticle=8665580 False Malware,Tool APT 29 3.0000000000000000
The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) APT29 déploie des logiciels malveillants de grapeloder ciblant les diplomates européens à travers des leurres de dégustation de vin<br>APT29 Deploys GRAPELOADER Malware Targeting European Diplomats Through Wine-Tasting Lures The Russian state-sponsored threat actor known as APT29 has been linked to an advanced phishing campaign that\'s targeting diplomatic entities across Europe with a new variant of WINELOADER and a previously unreported malware loader codenamed GRAPELOADER. "While the improved WINELOADER variant is still a modular backdoor used in later stages, GRAPELOADER is a newly observed initial-stage tool]]> 2025-04-20T10:28:00+00:00 https://thehackernews.com/2025/04/apt29-deploys-grapeloader-malware.html www.secnews.physaphae.fr/article.php?IdArticle=8665148 False Malware,Tool,Threat APT 29 2.0000000000000000 HackRead - Chercher Cyber Le leurre à vin confortable Drops Vineloader malware sur les diplomates de l'UE<br>Cozy Bear\\'s Wine Lure Drops WineLoader Malware on EU Diplomats Midnight Blizzard (APT29/Cozy Bear) targets European embassies and Ministries of Foreign Affairs with sophisticated phishing emails disguised as…]]> 2025-04-19T18:13:05+00:00 https://hackread.com/cozy-bear-wine-lure-wineloader-malware-eu-diplomats/ www.secnews.physaphae.fr/article.php?IdArticle=8664982 False Malware APT 29 3.0000000000000000 The Register - Site journalistique Anglais Les Russes attirent les diplomates européens dans un piège malveillant avec une invitation à la dégustation du vin<br>Russians lure European diplomats into malware trap with wine-tasting invite Vintage phishing varietal has improved with age Russia never stops using proven tactics, and its Cozy Bear, aka APT 29, cyber-spies are once again trying to lure European diplomats into downloading malware with a phony invitation to a lux event.…]]> 2025-04-16T12:29:09+00:00 https://go.theregister.com/feed/www.theregister.com/2025/04/16/cozy_bear_grapeloader/ www.secnews.physaphae.fr/article.php?IdArticle=8663526 False Malware APT 29 3.0000000000000000 GB Hacker - Blog de reverseur Les pirates APT29 utilisent le grapeloader dans une nouvelle attaque contre les diplomates européens<br>APT29 Hackers Use GRAPELOADER in New Attack Against European Diplomats Check Point Research (RCR) a découvert une nouvelle campagne de phishing ciblée en utilisant Grapeloader, un téléchargeur de stade initial sophistiqué, lancé par le célèbre groupe de piratage lié à la russe, APT29, connu alternativement sous le nom de Midnight Blizzard ou Cozy Bear. Cette campagne, identifiée depuis janvier 2025, se concentre principalement sur les gouvernements européens et les entités diplomatiques. Présentation de la campagne APT29, reconnue pour son cyber sophistiqué […]
>Check Point Research (CPR) has uncovered a new targeted phishing campaign employing GRAPELOADER, a sophisticated initial-stage downloader, launched by the notorious Russian-linked hacking group APT29, known alternatively as Midnight Blizzard or Cozy Bear. This campaign, identified since January 2025, primarily focuses on European governments and diplomatic entities. Campaign Overview APT29, recognized for its sophisticated cyber […] ]]>
2025-04-16T10:01:45+00:00 https://gbhackers.com/apt29-hackers-use-grapeloade/ www.secnews.physaphae.fr/article.php?IdArticle=8663449 False None APT 29 3.0000000000000000
Dark Reading - Informationweek Branch Vague d'attaques de phishing inspirées du vin cible les diplomates de l'UE<br>Wave of Wine-Inspired Phishing Attacks Targets EU Diplomats Russia-backed APT29\'s latest campaign once again uses malicious invites to wine-tasting events as its lure, but this time targets a different set of vintages - errr, victims - and delivers a novel backdoor, GrapeLoader.]]> 2025-04-15T16:11:23+00:00 https://www.darkreading.com/cyberattacks-data-breaches/wine-inspired-phishing-eu-diplomats www.secnews.physaphae.fr/article.php?IdArticle=8663160 False None APT 29 3.0000000000000000 Checkpoint - Fabricant Materiel Securite Démasking APT29: La campagne de phishing sophistiquée ciblant la diplomatie européenne<br>Unmasking APT29: The Sophisticated Phishing Campaign Targeting European Diplomacy La recherche sur le point de contrôle des exécutions exécutive a observé une campagne de phishing sophistiquée menée par Advanced Persistance Menace (APT) 29, un groupe de menaces lié à la Russie. L'opération a ciblé les organisations diplomatiques à travers l'Europe. La campagne semble poursuivre une opération précédente appelée Wineloader, qui imite un grand ministère européen des Affaires étrangères pour distribuer de fausses invitations aux événements diplomatiques, le plus souvent des événements de dégustation du vin. La campagne, qui a été répandue par e-mails de phishing, a utilisé un nouveau logiciel malveillant surnommé Grapeloader. Une nouvelle variante de Wineloader a également été découverte, probablement utilisée à un stade ultérieur de la campagne. INTRODUCTION CHECK Point Research (RCR) a identifié une vague significative de […]
>Executive Summary Check Point Research has been observing a sophisticated phishing campaign conducted by Advanced Persistent Threat (APT) 29, a Russian-linked threat group. The operation targeted diplomatic organizations throughout Europe. The campaign appears to continue a previous operation called Wineloader, which impersonates a major European foreign affairs ministry to distribute fake invitations to diplomatic events, most commonly wine-tasting events. The campaign, which was spread via phishing emails, used a new malware dubbed Grapeloader. A new variant of Wineloader was also discovered, likely used in a later stage of the campaign. Introduction Check Point Research (CPR) identified a significant wave of […] ]]>
2025-04-15T13:00:52+00:00 https://blog.checkpoint.com/research/unmasking-apt29-the-sophisticated-phishing-campaign-targeting-european-diplomacy/ www.secnews.physaphae.fr/article.php?IdArticle=8663105 False Malware,Threat APT 29 3.0000000000000000
Checkpoint Research - Fabricant Materiel Securite Campagne de phishing renouvelée APT29 contre les diplomates européens<br>Renewed APT29 Phishing Campaign Against European Diplomats FAITES POURRIEURS INTRODUCTION À partir de janvier 2025, Check Point Research (RCR) a suivi une vague d'attaques de phishing ciblées destinées aux gouvernements européens et aux diplomates. Les techniques, tactiques et procédures (TTP) observées dans cette campagne s'alignent avec les campagnes de Wineloader, qui ont été attribuées à l'APT29, un groupe de menaces liées à la Russie. APT29, également communément appelé Midnight Blizzard […]
>Highlights Introduction Starting in January 2025, Check Point Research (CPR) has been tracking a wave of targeted phishing attacks aimed at European governments and diplomats. The Techniques, Tactics and Procedures (TTPs) observed in this campaign align with the WINELOADER campaigns, which were attributed to APT29, a Russia linked threat group. APT29, also commonly referred to as Midnight Blizzard […] ]]>
2025-04-15T13:00:37+00:00 https://research.checkpoint.com/2025/apt29-phishing-campaign/ www.secnews.physaphae.fr/article.php?IdArticle=8663089 False Threat APT 29 3.0000000000000000
Mandiant - Blog Sécu de Mandiant Cybercrime: A Multifaceted National Security Threat 2025-02-11T20:00:00+00:00 https://cloud.google.com/blog/topics/threat-intelligence/cybercrime-multifaceted-national-security-threat/ www.secnews.physaphae.fr/article.php?IdArticle=8648141 False Ransomware,Malware,Tool,Vulnerability,Threat,Legislation,Medical,Cloud,Technical APT 41,APT 38,APT 29,APT 43,APT 44 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) APT29 Hackers Target High-Value Victims Using Rogue RDP Servers and PyRDP The Russia-linked APT29 threat actor has been observed repurposing a legitimate red teaming attack methodology as part of cyber attacks leveraging malicious Remote Desktop Protocol (RDP) configuration files. The activity, which has targeted governments and armed forces, think tanks, academic researchers, and Ukrainian entities, entails adopting a "rogue RDP" technique that was previously]]> 2024-12-18T16:45:00+00:00 https://thehackernews.com/2024/12/apt29-hackers-target-high-value-victims.html www.secnews.physaphae.fr/article.php?IdArticle=8627043 False Threat APT 29 3.0000000000000000 HackRead - Chercher Cyber Russian Cozy Bear Hackers Secteurs critiques Phish avec Microsoft, LS LURS<br>Russian Cozy Bear Hackers Phish Critical Sectors with Microsoft, AWS Lures Russian state-sponsored hackers Cozy Bear are targeting over 100 organizations globally with a new phishing campaign. This sophisticated…]]> 2024-10-30T18:26:32+00:00 https://hackread.com/russian-cozy-bear-hackers-phish-microsoft-aws-lures/ www.secnews.physaphae.fr/article.php?IdArticle=8603874 False None APT 29 2.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine La campagne APT29 Spearphishing cible des milliers de personnes avec des fichiers RDP<br>APT29 Spearphishing Campaign Targets Thousands with RDP Files Microsoft has spotted a major spearphishing campaign from the Russian APT29 group using RDP for compromise]]> 2024-10-30T10:00:00+00:00 https://www.infosecurity-magazine.com/news/apt29-spearphishing-thousands-rdp/ www.secnews.physaphae.fr/article.php?IdArticle=8603646 False None APT 29 2.0000000000000000 RiskIQ - cyber risk firms (now microsoft) Amazon a identifié les domaines Internet maltraités par APT29<br>Amazon identified internet domains abused by APT29 2024-10-28T22:05:17+00:00 https://community.riskiq.com/article/f1657bc5 www.secnews.physaphae.fr/article.php?IdArticle=8603028 True Ransomware,Malware,Tool,Threat,Cloud APT 29 3.0000000000000000 Dark Reading - Informationweek Branch L'APT29 de la Russie imite AWS pour voler des informations d'identification Windows<br>Russia\\'s APT29 Mimics AWS to Steal Windows Credentials Kremlin intelligence carried out a wide-scale phishing campaign in contrast to its usual, more targeted operations.]]> 2024-10-25T20:22:37+00:00 https://www.darkreading.com/cyberattacks-data-breaches/russias-apt29-aws-windows-credentials www.secnews.physaphae.fr/article.php?IdArticle=8601773 False None APT 29 3.0000000000000000 RiskIQ - cyber risk firms (now microsoft) Faits saillants hebdomadaires, 14 octobre 2024<br>Weekly OSINT Highlights, 14 October 2024 2024-10-14T21:26:20+00:00 https://community.riskiq.com/article/cd213500 www.secnews.physaphae.fr/article.php?IdArticle=8597846 False Ransomware,Malware,Tool,Vulnerability,Threat,Patching,Industrial,Medical,Cloud APT 29,APT 10,GoldenJackal 2.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Le SVR de la Russie cible Zimbra, Serveurs TeamCity pour le cyber-espionnage<br>Russia\\'s SVR Targets Zimbra, TeamCity Servers for Cyber Espionage Russian-backed APT29 has been spying on US and European organizations since at least 2021, a US-UK joint advisory said]]> 2024-10-11T09:45:00+00:00 https://www.infosecurity-magazine.com/news/russias-svr-targets-zimbra/ www.secnews.physaphae.fr/article.php?IdArticle=8595927 False None APT 29 2.0000000000000000 RiskIQ - cyber risk firms (now microsoft) Mise à jour sur les opérations de cyber et des exploitations de vulnérabilité SVR<br>Update on SVR Cyber Operations and Vulnerability Exploitations 2024-10-11T00:28:23+00:00 https://community.riskiq.com/article/2c8cb717 www.secnews.physaphae.fr/article.php?IdArticle=8595736 False Malware,Tool,Vulnerability,Threat,Cloud,Technical APT 29 3.0000000000000000 Bleeping Computer - Magazine Américain États-Unis, UK avertissant des pirates russes de l'APT29 ciblant Zimbra, TeamCity Serveurs<br>US, UK warn of Russian APT29 hackers targeting Zimbra, TeamCity servers U.S. and U.K. cyber agencies warned today that APT29 hackers linked to Russia\'s Foreign Intelligence Service (SVR) target vulnerable Zimbra and JetBrains TeamCity servers "at a mass scale." [...]]]> 2024-10-10T14:49:36+00:00 https://www.bleepingcomputer.com/news/security/us-uk-warn-of-russian-apt29-hackers-targeting-zimbra-teamcity-servers/ www.secnews.physaphae.fr/article.php?IdArticle=8595575 False None APT 29 2.0000000000000000 RiskIQ - cyber risk firms (now microsoft) Faits saillants hebdomadaires OSINT, 9 septembre 2024<br>Weekly OSINT Highlights, 9 September 2024 2024-09-09T11:04:46+00:00 https://community.riskiq.com/article/563312a4 www.secnews.physaphae.fr/article.php?IdArticle=8573205 False Ransomware,Malware,Tool,Vulnerability,Threat,Prediction,Medical,Commercial APT 38,APT 29 2.0000000000000000 RiskIQ - cyber risk firms (now microsoft) Les attaquants soutenus par l'État et les vendeurs de surveillance commerciale utilisent à plusieurs reprises les mêmes exploits<br>State-backed attackers and commercial surveillance vendors repeatedly use the same exploits 2024-09-04T02:45:48+00:00 https://community.riskiq.com/article/12b5ac31 www.secnews.physaphae.fr/article.php?IdArticle=8569431 False Malware,Tool,Vulnerability,Threat,Legislation,Mobile,Commercial APT 29 2.0000000000000000 HackRead - Chercher Cyber APT29 russe à l'aide d'exploits de style groupe NSO dans les attaques, Google<br>Russian APT29 Using NSO Group-Style Exploits in Attacks, Google Google\'s Threat Analysis Group (TAG) has exposed a new campaign by Russian state-backed APT29, also known as Cozy…]]> 2024-08-30T13:26:41+00:00 https://hackread.com/google-russian-apt29-nso-group-exploits-attacks/ www.secnews.physaphae.fr/article.php?IdArticle=8566880 False Threat APT 29 2.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Les pirates russes utilisent des exploits commerciaux de logiciels spy pour cibler les victimes<br>Russian Hackers Use Commercial Spyware Exploits to Target Victims In a campaign targeting Mongolian government websites, Russian-backed APT29 leveraged exploits previously used by spyware vendors NSO Group and Intellexa]]> 2024-08-30T10:30:00+00:00 https://www.infosecurity-magazine.com/news/russian-hackers-spyware-exploits/ www.secnews.physaphae.fr/article.php?IdArticle=8566792 False Commercial APT 29 3.0000000000000000 The Register - Site journalistique Anglais Oh, super.Les attaques développées par les vendeurs de logiciels espions sont réutilisées par les crétins confortables de la Russie<br>Oh, great. Attacks developed by spyware vendors are being re-used by Russia\\'s Cozy Bear cretins Google researchers note the similarities, can\'t find a link Google\'s Threat Analysis Group (TAG) has spotted a disturbing similarity in attack tactics used by commercial spyware vendors and Russia-linked attack gangs.…]]> 2024-08-29T20:03:11+00:00 https://go.theregister.com/feed/www.theregister.com/2024/08/29/commercial_spyware_russia_mongolia/ www.secnews.physaphae.fr/article.php?IdArticle=8566391 False Threat,Commercial APT 29 4.0000000000000000 SecurityWeek - Security News Google attrape les exploits de réutilisation de Russian APT de Spyware Merchants NSO Group, Intellexa<br>Google Catches Russian APT Reusing Exploits From Spyware Merchants NSO Group, Intellexa Google Tag publie des preuves montrant des similitudes identiques ou frappantes entre les exploits utilisés par les fournisseurs de logiciels espions APT29 et commerciaux de Russie.
>Google TAG publishes evidence showing identical or striking similarities between exploits used by Russia\'s APT29 and commercial spyware vendors. ]]>
2024-08-29T13:00:00+00:00 https://www.securityweek.com/google-catches-russian-apt-re-using-exploits-from-spyware-merchants-nso-group-intellexa/ www.secnews.physaphae.fr/article.php?IdArticle=8566200 False Commercial APT 29 3.0000000000000000
Bleeping Computer - Magazine Américain Les pirates russes APT29 utilisent iOS, Chrome Exploits créés par les fournisseurs de logiciels espions<br>Russian APT29 hackers use iOS, Chrome exploits created by spyware vendors The Russian state-sponsored APT29 hacking group has been observed using the same iOS and Android exploits created by commercial spyware vendors in a series of cyberattacks between November 2023 and July 2024. [...]]]> 2024-08-29T09:04:58+00:00 https://www.bleepingcomputer.com/news/security/russian-apt29-hackers-use-ios-chrome-exploits-created-by-spyware-vendors/ www.secnews.physaphae.fr/article.php?IdArticle=8566165 False Mobile,Commercial APT 29 3.0000000000000000 ProofPoint - Cyber Firms Acteurs de menace \\ 'Arsenal: comment les pirates ciblent les comptes cloud<br>Threat Actors\\' Arsenal: How Hackers Target Cloud Accounts 2024-07-16T07:26:11+00:00 https://www.proofpoint.com/us/blog/cloud-security/threat-actors-arsenal-how-hackers-target-cloud-accounts www.secnews.physaphae.fr/article.php?IdArticle=8538226 False Spam,Malware,Tool,Threat,Prediction,Cloud,Technical APT 29 3.0000000000000000 Mandiant - Blog Sécu de Mandiant Enhardi et évolutif: un instantané des cyber-menaces auxquelles l'OTAN est confrontée à l'OTAN<br>Emboldened and Evolving: A Snapshot of Cyber Threats Facing NATO   As North Atlantic Treaty Organization (NATO) members and partners gather for a historic summit, it is important to take stock of one of its most pressing challenges-the cyber threat. The Alliance faces a barrage of malicious cyber activity from all over the globe, carried out by emboldened state-sponsored actors, hacktivists, and criminals who are willing to cross lines and carry out activity that was previously considered unlikely or inconceivable. In addition to military targets, NATO must consider the risks that hybrid threats like malicious cyber activity pose to hospitals, civil society, and other targets, which could impact resilience in a contingency. The war in Ukraine is undoubtedly linked to escalating cyber threat activity, but many of these threats will continue to grow separately and in parallel.  NATO must contend with covert, aggressive malicious cyber actors that are seeking to gather intelligence, preparing to or currently attacking critical infrastructure, and working to undermine the Alliance with elaborate disinformation schemes. In order to protect its customers and clients, Google is closely tracking cyber threats, including those highlighted in this report; however, this is just a glimpse at a much larger and evolving landscape. Cyber Espionage NATO\'s adversaries have long sought to leverage cyber espionage to develop insight into the political, diplomatic, and military disposition of the Alliance and to steal its defense technologies and economic secrets. However, intelligence on the Alliance in the coming months will be of heightened importance. This year\'s summit is a transition period, with the appointment of Mark Rutte as the new Secretary General and a number of adaptations expected to be rolled out to shore up the Alliance\'s defense posture and its long-term support for Ukraine. Successful cyber espionage from threat actors could potentially undermine the Alliance\'s strategic advantage and inform adversary leadership on how to anticipate and counteract NATO\'s initiatives and investments. NATO is targeted by cyber espionage activity from actors around the world with varying capabilities. Many still rely on technically simple but operationally effective methods, like social engineering. Others have evolved and elevated their tradecraft to levels that distinguish themselves as formidable adversaries for even the most experienced defenders. APT29 (ICECAP) Publicly attributed to the Russian Foreign Intelligence Services (SVR) by several governments, APT29 is heavily focused on diplomatic and political intelligence collection, principally targeting Europe and NATO member states. APT29 has been involved in multiple high-profile breaches of technology firms that were designed to provide access to the public sector. In the past year, Mandiant has observed APT29 targeting technology companies and IT service providers in NATO member countries to facilitate third-party and software supply chain compromises of government and poli]]> 2024-07-08T14:00:00+00:00 https://cloud.google.com/blog/topics/threat-intelligence/cyber-threats-facing-nato/ www.secnews.physaphae.fr/article.php?IdArticle=8532698 False Ransomware,Malware,Tool,Vulnerability,Threat,Legislation,Medical,Cloud,Technical APT 29,APT 28 3.0000000000000000 SecurityWeek - Security News TeamViewer Hack est officiellement attribué aux cyberespaces russes<br>TeamViewer Hack Officially Attributed to Russian Cyberspies TeamViewer a confirmé que le groupe de cyberespionnage russe APT29 semble être derrière le récent hack.
>TeamViewer has confirmed that the Russian cyberespionage group APT29 appears to be behind the recent hack. ]]>
2024-07-01T07:32:38+00:00 https://www.securityweek.com/teamviewer-hack-officially-attributed-to-russian-cyberspies/ www.secnews.physaphae.fr/article.php?IdArticle=8529071 False Hack APT 29 3.0000000000000000
Dark Reading - Informationweek Branch TeamViewer crédite la segmentation du réseau pour avoir repoussé l'attaque APT29<br>TeamViewer Credits Network Segmentation for Rebuffing APT29 Attack Despite warnings from Health-ISAC and the NCC Group, the remote access software maker says defense-in-depth kept customers\' data safe from Midnight Blizzard.]]> 2024-06-28T21:22:05+00:00 https://www.darkreading.com/cyberattacks-data-breaches/teamviewer-network-segmentation-apt29-attack www.secnews.physaphae.fr/article.php?IdArticle=8527462 False None APT 29 3.0000000000000000 SecurityWeek - Security News Russian APT aurait dû à New TeamViewer Hack<br>Russian APT Reportedly Behind New TeamViewer Hack Le réseau d'entreprise de TeamViewer \\ a été piraté et certains rapports indiquent que le groupe russe APT29 est à l'origine de l'attaque.
>TeamViewer\'s corporate network was hacked and some reports say the Russian group APT29 is behind the attack. ]]>
2024-06-28T09:09:50+00:00 https://www.securityweek.com/russian-apt-reportedly-behind-new-teamviewer-hack/ www.secnews.physaphae.fr/article.php?IdArticle=8527085 False Hack APT 29 3.0000000000000000
The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Entités diplomatiques françaises ciblées dans des cyberattaques liées à la russe<br>French Diplomatic Entities Targeted in Russian-Linked Cyber Attacks State-sponsored actors with ties to Russia have been linked to targeted cyber attacks aimed at French diplomatic entities, the country\'s information security agency ANSSI said in an advisory. The attacks have been attributed to a cluster tracked by Microsoft under the name Midnight Blizzard (formerly Nobelium), which overlaps with activity tracked as APT29, BlueBravo, Cloaked Ursa, Cozy Bear,]]> 2024-06-20T19:30:00+00:00 https://thehackernews.com/2024/06/french-diplomatic-entities-targeted-in.html www.secnews.physaphae.fr/article.php?IdArticle=8521944 False None APT 29 4.0000000000000000 Mandiant - Blog Sécu de Mandiant Pole Voûte: cyber-menaces aux élections mondiales<br>Poll Vaulting: Cyber Threats to Global Elections   Executive Summary The election cybersecurity landscape globally is characterized by a diversity of targets, tactics, and threats. Elections attract threat activity from a variety of threat actors including: state-sponsored actors, cyber criminals, hacktivists, insiders, and information operations as-a-service entities. Mandiant assesses with high confidence that state-sponsored actors pose the most serious cybersecurity risk to elections. Operations targeting election-related infrastructure can combine cyber intrusion activity, disruptive and destructive capabilities, and information operations, which include elements of public-facing advertisement and amplification of threat activity claims. Successful targeting does not automatically translate to high impact. Many threat actors have struggled to influence or achieve significant effects, despite their best efforts.  When we look across the globe we find that the attack surface of an election involves a wide variety of entities beyond voting machines and voter registries. In fact, our observations of past cycles indicate that cyber operations target the major players involved in campaigning, political parties, news and social media more frequently than actual election infrastructure.   Securing elections requires a comprehensive understanding of many types of threats and tactics, from distributed denial of service (DDoS) to data theft to deepfakes, that are likely to impact elections in 2024. It is vital to understand the variety of relevant threat vectors and how they relate, and to ensure mitigation strategies are in place to address the full scope of potential activity.  Election organizations should consider steps to harden infrastructure against common attacks, and utilize account security tools such as Google\'s Advanced Protection Program to protect high-risk accounts. Introduction  The 2024 global election cybersecurity landscape is characterized by a diversity of targets, tactics, and threats. An expansive ecosystem of systems, administrators, campaign infrastructure, and public communications venues must be secured against a diverse array of operators and methods. Any election cybersecurity strategy should begin with a survey of the threat landscape to build a more proactive and tailored security posture.  The cybersecurity community must keep pace as more than two billion voters are expected to head to the polls in 2024. With elections in more than an estimated 50 countries, there is an opportunity to dynamically track how threats to democracy evolve. Understanding how threats are targeting one country will enable us to better anticipate and prepare for upcoming elections globally. At the same time, we must also appreciate the unique context of different countries. Election threats to South Africa, India, and the United States will inevitably differ in some regard. In either case, there is an opportunity for us to prepare with the advantage of intelligence.  ]]> 2024-04-25T10:00:00+00:00 https://cloud.google.com/blog/topics/threat-intelligence/cyber-threats-global-elections/ www.secnews.physaphae.fr/article.php?IdArticle=8500393 False Ransomware,Malware,Hack,Tool,Vulnerability,Threat,Legislation,Cloud,Technical APT 40,APT 29,APT 28,APT 43,APT 31,APT 42 3.0000000000000000 ProofPoint - Cyber Firms Arrêt de cybersécurité du mois: vaincre les attaques de création d'applications malveillantes<br>Cybersecurity Stop of the Month: Defeating Malicious Application Creation Attacks 2024-04-12T06:00:03+00:00 https://www.proofpoint.com/us/blog/email-and-cloud-threats/defeating-malicious-application-creation-attacks www.secnews.physaphae.fr/article.php?IdArticle=8480713 False Spam,Malware,Tool,Threat,Cloud APT 29 3.0000000000000000 Bleeping Computer - Magazine Américain CISA Orde les agences affectées par Microsoft Hack pour atténuer les risques<br>CISA orders agencies impacted by Microsoft hack to mitigate risks CISA has issued a new emergency directive ordering U.S. federal agencies to address risks resulting from the breach of multiple Microsoft corporate email accounts by the Russian APT29 hacking group. [...]]]> 2024-04-11T13:47:19+00:00 https://www.bleepingcomputer.com/news/security/cisa-orders-agencies-impacted-by-microsoft-hack-to-mitigate-risks/ www.secnews.physaphae.fr/article.php?IdArticle=8480159 False Hack APT 29 3.0000000000000000 ProofPoint - Cyber Firms Revisiter MACT: Applications malveillantes dans des locataires cloud crédibles<br>Revisiting MACT: Malicious Applications in Credible Cloud Tenants 2024-04-11T13:27:54+00:00 https://www.proofpoint.com/us/blog/cloud-security/revisiting-mact-malicious-applications-credible-cloud-tenants www.secnews.physaphae.fr/article.php?IdArticle=8480061 False Malware,Threat,Prediction,Cloud APT 29 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Le groupe russe confortable ours cible les politiciens allemands<br>Russian Cozy Bear Group Targets German Politicians Mandiant observes what it claims is the first ever APT29 campaign aimed at political parties]]> 2024-03-25T09:30:00+00:00 https://www.infosecurity-magazine.com/news/russian-cozy-bear-group-targets/ www.secnews.physaphae.fr/article.php?IdArticle=8470067 False None APT 29 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Les pirates russes utilisent \\ 'wineloader \\' malware pour cibler les partis politiques allemands<br>Russian Hackers Use \\'WINELOADER\\' Malware to Target German Political Parties The WINELOADER backdoor used in recent cyber attacks targeting diplomatic entities with wine-tasting phishing lures has been attributed as the handiwork of a hacking group with links to Russia\'s Foreign Intelligence Service (SVR), which was responsible for breaching SolarWinds and Microsoft. The findings come from Mandiant, which said Midnight Blizzard (aka APT29, BlueBravo, or]]> 2024-03-23T11:33:00+00:00 https://thehackernews.com/2024/03/russian-hackers-use-wineloader-malware.html www.secnews.physaphae.fr/article.php?IdArticle=8468914 False Malware APT 29 2.0000000000000000 Mandiant - Blog Sécu de Mandiant APT29 utilise Wineloader pour cibler les partis politiques allemands<br>APT29 Uses WINELOADER to Target German Political Parties Executive SummaryIn late February, APT29 used a new backdoor variant publicly tracked as WINELOADER to target German political parties with a CDU-themed lure.  This is the first time we have seen this APT29 cluster target political parties, indicating a possible area of emerging operational focus beyond the typical targeting of diplomatic missions.Based on the SVR\'s responsibility to collect political intelligence and this APT29 cluster\'s historical targeting patterns, we judge this activity to present a broad threat to European and other Western political parties from across the political]]> 2024-03-22T11:00:00+00:00 https://www.mandiant.com/resources/blog/apt29-wineloader-german-political-parties www.secnews.physaphae.fr/article.php?IdArticle=8469994 False Threat APT 29 2.0000000000000000 Mandiant - Blog Sécu de Mandiant APT29 Uses WINELOADER to Target German Political Parties   Executive Summary In late February, APT29 used a new backdoor variant publicly tracked as WINELOADER to target German political parties with a CDU-themed lure.   This is the first time we have seen this APT29 cluster target political parties, indicating a possible area of emerging operational focus beyond the typical targeting of diplomatic missions. Based on the SVR\'s responsibility to collect political intelligence and this APT29 cluster\'s historical targeting patterns, we judge this activity to present a broad threat to European and other Western political parties from across the political spectrum. Please see the Technical Annex for technical details and MITRE ATT&CK techniques, (T1543.003, T1012, T1082, T1134, T1057, T1007, T1027, T1070.004, T1055.003 and T1083) Threat Detail In late February 2024, Mandiant identified APT29 - a Russian Federation backed threat group linked by multiple governments to Russia\'s Foreign Intelligence Service (SVR) - conducting a phishing campaign targeting German political parties. Consistent with APT29 operations extending back to 2021, this operation leveraged APT29\'s mainstay first-stage payload ROOTSAW (aka EnvyScout) to deliver a new backdoor variant publicly tracked as WINELOADER.  Notably, this activity represents a departure from this APT29 initial access cluster\'s typical remit of targeting governments, foreign embassies, and other diplomatic missions, and is the first time Mandiant has seen an operational interest in political parties from this APT29 subcluster. Additionally, while APT29 has previously used lure documents bearing the logo of German government organizations, this is the first instance where we have seen the group use German-language lure content - a possible artifact of the targeting differences (i.e. domestic vs. foreign) between the two operations.  Phishing emails were sent to victims purporting to be an invite to a dinner reception on 01 March bearing a logo from the Christian Democratic Union (CDU), a major political party in Germany (see Figure 1).  The German-language lure document contains a phishing link directing victims to a malicious ZIP file containing a ROOTSAW dropper hosted on an actor-controlled compromised website “https://waterforvoiceless[.]org/invite.php”.  ROOTSAW delivered a second-stage CDU-themed lure document and a next stage WINELOADER payload retrieved from “waterforvoiceless[.]org/util.php”.  WINELOADER was first observed in operational use in late January 2024 in an operation targeting likely diplomatic entities in Czechia, Germany, India, Italy, Latvia, and Peru.  The backdoor contains several features and functions that overlap with several known APT29 malware families including BURNTBATTER, MUSKYBEAT and BEATDROP, indicating they are likely created by a common developer (see Technical Annex for additional details). ]]> 2024-03-22T00:00:00+00:00 https://cloud.google.com/blog/topics/threat-intelligence/apt29-wineloader-german-political-parties/ www.secnews.physaphae.fr/article.php?IdArticle=8500402 False Malware,Threat,Cloud,Technical APT 29 3.0000000000000000 HackRead - Chercher Cyber Les pirates russes de Blizzard Midnight Blizzard ont violé le code source Microsoft<br>Russian Midnight Blizzard Hackers Breached Microsoft Source Code Par deeba ahmed Midnight Blizzard (alias Cozy Bear et APT29) a initialement violé Microsoft le 12 janvier 2024. Ceci est un article de HackRead.com Lire le post original: Les pirates russes de Blizzard Midnight ont violé le code source Microsoft
>By Deeba Ahmed Midnight Blizzard (aka Cozy Bear and APT29) originally breached Microsoft on January 12, 2024. This is a post from HackRead.com Read the original post: Russian Midnight Blizzard Hackers Breached Microsoft Source Code]]>
2024-03-11T12:19:02+00:00 https://www.hackread.com/russia-midnight-blizzard-hackers-microsoft-source-code/ www.secnews.physaphae.fr/article.php?IdArticle=8462118 False None APT 29 2.0000000000000000
InfoSecurity Mag - InfoSecurity Magazine La blizzard minuit de la Russie accède au code source Microsoft<br>Russia\\'s Midnight Blizzard Accesses Microsoft Source Code Threat group APT29 is using secrets stolen in an earlier attack to compromise Microsoft\'s internal systems]]> 2024-03-11T09:30:00+00:00 https://www.infosecurity-magazine.com/news/russias-midnight-blizzard/ www.secnews.physaphae.fr/article.php?IdArticle=8462049 False Threat APT 29 3.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Microsoft confirme que les pirates russes ont volé le code source, certains secrets des clients<br>Microsoft Confirms Russian Hackers Stole Source Code, Some Customer Secrets Microsoft on Friday revealed that the Kremlin-backed threat actor known as Midnight Blizzard (aka APT29 or Cozy Bear) managed to gain access to some of its source code repositories and internal systems following a hack that came to light in January 2024. "In recent weeks, we have seen evidence that Midnight Blizzard is using information initially exfiltrated from our]]> 2024-03-09T09:31:00+00:00 https://thehackernews.com/2024/03/microsoft-confirms-russian-hackers.html www.secnews.physaphae.fr/article.php?IdArticle=8461117 False Hack,Threat APT 29 3.0000000000000000 CyberScoop - scoopnewsgroup.com special Cyber Les pirates russes ont accédé au code source Microsoft<br>Russian hackers accessed Microsoft source code Un incident attribué à l'équipage de piratage russe confortable ours qui a été divulgué pour la première fois en janvier continue d'affecter Microsoft Systems.
>An incident attributed to the Russian hacking crew Cozy Bear that was first disclosed in January continues to affect Microsoft systems. ]]>
2024-03-08T20:41:15+00:00 https://cyberscoop.com/microsoft-cozy-bear-russia/ www.secnews.physaphae.fr/article.php?IdArticle=8460972 False None APT 29 3.0000000000000000
TechRepublic - Security News US Les problèmes NCSC de UK \\ ont avertissement en tant que pirates SVR ciblent les services cloud<br>UK\\'s NCSC Issues Warning as SVR Hackers Target Cloud Services Cyber espionage group APT29 is adapting its tactics for cloud environments. Here\'s what you should know.]]> 2024-03-01T20:15:10+00:00 https://www.techrepublic.com/article/ncsc-uk-svr-cyber-threat-actors/ www.secnews.physaphae.fr/article.php?IdArticle=8457678 False Cloud APT 29 2.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Cinq agences Eyes exposent des tactiques d'évolution des nuages en évolution de l'APT29 \\<br>Five Eyes Agencies Expose APT29\\'s Evolving Cloud Attack Tactics Cybersecurity and intelligence agencies from the Five Eyes nations have released a joint advisory detailing the evolving tactics of the Russian state-sponsored threat actor known as APT29. The hacking outfit, also known as BlueBravo, Cloaked Ursa, Cozy Bear, Midnight Blizzard (formerly Nobelium), and The Dukes, is assessed to be affiliated with the Foreign Intelligence Service (SVR) of the]]> 2024-02-27T16:04:00+00:00 https://thehackernews.com/2024/02/five-eyes-agencies-expose-apt29s.html www.secnews.physaphae.fr/article.php?IdArticle=8455808 False Threat,Cloud APT 29 3.0000000000000000 The Register - Site journalistique Anglais L'ours confortable de la Russie plonge dans des environnements cloud avec un nouveau sac de trucs<br>Russia\\'s Cozy Bear dives into cloud environments with a new bag of tricks Kremlin\'s spies tried out the TTPs on Microsoft, and now they\'re off to the races Russia\'s notorious Cozy Bear, the crew behind the SolarWinds supply chain attack, has expanded its targets and evolved its techniques to break into organizations\' cloud environments, according to the Five Eyes governments.…]]> 2024-02-27T01:00:06+00:00 https://go.theregister.com/feed/www.theregister.com/2024/02/27/russia_cozy_bear_new_ttps/ www.secnews.physaphae.fr/article.php?IdArticle=8455631 False Cloud APT 29 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine CISA Issues Alert sur les tactiques d'infiltration des nuages d'APT29 \\<br>CISA Issues Alert on APT29\\'s Cloud Infiltration Tactics Known as Midnight Blizzard, the Dukes or Cozy Bear, the group has been identified as a Russian entity likely operating under the SVR]]> 2024-02-26T17:15:00+00:00 https://www.infosecurity-magazine.com/news/cisa-alert-apt29s-cloud-tactics/ www.secnews.physaphae.fr/article.php?IdArticle=8455490 False Cloud APT 29 2.0000000000000000 Global Security Mag - Site de news francais L\'attaque d\'APT29 contre Microsoft : Suivre les traces de Cozy Bear – analyse de CyberArk Malwares]]> 2024-02-09T09:20:11+00:00 https://www.globalsecuritymag.fr/l-attaque-d-apt29-contre-microsoft-suivre-les-traces-de-cozy-bear-analyse-de.html www.secnews.physaphae.fr/article.php?IdArticle=8448321 False None APT 29 2.0000000000000000 CyberArk - Software Vendor Attaque d'APT29 \\ sur Microsoft: suivi des empreintes de pas Cozy Bear \\<br>APT29\\'s Attack on Microsoft: Tracking Cozy Bear\\'s Footprints A new and concerning chapter has unfolded in these troubled times of geopolitical chaos. The Cozy Bear threat actor has caused significant breaches targeting Microsoft and HPE, and more are likely to come. These recent...]]> 2024-02-08T14:51:00+00:00 https://www.cyberark.com/blog/apt29s-attack-on-microsoft-tracking-cozy-bears-footprints/ www.secnews.physaphae.fr/article.php?IdArticle=8448041 False Threat APT 29 3.0000000000000000 Checkpoint Research - Fabricant Materiel Securite 29 janvier & # 8211;Rapport de renseignement sur les menaces<br>29th January – Threat Intelligence Report Pour les dernières découvertes en cyberLes meilleures attaques et violations à la suite des rapports sur l'APT29 affiliée à la Russie (alias Cozy Bear, Midnight Blizzard) contre Microsoft, également Hewlett-Packard Enterprise ont reconnu avoir été attaqué par le même acteur de menace.Tandis que Microsoft a détecté la violation de janvier [& # 8230;]
>For the latest discoveries in cyber research for the week of 29th January, please download our Threat_Intelligence Bulletin. TOP ATTACKS AND BREACHES Following the reports on Russia-affiliated APT29 (AKA Cozy Bear, Midnight Blizzard) attack against Microsoft, also Hewlett-Packard Enterprise acknowledged it was attacked by the same threat actor. While Microsoft detected the breach on January […] ]]>
2024-01-29T13:51:49+00:00 https://research.checkpoint.com/2024/29th-january-threat-intelligence-report/ www.secnews.physaphae.fr/article.php?IdArticle=8444429 False Threat APT 29 2.0000000000000000
The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Microsoft met en garde contre l'élargissement des attaques d'espionnage APT29 ciblant les orgs mondiaux<br>Microsoft Warns of Widening APT29 Espionage Attacks Targeting Global Orgs Microsoft on Thursday said the Russian state-sponsored threat actors responsible for a cyber attack on its systems in late November 2023 have been targeting other organizations and that it\'s currently beginning to notify them. The development comes a day after Hewlett Packard Enterprise (HPE) revealed that it had been the victim of an attack perpetrated by a hacking crew]]> 2024-01-26T11:33:00+00:00 https://thehackernews.com/2024/01/microsoft-warns-of-widening-apt29.html www.secnews.physaphae.fr/article.php?IdArticle=8443285 False Threat APT 29 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine HPE dit que les pirates Solarwinds ont accédé à ses e-mails<br>HPE Says SolarWinds Hackers Accessed its Emails Hewlett Packard Enterprise reveals that Russian state APT29 hackers stole data from corporate mailboxes]]> 2024-01-25T09:30:00+00:00 https://www.infosecurity-magazine.com/news/hpe-solarwinds-hackers-accessed/ www.secnews.physaphae.fr/article.php?IdArticle=8442894 False None APT 29 3.0000000000000000 Recorded Future - FLux Recorded Future Hewlett Packard Enterprise dit à SEC qu'elle a été violée par la Russie \\ 'S \\' Cozy Bear \\ 'Hackers<br>Hewlett Packard Enterprise tells SEC it was breached by Russia\\'s \\'Cozy Bear\\' hackers Des pirates avec des liens présumés avec le gouvernement russe ont eu accès au fabricant de technologies Hewlett Packard Enterprise Co. \'S (HPE) Environnement de messagerie basé sur le cloud, a annoncé mercredi la société.Dans un Déposant avec des régulateurs SEC le mercredi après-midi, HPE a déclaré qu'il avait été informé le 12 décembre que des pirates se connectaient à confort
Hackers with suspected ties to the Russian government gained access to the technology manufacturer Hewlett Packard Enterprise Co.\'s (HPE) cloud-based email environment, the company said Wednesday. In a filing with SEC regulators on Wednesday afternoon, HPE said it was notified on December 12 that hackers connected to Cozy Bear, also known as Midnight Blizzard, had]]>
2024-01-24T22:15:00+00:00 https://therecord.media/hpe-tells-sec-breached-by-cozy-bear www.secnews.physaphae.fr/article.php?IdArticle=8442718 False None APT 29 3.0000000000000000
knowbe4 - cybersecurity services Les pirates russes gagnent gros: les e-mails de l'équipe d'exécution senior de Microsoft \\<br>Russian Hackers Win Big: Microsoft\\'s Senior Exec Team Emails Breached Les pirates russes gagnent gros: les e-mails seniors de l'exécutif de Microsoft \\ de Microsoft ont violé dans un vendredi Fileling de réglementation , Microsoft a euont indiqué que ses comptes de messagerie d'entreprise ont été compromis par un groupe de piratage parrainé par l'État russe connu sous le nom de Midnight Blizzard, également identifié comme Nobelium ou APT29.La divulgation de Microsoft s'aligne sur les nouvelles exigences américaines pour la déclaration des incidents de cybersécurité.L'attaque a été détectée le 12 janvier 2023, mais elle semble avoir commencé en novembre 2023. La brèche et l'attaque L'attaque a impliqué des pirates russes à l'aide d'une attaque en pulvérisation de mot de passe pour accéder à un compte de locataire de test non production hérité de Microsoft.La pulvérisation de mot de passe est une technique de force brute où les attaquants tentent de se connecter à l'aide d'une liste de noms d'utilisateur et de mots de passe potentiels.
Russian Hackers Win Big: Microsoft\'s Senior Exec Team Emails Breached In a Friday regulatory filing, Microsoft has reported that its corporate email accounts were compromised by a Russian state-sponsored hacking group known as Midnight Blizzard, also identified as Nobelium or APT29. Microsoft\'s disclosure aligns with new U.S. requirements for reporting cybersecurity incidents. The attack was detected on January 12th, 2023, but it appears to have started in November 2023.The Breach and AttackThe attack involved Russian hackers using a password spray attack to access a legacy non-production test tenant account at Microsoft. Password spraying is a brute force technique where attackers attempt to log in using a list of potential usernames and passwords.]]>
2024-01-20T14:45:06+00:00 https://blog.knowbe4.com/russian-hackers-win-big-microsofts-senior-exec-team-emails-breached www.secnews.physaphae.fr/article.php?IdArticle=8441002 False None APT 29 3.0000000000000000
RiskIQ - cyber risk firms (now microsoft) Russian Foreign Intelligence Service (SVR) exploitant JetBrains TeamCity Cve dans le monde entier<br>Russian Foreign Intelligence Service (SVR) Exploiting JetBrains TeamCity CVE Globally #### Description Russian Foreign Intelligence Service (SVR) cyber actors-also known as Advanced Persistent Threat 29 (APT 29), the Dukes, CozyBear, and NOBELIUM/Midnight Blizzard-are exploiting CVE-2023-42793 at a large scale, targeting servers hosting JetBrains TeamCity software since September 2023. Software developers use TeamCity software to manage and automate software compilation, building, testing, and releasing. If compromised, access to a TeamCity server would provide malicious actors with access to that software developer\'s source code, signing certificates, and the ability to subvert software compilation and deployment processes-access a malicious actor could further use to conduct supply chain operations. Although the SVR used such access to compromise SolarWinds and its customers in 2020, limited number and seemingly opportunistic types of victims currently identified, indicate that the SVR has not used the access afforded by the TeamCity CVE in a similar manner. The SVR has, however, been observed using the initial access gleaned by exploiting the TeamCity CVE to escalate its privileges, move laterally, deploy additional backdoors, and take other steps to ensure persistent and long-term access to the compromised network environments. #### Reference URL(s) 1. https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-347a #### Publication Date December 12, 2023 #### Author(s) CISA ]]> 2023-12-20T21:21:37+00:00 https://community.riskiq.com/article/4dba0576 www.secnews.physaphae.fr/article.php?IdArticle=8426379 False Threat APT 29 3.0000000000000000 HackRead - Chercher Cyber L'APT29 russe a piraté le géant biomédical des États-Unis en violation liée à l'équipe<br>Russian APT29 Hacked US Biomedical Giant in TeamCity-Linked Breach Par waqas Les autorités polonaises et les laboratoires Fortiguard ont émis un avertissement aux clients d'une nouvelle vague de cyberattaques associées à TeamCity. Ceci est un article de HackRead.com Lire le post original: L'APT29 russe a piraté le géant biomédical américain en violation liée à l'équipe
>By Waqas Polish authorities and FortiGuard Labs have issued a warning to customers about a new wave of cyberattacks associated with TeamCity. This is a post from HackRead.com Read the original post: Russian APT29 Hacked US Biomedical Giant in TeamCity-Linked Breach]]>
2023-12-15T00:15:19+00:00 https://www.hackread.com/russian-apt29-hacked-us-biomedical-teamcity/ www.secnews.physaphae.fr/article.php?IdArticle=8422928 False None APT 29 2.0000000000000000
The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) L'APT29 lié à la SVR russe cible les serveurs d'équipe Jetbrains dans les attaques en cours<br>Russian SVR-Linked APT29 Targets JetBrains TeamCity Servers in Ongoing Attacks Threat actors affiliated with the Russian Foreign Intelligence Service (SVR) have targeted unpatched JetBrains TeamCity servers in widespread attacks since September 2023. The activity has been tied to a nation-state group known as APT29, which is also tracked as BlueBravo, Cloaked Ursa, Cozy Bear, Midnight Blizzard (formerly Nobelium), and The Dukes. It\'s notable for the supply chain]]> 2023-12-14T16:02:00+00:00 https://thehackernews.com/2023/12/russian-svr-linked-apt29-targets.html www.secnews.physaphae.fr/article.php?IdArticle=8422584 False Threat APT 29 2.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine Les pirates d'ours confortables ciblent les serveurs TeamCity JetBrains dans Global Campaign<br>Cozy Bear Hackers Target JetBrains TeamCity Servers in Global Campaign The FBI and CISA detected that hackers linked to the Russian foreign intelligence service (SVR) have been targeting a JetBrains TeamCity vulnerability since September 2023]]> 2023-12-14T15:30:00+00:00 https://www.infosecurity-magazine.com/news/cozy-bear-russia-jetbrains-teamcity/ www.secnews.physaphae.fr/article.php?IdArticle=8422706 False Vulnerability APT 29 3.0000000000000000 Dark Reading - Informationweek Branch L'exploitation mondiale de l'équipe ouvre la porte au cauchemar de style solarwinds<br>Global TeamCity Exploitation Opens Door to SolarWinds-Style Nightmare Russia\'s APT29 is going after a critical RCE flaw in the JetBrains TeamCity software developer platform, prompting governments worldwide to issue an urgent warning to patch.]]> 2023-12-13T23:26:00+00:00 https://www.darkreading.com/vulnerabilities-threats/global-teamcity-exploitation-opens-door-to-solarwinds-style-nightmare www.secnews.physaphae.fr/article.php?IdArticle=8422329 False Threat APT 29 3.0000000000000000 Fortinet - Fabricant Materiel Securite TeamCity Intrusion Saga: APT29 suspecté parmi les attaquants exploitant CVE-2023-42793<br>TeamCity Intrusion Saga: APT29 Suspected Among the Attackers Exploiting CVE-2023-42793 FortiGuardLabs discovered a new APT29 campaign which includes TeamCity exploitation and GraphicalProton malware. Learn more.]]> 2023-12-13T15:00:00+00:00 https://www.fortinet.com/blog/threat-research/teamcity-intrusion-saga-apt29-suspected-exploiting-cve-2023-42793 www.secnews.physaphae.fr/article.php?IdArticle=8422188 False Malware APT 29 3.0000000000000000 Global Security Mag - Site de news francais APT 29 exploite WinRAR pour attaquer des ambassades en Europe Malwares]]> 2023-11-24T09:30:46+00:00 https://www.globalsecuritymag.fr/APT-29-exploite-WinRAR-pour-attaquer-des-ambassades-en-Europe.html www.secnews.physaphae.fr/article.php?IdArticle=8416529 False None APT 29,APT 29 3.0000000000000000 InfoSecurity Mag - InfoSecurity Magazine L'APT29 de la Russie cible les ambassades avec Ngrok et Winrar Exploit<br>Russia\\'s APT29 Targets Embassies With Ngrok and WinRAR Exploit Threat group may be looking for intel on Azerbaijan]]> 2023-11-20T10:00:00+00:00 https://www.infosecurity-magazine.com/news/russias-apt29-embassies-ngrok/ www.secnews.physaphae.fr/article.php?IdArticle=8414772 False Threat APT 29,APT 29 3.0000000000000000 Bleeping Computer - Magazine Américain Les pirates russes utilisent la fonctionnalité Ngrok et l'exploit Winrar pour attaquer les ambassades<br>Russian hackers use Ngrok feature and WinRAR exploit to attack embassies After Sandworm and APT28 (known as Fancy Bear), another state-sponsored Russian hacker group, APT29, is leveraging the CVE-2023-38831 vulnerability in WinRAR for cyberattacks. [...]]]> 2023-11-19T11:14:25+00:00 https://www.bleepingcomputer.com/news/security/russian-hackers-use-ngrok-feature-and-winrar-exploit-to-attack-embassies/ www.secnews.physaphae.fr/article.php?IdArticle=8414888 False Vulnerability,Threat APT 29,APT 28 3.0000000000000000 Recorded Future - FLux Recorded Future Opération de cyber-espionnage sur les ambassades liées aux pirates confortables de la Russie<br>Cyber-espionage operation on embassies linked to Russia\\'s Cozy Bear hackers Les pirates russes parrainés par l'État ont ciblé des ambassades et des organisations internationales dans une récente campagne de cyber-espionnage, ont révélé que les chercheurs du gouvernement ukrainien ont révélé.Les attaques ont été attribuées au tristement célèbre groupe de pirates étiqueté APT29, également connu sous le nom de confortable ours ou de bravo bleu.Auparavant, les analystes l'ont lié au service de renseignement étranger de la Russie (SVR), qui rassemble
Russian state-sponsored hackers have targeted embassies and international organizations in a recent cyber-espionage campaign, Ukrainian government cybersecurity researchers have found. The attacks were attributed to the infamous hacker group labeled APT29, also known as Cozy Bear or Blue Bravo. Analysts previously have linked it to Russia\'s Foreign Intelligence Service (SVR), which gathers political and economic]]>
2023-11-14T16:34:00+00:00 https://therecord.media/cyber-espionage-campaign-embassies-apt29-cozy-bear www.secnews.physaphae.fr/article.php?IdArticle=8411945 False None APT 29,APT 29 3.0000000000000000
Bleeping Computer - Magazine Américain La SEC poursuit Solarwinds pour les investisseurs trompeurs avant 2020 Hack<br>SEC sues SolarWinds for misleading investors before 2020 hack The U.S. Securities and Exchange Commission (SEC) today charged SolarWinds with defrauding investors by allegedly concealing cybersecurity defense issues before a December 2020 linked to APT29, the Russian Foreign Intelligence Service (SVR) hacking division. [...]]]> 2023-10-30T17:54:13+00:00 https://www.bleepingcomputer.com/news/security/sec-sues-solarwinds-for-misleading-investors-before-2020-hack/ www.secnews.physaphae.fr/article.php?IdArticle=8403150 False Hack Solardwinds,APT 29 3.0000000000000000 AhnLab - Korean Security Firm 2023 août & # 8211;Rapport de tendance des menaces sur les groupes APT<br>2023 Aug – Threat Trend Report on APT Groups août 2023 Problèmes majeurs sur les groupes de l'APT 1) Andariel 2) APT29 3) APT31 4) amer 5)Bronze Starlight 6) Callisto 7) Cardinbee 8) Typhoon de charbon de bois (Redhotel) 9) Terre estrie 10) Typhon de lin 11) Groundpeony 12) Chisel infâme 13) Kimsuky 14) Lazarus 15)Moustachedbouncher 16) Éléphant mystérieux (APT-K-47) 17) Nobelium (Blizzard de minuit) 18) Red Eyes (APT37) Aug_Thereat Trend Rapport sur les groupes APT
August 2023 Major Issues on APT Groups 1) Andariel 2) APT29 3) APT31 4) Bitter 5) Bronze Starlight 6) Callisto 7) Carderbee 8) Charcoal Typhoon (RedHotel) 9) Earth Estries 10) Flax Typhoon 11) GroundPeony 12) Infamous Chisel 13) Kimsuky 14) Lazarus 15) MoustachedBouncher 16) Mysterious Elephant (APT-K-47) 17) Nobelium (Midnight Blizzard) 18) Red Eyes (APT37) Aug_Threat Trend Report on APT Groups ]]>
2023-10-23T02:22:16+00:00 https://asec.ahnlab.com/en/57930/ www.secnews.physaphae.fr/article.php?IdArticle=8399124 False Threat,Prediction APT 38,APT 38,APT 37,APT 29,APT 31 3.0000000000000000
Mandiant - Blog Sécu de Mandiant Diplomatie de backchannel: les opérations de phishing diplomatique en évolution rapide de l'APT29<br>Backchannel Diplomacy: APT29\\'s Rapidly Evolving Diplomatic Phishing Operations Key Insights APT29\'s pace of operations and emphasis on Ukraine increased in the first half of 2023 as Kyiv launched its counteroffensive, pointing to the SVR\'s central role in collecting intelligence concerning the current pivotal phase of the war. During this period, Mandiant has tracked substantial changes in APT29\'s tooling and tradecraft, likely designed to support the increased frequency and scope of operations and hinder forensic analysis.  APT29 has used various infection chains simultaneously across different operations, indicating that distinct initial access operators or]]> 2023-09-21T09:00:00+00:00 https://www.mandiant.com/resources/blog/apt29-evolving-diplomatic-phishing www.secnews.physaphae.fr/article.php?IdArticle=8386704 False None APT 29 3.0000000000000000 AhnLab - Korean Security Firm Rapport de tendance des menaces sur les groupes APT & # 8211;Juillet 2023<br>Threat Trend Report on APT Groups – July 2023 juillet 2023 Problèmes majeurs sur les groupes APT 1) APT28 2) APT29 3) APT31 4) Camouflaged Hunter 5) Chicheur charmant 6) Gamaredon 7) Kimsuky 8) Konni 9) Lazarus 10) Mustang Panda 11) Patchwork 12) Eyes rouges 13) Pirates d'espace 14) Turla 15) ATIP_2023_JUL_JULAT RAPPORT D'APTER LE Rapport sur les APT
July 2023 Major Issues on APT Groups 1) APT28 2) APT29 3) APT31 4) Camouflaged Hunter 5) Charming Kitten 6) Gamaredon 7) Kimsuky 8) Konni 9) Lazarus 10) Mustang Panda 11) Patchwork 12) Red Eyes 13) Space Pirates 14) Turla 15) Unclassified ATIP_2023_Jul_Threat Trend Report on APT Groups ]]>
2023-09-11T05:02:48+00:00 https://asec.ahnlab.com/en/56971/ www.secnews.physaphae.fr/article.php?IdArticle=8381128 False Threat,Prediction APT 38,APT 37,APT 37,APT 35,APT 35,APT 29,APT 29,APT 28,APT 28,APT 31 2.0000000000000000
The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Les pirates russes utilisent une application de chat Zulip pour C & C Covert dans les attaques de phishing diplomatique<br>Russian Hackers Use Zulip Chat App for Covert C&C in Diplomatic Phishing Attacks An ongoing campaign targeting ministries of foreign affairs of NATO-aligned countries points to the involvement of Russian threat actors. The phishing attacks feature PDF documents with diplomatic lures, some of which are disguised as coming from Germany, to deliver a variant of a malware called Duke, which has been attributed to APT29 (aka BlueBravo, Cloaked Ursa, Cozy Bear, Iron Hemlock,]]> 2023-08-17T15:09:00+00:00 https://thehackernews.com/2023/08/russian-hackers-use-zulip-chat-app-for.html www.secnews.physaphae.fr/article.php?IdArticle=8371161 False Malware,Threat APT 29 2.0000000000000000 knowbe4 - cybersecurity services Les pirates russes ont violé les agences gouvernementales \\ 'MFA utilisant des équipes Microsoft: votre entreprise est-elle la prochaine?<br>Russian Hackers Breached Government Agencies\\' MFA Using Microsoft Teams: Is Your Business Next?  Les pirates russes ont violé les agences gouvernementales \\ 'MFA utilisant des équipes Microsoft: votre entreprise est-elle la prochaine? récent de Microsoft \\ Article de blog Les sourcils ont haussé les sourcils à travers la communauté de la cybersécurité.Les pirates d'État liés à la Russie, connus sous le nom d'APT29 ou confortable, ont exécuté des attaques de phishing «hautement ciblées» via la plate-forme des équipes de Microsoft \\.Ce sont les mêmes pirates derrière l'historique Solarwinds Hack en 2020 et la violation de 2016 du Comité national démocrate. La méthode était à la fois sophistiquée et alarmante.En compromettant les comptes Microsoft 365 appartenant à des petites entreprises, les pirates ont créé des domaines pour tromper leurs cibles via des messages Microsoft Teams.Ils ont engagé des utilisateurs et obtenu l'approbation des invites en MFA, contournant ce qui est généralement considéré comme une mesure de sécurité robuste. & Nbsp;
Russian Hackers Breached Government Agencies\' MFA Using Microsoft Teams: Is Your Business Next? Microsoft\'s recent blog post raised eyebrows through the cybersecurity community. State-backed hackers linked to Russia, known as APT29 or Cozy Bear, have executed “highly targeted” phishing attacks through Microsoft\'s Teams platform. These are the same hackers behind the historic SolarWinds hack in 2020 and the 2016 breach of the Democratic National Committee.The method was both sophisticated and alarmingly simple. By compromising Microsoft 365 accounts owned by small businesses, the hackers created domains to deceive their targets through Microsoft Teams messages. They engaged users and elicited approval of MFA prompts, bypassing what is usually considered a robust security measure. ]]>
2023-08-06T14:22:10+00:00 https://blog.knowbe4.com/russian-hackers-breached-government-agencies-mfa-using-microsoft-teams-is-your-business-next www.secnews.physaphae.fr/article.php?IdArticle=8366414 False None APT 29,APT 29 4.0000000000000000
Netskope - etskope est une société de logiciels américaine fournissant une plate-forme de sécurité informatique Mémo sur les menaces du cloud: les acteurs de la menace parrainés par l'État russe exploitent de plus en plus les services cloud légitimes<br>Cloud Threats Memo: Russian State-sponsored Threat Actors Increasingly Exploiting Legitimate Cloud Services Les acteurs de la menace parrainés par l'État continuent d'exploiter les services cloud légitimes, et en particulier un groupe, l'APT29 russe (également connu sous le nom de confortable ours, Ursa masqué, Bluebravo, Midnight Blizzard et anciennement Nobelium), semble particulièrement actif.Entre mars et mai 2023, les chercheurs en sécurité du groupe INSIKT de Future \\ ont déniché une campagne de cyber-espionnage par la même [& # 8230;]
>State-sponsored threat actors continue to exploit legitimate cloud services, and especially one group, the Russian APT29 (also known as Cozy Bear, Cloaked Ursa, BlueBravo, Midnight Blizzard, and formerly Nobelium), seems to be particularly active. Between March and May 2023, security researchers at Recorded Future\'s Insikt Group have unearthed a cyber espionage campaign by the same […] ]]>
2023-08-04T16:48:11+00:00 https://www.netskope.com/blog/cloud-threats-memo-russian-state-sponsored-threat-actors-increasingly-exploiting-legitimate-cloud-services www.secnews.physaphae.fr/article.php?IdArticle=8365743 False Threat,Cloud APT 29,APT 29 2.0000000000000000
The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Microsoft expose les pirates russes \\ 'Tactiques de phishing sournoises via les chats des équipes Microsoft<br>Microsoft Exposes Russian Hackers\\' Sneaky Phishing Tactics via Microsoft Teams Chats Microsoft on Wednesday disclosed that it identified a set of highly targeted social engineering attacks mounted by a Russian nation-state threat actor using credential theft phishing lures sent as Microsoft Teams chats. The tech giant attributed the attacks to a group it tracks as Midnight Blizzard (previously Nobelium). It\'s also called APT29, BlueBravo, Cozy Bear, Iron Hemlock, and The Dukes.]]> 2023-08-03T12:08:00+00:00 https://thehackernews.com/2023/08/microsoft-exposes-russian-hackers.html www.secnews.physaphae.fr/article.php?IdArticle=8365093 False Threat APT 29 2.0000000000000000 Recorded Future - FLux Recorded Future Les pirates militaires russes ont envoyé des leurres de phishing se faisant passer pour les équipes de Microsoft.<br>Russian military hackers sent phishing lures masquerading as Microsoft Teams chats Les pirates au sein de l'armée russe ont utilisé des discussions sur les équipes de Microsoft comme des leurres de phishing dans des «attaques d'ingénierie sociale hautement ciblées», selon des responsables de la sécurité de Microsoft.Le géant de la technologie a déclaré mercredi qu'il avait découvert une campagne d'un groupe de piratage russe prolifique qu'ils appellent Midnight Blizzard, mais est le plus communément appelé Nobelium, confortable ours ou APT29.
Hackers within the Russian military used Microsoft Teams chats as phishing lures in “highly targeted social engineering attacks,” according to security officials at Microsoft. The tech giant said on Wednesday it uncovered a campaign by a prolific Russian hacking group they call Midnight Blizzard but is most commonly known as NOBELIUM, Cozy Bear or APT29.]]>
2023-08-02T20:47:00+00:00 https://therecord.media/russian-hackers-sent-phishing-lures www.secnews.physaphae.fr/article.php?IdArticle=8364908 False None APT 29,APT 29 3.0000000000000000
The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) BlueBravo déploie une porte dérobée GraphicalProton contre les entités diplomatiques européennes<br>BlueBravo Deploys GraphicalProton Backdoor Against European Diplomatic Entities The Russian nation-state actor known as BlueBravo has been observed targeting diplomatic entities throughout Eastern Europe with the goal of delivering a new backdoor called GraphicalProton, exemplifying the continuous evolution of the threat. The phishing campaign is characterized by the use of legitimate internet services (LIS) for command-and-control (C2) obfuscation, Recorded Future said in]]> 2023-07-28T14:24:00+00:00 https://thehackernews.com/2023/07/bluebravo-deploys-graphicalproton.html www.secnews.physaphae.fr/article.php?IdArticle=8362655 False None APT 29,APT 29 2.0000000000000000 Dark Reading - Informationweek Branch Les attaquants de Solarwinds pendent des BMW pour espionner les diplomates<br>SolarWinds Attackers Dangle BMWs to Spy on Diplomats Cloaked Ursa/Nobelium gets creative by appealing to the more personal needs of government employees on foreign missions in Kyiv.]]> 2023-07-13T15:48:58+00:00 https://www.darkreading.com/endpoint/solarwinds-attackers-bmws-spy-diplomats www.secnews.physaphae.fr/article.php?IdArticle=8356067 False None APT 29 4.0000000000000000 AhnLab - Korean Security Firm Rapport de tendance des menaces sur les groupes APT & # 8211;Mai 2023<br>Threat Trend Report on APT Groups – May 2023 Les cas de grands groupes APT pour le mai 2023 réunis à partir de documents rendus publics par des sociétés de sécurité et des institutions sont comme commesuit.& # 8211;Agrius & # 8211;Andariel & # 8211;APT28 & # 8211;APT29 & # 8211;APT-C-36 (Blind Eagle) & # 8211;Camaro Dragon & # 8211;CloudWizard & # 8211;Earth Longzhi (APT41) & # 8211;Goldenjackal & # 8211;Kimsuky & # 8211;Lazarus & # 8211;Lancefly & # 8211;Oilalpha & # 8211;Red Eyes (Apt37, Scarcruft) & # 8211;Sidecopy & # 8211;Sidewinder & # 8211;Tribu transparente (APT36) & # 8211;Volt Typhoon (Silhouette de bronze) ATIP_2023_MAY_TRADEAT Rapport sur les groupes APT_20230609
The cases of major APT groups for May 2023 gathered from materials made public by security companies and institutions are as follows. – Agrius – Andariel – APT28 – APT29 – APT-C-36 (Blind Eagle) – Camaro Dragon – CloudWizard – Earth Longzhi (APT41) – GoldenJackal – Kimsuky – Lazarus – Lancefly – OilAlpha – Red Eyes (APT37, ScarCruft) – SideCopy – SideWinder – Transparent Tribe (APT36) – Volt Typhoon (Bronze Silhouette) ATIP_2023_May_Threat Trend Report on APT Groups_20230609 ]]>
2023-07-07T02:33:29+00:00 https://asec.ahnlab.com/en/55184/ www.secnews.physaphae.fr/article.php?IdArticle=8353225 False Threat,Prediction APT 41,APT 38,APT 37,APT 37,APT 29,APT 29,APT 28,APT 28,APT 36,APT 36,Guam,Guam,APT-C-17,APT-C-17,GoldenJackal,GoldenJackal,APT-C-36 3.0000000000000000
Soc Radar - Blog spécialisé SOC Le vol d'accréditation attaque la surtension: Microsoft soulève le drapeau rouge sur Midnight Blizzard (APT29)<br>Credential Theft Attacks Surge: Microsoft Raises Red Flag on Midnight Blizzard (APT29) Microsoft has identified Midnight Blizzard, a Russian state-affiliated hacking group also known as APT29, as... ]]> 2023-06-27T08:30:52+00:00 https://socradar.io/credential-theft-attacks-surge-microsoft-raises-red-flag-on-midnight-blizzard-apt29/ www.secnews.physaphae.fr/article.php?IdArticle=8349658 False None APT 29 2.0000000000000000 Recorded Future - FLux Recorded Future Le groupe de piratage soutenu par le Kremlin met un nouvel accent sur le vol d'identification<br>Kremlin-backed hacking group puts fresh emphasis on stealing credentials Microsoft a détecté Une augmentation des attaques de vol d'identification menées par le groupe de pirates affilié à l'État russe souvent étiqueté comme APT29, Cozy Bear, Bearsou Nobelium.Ces attaques s'adressent aux gouvernements, aux prestataires de services informatiques, aux organisations non gouvernementales (ONG) et aux industries de la défense et de la fabrication critiques.Sous Microsoft \'s nouvelle convention de dénomination Menaces (APTS), l'entreprise appelle
Microsoft has detected an increase in credential-stealing attacks conducted by the Russian state-affiliated hacker group often labeled as APT29, Cozy Bear or Nobelium. These attacks are directed at governments, IT service providers, nongovernmental organizations (NGOs), and defense and critical manufacturing industries. Under Microsoft\'s new naming convention for advanced persistent threats (APTs), the company is calling]]>
2023-06-21T20:21:00+00:00 https://therecord.media/nobelium-hacking-group-stealing-credentials www.secnews.physaphae.fr/article.php?IdArticle=8347838 False None APT 29 2.0000000000000000
Anomali - Firm Blog Anomali Cyber Watch: Cozy Bear utilise de nouveaux téléchargeurs, RTM Locker Ransomware cherche une vie privée, vice Society Automated Selective Exfiltration<br>Anomali Cyber Watch: Cozy Bear Employs New Downloaders, RTM Locker Ransomware Seeks Privacy, Vice Society Automated Selective Exfiltration Figure 1 - Diagrammes de résumé du CIO.Ces graphiques résument les CIO attachés à ce magazine et donnent un aperçu des menaces discutées. Cyber News et Intelligence des menaces banquier QBOT livré par correspondance commerciale (Publié: 17 avril 2023) Début avril 2023, un volume accru de Malspam en utilisant le détournement de fil commercial-imail a été détecté pour fournir le troin bancaire QBOT (QAKBOT, Quackbot, Pinkslipbot).Les leurres observés en anglais, en allemand, en italien et en français visaient divers pays, les trois premiers étant l'Allemagne, l'Argentine et l'Italie, dans cet ordre.Les attaquants usurpaient un nom dans la conversation détournée pour inciter la cible à ouvrir un fichier PDF ci-joint.La cible est ensuite confrontée à un bouton, à un mot de passe et à une instruction pour télécharger, déballer et exécuter un fichier de script Windows malveillant (WSF) dans une archive protégée par mot de passe.L'exécution des utilisateurs est suivie d'une désobfuscation automatisée d'un JScript contenu produisant un script PowerShell codé visant à télécharger une DLL QBOT à partir d'un site Web compromis et à l'exécuter à l'aide de RunDLL32.QBOT vole les informations d'identification, profil les systèmes pour identifier les perspectives de ciblage supplémentaire de grande valeur et vole des e-mails stockés localement pour une prolifération supplémentaire via le détournement de fil calspam. Commentaire de l'analyste: L'usurpation du nom de l'expéditeur des lettres précédentes du & lsquo; from & rsquo;Le champ peut être identifié dans cette campagne car il utilise une adresse e-mail frauduleuse de l'expéditeur différent de celle du véritable correspondant.Les utilisateurs doivent être prudents avec des archives protégées par mot de passe et des types de fichiers suspects tels que WSF.Les indicateurs de réseau et d'hôtes associés à cette campagne QBOT sont disponibles dans la plate-forme Anomali et il est conseillé aux clients de les bloquer sur leur infrastructure. mitreAtt & amp; ck: [mitre att & amp; ck] t1566 - phishing | [mitre att & amp; ck] t1204 - exécution des utilisateurs | [mitre att & amp; ck] t1207 - contrôleur de domaine voyou | [mitre att & amp; ck] t1140 - déobfuscate /Décoder des fichiers ou des informations | [mitre att & amp; ck] t1059.001: powershell | [mitre att & amp; ck] t1218.011 - Exécution par proxy binaire signée: rundll32 | [mitre att & amp; ck] t1090 - proxy | [mitre att & amp; ck] t1114.001 - collection de courriels: collection de message]]> 2023-04-18T17:14:00+00:00 https://www.anomali.com/blog/anomali-cyber-watch-cozy-bear-employs-new-downloaders-rtm-locker-ransomware-seeks-privacy-vice-society-automated-selective-exfiltration www.secnews.physaphae.fr/article.php?IdArticle=8328981 False Ransomware,Malware,Tool,Threat APT 29,APT 29 2.0000000000000000 The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) Les pirates liés à la Russie lancent des attaques d'espionnage contre des entités diplomatiques étrangères<br>Russia-Linked Hackers Launches Espionage Attacks on Foreign Diplomatic Entities The Russia-linked APT29 (aka Cozy Bear) threat actor has been attributed to an ongoing cyber espionage campaign targeting foreign ministries and diplomatic entities located in NATO member states, the European Union, and Africa. According to Poland\'s Military Counterintelligence Service and the CERT Polska team, the observed activity shares tactical overlaps with a cluster tracked by Microsoft as]]> 2023-04-14T18:27:00+00:00 https://thehackernews.com/2023/04/russia-linked-hackers-launches.html www.secnews.physaphae.fr/article.php?IdArticle=8327789 False Threat APT 29 2.0000000000000000 Recorded Future - FLux Recorded Future Des pirates soutenus par le Kremlin sont imputés à l'espionnage des agences diplomatiques de l'UE et de l'OTAN<br>Kremlin-backed hackers blamed in spying campaign on EU and NATO diplomatic agencies Les pirates russes affiliés à l'État ont lancé une campagne d'espionnage ciblant les ministères étrangères et les entités diplomatiques dans les pays de l'OTAN, l'Union européenne et, «dans une moindre mesure», a déclaré l'Afrique, la principale agence de cybersécurité de l'Afrique, la Pologne \\.La campagne est liée au groupe de piratage soutenu par le Kremlin, Nobelium, également connu sous le nom d'APT29 ou [Bluebravo] (https://www.recordedfuture.com/bluebravo-uses-ambassador-reure-Deploy-GraphicalNeutrino-Malware), cert.pl a déclaré dans un [rapport] (https://www.gov.pl/wEB / Baza-Wiedzy / Espionage-Campaign-liked-to-russian-Intelligence-Services) publié jeudi avec
Russian state-affiliated hackers have launched a spying campaign targeting foreign ministries and diplomatic entities in NATO countries, the European Union, and, “to a lesser extent,” Africa, Poland\'s top cybersecurity agency said. The campaign is linked to the Kremlin-backed hacking group Nobelium, also known as APT29 or [BlueBravo](https://www.recordedfuture.com/bluebravo-uses-ambassador-lure-deploy-graphicalneutrino-malware), CERT.PL said in a [report](https://www.gov.pl/web/baza-wiedzy/espionage-campaign-linked-to-russian-intelligence-services) published Thursday with]]> 2023-04-13T17:06:00+00:00 https://therecord.media/nobelium-apt29-russia-cyber-spying-campaign-targeting-nato-eu www.secnews.physaphae.fr/article.php?IdArticle=8327518 False None APT 29 2.0000000000000000 Soc Radar - Blog spécialisé SOC APT Profile: Cozy Bear / APT29 Advanced Persistent Threat (APT) groups are widely classified as organizations that lead “attacks on a... ]]> 2023-03-17T07:22:00+00:00 https://socradar.io/apt-profile-cozy-bear-apt29/ www.secnews.physaphae.fr/article.php?IdArticle=8319331 False Threat,Guideline APT 29,APT 29 2.0000000000000000 Recorded Future - FLux Recorded Future Kremlin-backed hackers blamed in recent phishing attempts on EU agencies A Russian state-backed hacker group known as Nobelium is behind recent attempted cyberattacks on diplomatic entities and government agencies in the European Union, cybersecurity researchers say. In a campaign identified in early March, the hackers sent phishing emails with content related to diplomatic relations between Poland and the U.S., according to a report by cybersecurity]]> 2023-03-14T22:00:00+00:00 https://therecord.media/nobelium-apt29-cozy-bear-phishing-eu-ukraine www.secnews.physaphae.fr/article.php?IdArticle=8318651 False Hack APT 29 3.0000000000000000 SecurityWeek - Security News Russia-Linked APT29 Uses New Malware in Embassy Attacks Russia-linked cyberespionage group APT29 has been observed using embassy-themed lures and the GraphicalNeutrino malware in recent attacks. ]]> 2023-01-30T12:03:49+00:00 https://www.securityweek.com/russia-linked-apt29-uses-new-malware-in-embassy-attacks/ www.secnews.physaphae.fr/article.php?IdArticle=8305560 False Malware APT 29 2.0000000000000000 Global Security Mag - Site de news francais Mustang Panda, APT29, APT36, Phobos, Cobalt Strike : Les acteurs émergents de la cybermenace se structurent et les rançongiciels évoluent Malwares]]> 2022-11-17T00:00:00+00:00 https://www.globalsecuritymag.fr/Mustang-Panda-APT29-APT36-Phobos-Cobalt-Strike-Les-acteurs-emergents-de-la.html www.secnews.physaphae.fr/article.php?IdArticle=8054151 False None APT 29,APT 36 None Security Affairs - Blog Secu APT29 abused the Windows Credential Roaming in an attack against a diplomatic entity Russia-linked APT29 cyberespionage group exploited a Windows feature called Credential Roaming to target a European diplomatic entity. Mandiant researchers in early 2022 responded to an incident where the Russia-linked APT29 group (aka SVR group, Cozy Bear, Nobelium, and The Dukes) successfully phished a European diplomatic entity. The attack stands out for the use of the Windows Credential […] ]]> 2022-11-10T10:41:13+00:00 https://securityaffairs.co/wordpress/138322/apt/apt29-windows-credential-roaming.html www.secnews.physaphae.fr/article.php?IdArticle=7923274 False None APT 29 None The Hacker News - The Hacker News est un blog de news de hack (surprenant non?) APT29 Exploited a Windows Feature to Compromise European Diplomatic Entity Network 2022-11-09T19:17:00+00:00 https://thehackernews.com/2022/11/apt29-exploited-windows-feature-to.html www.secnews.physaphae.fr/article.php?IdArticle=7905523 False None APT 29 None Mandiant - Blog Sécu de Mandiant Ils me voient itinérants: suivant APT29 en jetant un aperçu plus approfondi de l'itinérance des informations d'identification Windows<br>They See Me Roaming: Following APT29 by Taking a Deeper Look at Windows Credential Roaming historique ]]> 2022-11-08T15:00:00+00:00 https://www.mandiant.com/resources/blog/apt29-windows-credential-roaming www.secnews.physaphae.fr/article.php?IdArticle=8377408 False None APT 29,APT 29 4.0000000000000000 CISCO Talos - Cisco Research blog The benefits of taking an intent-based approach to detecting Business Email Compromise By Abhishek Singh.BEC is a multi-stage attack. Adversaries first identify targets, then they establish rapport with the victim before exploiting them for whatever their end goal is. In the case of BEC, a threat actor can impersonate any employee in the organization to trick targets.  A policy that checks for authorized email addresses of the sender can prevent BEC attacks. However, scaling the approach for every employee in a large organization is a challenge.  Building an executive profile based on email analysis using a machine learning model and scanning emails against that profile will detect BEC. Data collection for building and training machine learning algorithms can take time, though, opening a window of opportunity for threat actors to exploit.  Detection of exploitation techniques such as lookalike domains and any differences in the email addresses in the "From" and "Reply-to" fields can also detect BEC messages. However, the final verdict cannot account for the threat actor's intent.  The intent-based approach detects BEC and then classifies it into the type of scam. It catches BEC messages, irrespective of whether a threat actor is impersonating a C-level executive or any employee in an organization. Classification based on the type of scam can help identify which segment of an organization was targeted and which employees were being impersonated by the threat actor. The additional information will further assist in better designing preventive features to stop BEC. Business email compromise (BEC) is one of the most financially damaging online crimes. As per the internet crime 221 report, the total loss in 2021 due to BEC is around 2.4 billion dollars. Since 2013, BEC has resulted in a 43 billion dollars loss. The report defines BEC as a scam targeting businesses (not individuals) working with foreign suppliers and companies regularly performing wire transfer payments. Fraudsters carry out these sophisticated scams to conduct the unauthorized transfer of funds. This introduces the challenge of how to detect and block these campaigns as they continue to compromise organizations successfully. There are a variety of approaches to identifying BEC email messages, such as using policy to allow emails from authorized email addresses, detecting exploitation techniques used by threat actors, building profiles by analysis of emails, and validating against the profile to detect BEC. These approaches have a variety of limitations or shortcomings. Cisco Talos is taking a different approach and using an intent-based model to identify and block BEC messages. Before we get too deep into the intent-based model, take a deeper look at the commonly used approaches to block BEC from the simplistic through machine learning (ML) approaches. Policy-based detection The first place to start is with policy-based detection as it is one of the most common and simplistic approaches to blocking BEC campaigns. Let's start by looking at an example of a BEC email. ]]> 2022-10-18T08:41:18+00:00 http://blog.talosintelligence.com/2022/10/the-benefits-of-taking-intent-based.html www.secnews.physaphae.fr/article.php?IdArticle=7540074 False Threat,Medical,Cloud Yahoo,Uber,APT 38,APT 37,APT 29,APT 19,APT 15,APT 10 None Anomali - Firm Blog Anomali Cyber Watch: First Real-Life Video-Spoofing Attack, MagicWeb Backdoors via Non-Standard Key Identifier, LockBit Ransomware Blames Victim for DDoSing Back, and More Figure 1 - IOC Summary Charts. These charts summarize the IOCs attached to this magazine and provide a glimpse of the threats discussed. Trending Cyber News and Threat Intelligence LastPass Hackers Stole Source Code (published: August 26, 2022) In August 2022, an unidentified threat actor gained access to portions of the password management giant LastPass development environment. LastPass informed that it happened through a single compromised developer account and the attacker took portions of source code and some proprietary LastPass technical information. The company claims that this incident did not affect customer data or encrypted password vaults. Analyst Comment: This incident doesn’t seem to have an immediate impact on LastPass users. Still, organizations relying on LastPass should raise the concern in their risk assessment since “white-box hacking” (when source code of the attacking system is known) is easier for threat actors. Organizations providing public-facing software should take maximum measures to block threat actors from their development environment and establish robust and transparent security protocols and practices with all third parties involved in their code development. Tags: LastPass, Password manager, Data breach, Source code Mercury Leveraging Log4j 2 Vulnerabilities in Unpatched Systems to Target Israeli (published: August 25, 2022) Starting in July 2022, a new campaign by Iran-sponsored group Static Kitten (Mercury, MuddyWater) was detected targeting Israeli organizations. Microsoft researchers detected that this campaign was leveraging exploitation of Log4j 2 vulnerabilities (CVE-2021-45046 and CVE-2021-44228) in SysAid applications (IT management tools). For persistence Static Kitten was dropping webshells, creating local administrator accounts, stealing credentials, and adding their tools in the startup folders and autostart extensibility point (ASEP) registry keys. Overall the group was heavily using various open-source and built-in operating system tools: eHorus remote management software, Ligolo reverse tunneling tool, Mimikatz credential theft tool, PowerShell programs, RemCom remote service, Venom proxy tool, and Windows Management Instrumentation (WMI). Analyst Comment: Network defenders should monitor for alerts related to web shell threats, suspicious RDP sessions, ASEP registry anomaly, and suspicious account creation. Similarly, SysAid users can monitor for webshells and abnormal processes related to SysAisServer instance. Even though Static Kitten was observed leveraging the Log4Shell vulnerabilities in the past (targeting VMware apps), most of their attacks still start with spearphishing, often from a compromised email account. MITRE ATT&CK: [MITRE ATT&CK] Exploit Public-Facing Application - T1190 | [MITRE ATT&CK] OS Credential Dumping - T1003 | [MITRE ATT&CK] Phishing - T1566 | ]]> 2022-08-30T15:01:00+00:00 https://www.anomali.com/blog/anomali-cyber-watch-first-real-life-video-spoofing-attack-magicweb-backdoors-via-non-standard-key-identifier-lockbit-ransomware-blames-victim-for-ddosing-back-and-more www.secnews.physaphae.fr/article.php?IdArticle=6626943 False Ransomware,Hack,Tool,Vulnerability,Threat,Guideline,Cloud APT 37,APT 29,LastPass None Global Security Mag - Site de news francais Le groupe APT29 continue de cibler Microsoft 365 Malwares]]> 2022-08-26T10:36:26+00:00 http://www.globalsecuritymag.fr/Le-groupe-APT29-continue-de-cibler,20220826,129187.html www.secnews.physaphae.fr/article.php?IdArticle=6541176 False None APT 29 None Security Affairs - Blog Secu Nobelium APT uses new Post-Compromise malware MagicWeb Russia-linked APT group Nobelium is behind a new sophisticated post-exploitation malware tracked by Microsoft as MagicWeb. Microsoft security researchers discovered a post-compromise malware, tracked as MagicWeb, which is used by the Russia-linked NOBELIUM APT group to maintain persistent access to compromised environments.  The NOBELIUM APT (APT29, Cozy Bear, and The Dukes) is the threat actor that […] ]]> 2022-08-25T17:11:38+00:00 https://securityaffairs.co/wordpress/134838/apt/nobelium-magicweb-tool.html www.secnews.physaphae.fr/article.php?IdArticle=6524118 False Malware,Threat APT 29 None Bleeping Computer - Magazine Américain Microsoft: Russian malware hijacks ADFS to log in as anyone in Windows 2022-08-25T12:36:49+00:00 https://www.bleepingcomputer.com/news/security/microsoft-russian-malware-hijacks-adfs-to-log-in-as-anyone-in-windows/ www.secnews.physaphae.fr/article.php?IdArticle=6523204 False Malware APT 29 3.0000000000000000 SecurityWeek - Security News Microsoft Details New Post-Compromise Malware Used by Russian Cyberspies 2022-08-25T10:16:06+00:00 https://www.securityweek.com/microsoft-details-new-post-compromise-malware-used-russian-cyberspies www.secnews.physaphae.fr/article.php?IdArticle=6518394 False Malware,Tool APT 29 None Security Affairs - Blog Secu Russia-linked Cozy Bear uses evasive techniques to target Microsoft 365 users Russia-linked APT group Cozy Bear continues to target Microsoft 365 accounts in NATO countries for cyberespionage purposes. Mandiant researchers reported that the Russia-linked Cozy Bear cyberespionage group (aka APT29, CozyDuke, and Nobelium), has targeted Microsoft 365 accounts in espionage campaigns. The experts pointed out that APT29 devised new advanced tactics, techniques, and procedures to evade detection. […] ]]> 2022-08-19T23:20:33+00:00 https://securityaffairs.co/wordpress/134609/apt/cozy-bear-targets-microsoft-365-users.html www.secnews.physaphae.fr/article.php?IdArticle=6422306 False None APT 29 None Bleeping Computer - Magazine Américain Russian APT29 hackers abuse Azure services to hack Microsoft 365 users 2022-08-19T11:10:55+00:00 https://www.bleepingcomputer.com/news/security/russian-apt29-hackers-abuse-azure-services-to-hack-microsoft-365-users/ www.secnews.physaphae.fr/article.php?IdArticle=6415346 False Hack APT 29 None Mandiant - Blog Sécu de Mandiant Vous ne pouvez pas m'auditer: APT29 continue de cibler Microsoft 365<br>You Can\\'t Audit Me: APT29 Continues Targeting Microsoft 365 Parrainé par le Foreign Intelligence Service (SVR).Mandiant continue d'identifier les opérations APT29 ciblant les intérêts des États-Unis et les pays des États-Unis et ceux des pays de l'OTAN et des pays partenaires.Malgré la publication de multiples opérations APT29, ils continuent d'être extrêmement prolifiques.En 2022, APT29 s'est concentré sur les organisations responsables de l'influence et de l'élaboration de la politique étrangère des pays de l'OTAN.Cela a inclus plusieurs cas où APT29 a revisité les victimes qu'ils avaient compromis des années
APT29 is a Russian espionage group that Mandiant has been tracking since at least 2014 and is likely sponsored by the Foreign Intelligence Service (SVR). Mandiant continues to identify APT29 operations targeting the United States\' (US) interests, and those of NATO and partner countries. Despite the publicization of multiple APT29 operations, they continue to be extremely prolific. In 2022, APT29 has focused on organizations responsible for influencing and crafting the foreign policy of NATO countries. This has included multiple instances where APT29 revisited victims they had compromised years]]>
2022-08-18T09:00:00+00:00 https://www.mandiant.com/resources/blog/apt29-continues-targeting-microsoft www.secnews.physaphae.fr/article.php?IdArticle=8377438 False None APT 29,APT 29 4.0000000000000000
Anomali - Firm Blog Anomali Cyber Watch: Cozy Bear Abuses Google Drive API, Complex Lightning Framework Targets Linux, Google Ads Hide Fraudulent Redirects, and More Figure 1 - IOC Summary Charts. These charts summarize the IOCs attached to this magazine and provide a glimpse of the threats discussed. Trending Cyber News and Threat Intelligence Lightning Framework: New Undetected “Swiss Army Knife” Linux Malware (published: July 21, 2022) Intezer researchers discovered a new Linux malware called Lightning Framework (Lightning). It is a modular framework able to install multiple types of rootkits and to run various plugins. Lightning has passive and active capabilities for communication with the threat actor, including opening up SSH service via an OpenSSH daemon, and a polymorphic command and control (C2) configuration. Lightning is a newly discovered threat, and there is no information about its use in the wild and the actors behind it. Analyst Comment: Defenders should block known Lightning indicators. Monitor for file creation based on the Lightning naming convention. MITRE ATT&CK: [MITRE ATT&CK] Logon Scripts - T1037 | [MITRE ATT&CK] Account Manipulation - T1098 | [MITRE ATT&CK] Obfuscated Files or Information - T1027 | [MITRE ATT&CK] Deobfuscate/Decode Files or Information - T1140 | [MITRE ATT&CK] Hide Artifacts - T1564 | [MITRE ATT&CK] Masquerading - T1036 | [MITRE ATT&CK] Rootkit - T1014 | [MITRE ATT&CK] Indicator Removal on Host - T1070 | [MITRE ATT&CK] File and Directory Discovery - T1083 | [MITRE ATT&CK] Network Service Scanning - T1046 | [MITRE ATT&CK] Network Sniffing - T1040 | [MITRE ATT&CK] System Information Discovery - T1082 | [MITRE ATT&CK] Data Encoding - T1132 | [MITRE ATT&CK] Standard Non-Application Layer Protocol - T1095 | [MITRE ATT&CK] Proxy - T1090 | [MITRE ATT&CK] Exfiltration Over C2 Channel - T1041 Tags: Lightning Framework, Linux, Lightning.Downloader, Lightning.Core, Typosquatting, Masquerading, Timestomping, Port:33229 Google Ads Lead to Major Malvertising Campaign (published: July 20, 2022) Malwarebytes researchers discovered a malvertising campaign abusing Google Search advertisements for popular keywords such as “amazon,” “fac]]> 2022-07-26T17:10:00+00:00 https://www.anomali.com/blog/anomali-cyber-watch-cozy-bear-abuses-google-drive-api-complex-lightning-framework-targets-linux-google-ads-hide-fraudulent-redirects-and-more www.secnews.physaphae.fr/article.php?IdArticle=5953922 False Malware,Tool,Threat,Guideline APT 29 None IT Security Guru - Blog Sécurité Russian Adversaries Target Google Drive and DropBox in Latest Campaign 2022-07-21T10:13:51+00:00 https://www.itsecurityguru.org/2022/07/21/russian-adversaries-target-google-drive-and-dropbox-in-latest-campaign/?utm_source=rss&utm_medium=rss&utm_campaign=russian-adversaries-target-google-drive-and-dropbox-in-latest-campaign www.secnews.physaphae.fr/article.php?IdArticle=5853101 False Malware,Threat APT 29 None