corteximplant.com is one of the many independent Mastodon servers you can use to participate in the fediverse.
CORTEX IMPLANT - an international cyberpunk'ish LGBTQIA+ friendly Fediverse instance for edgerunners, netrunners and cyberpunks and all who want to become one.

Administered by:

Server stats:

236
active users

#apt29

0 posts0 participants0 posts today
OTX Bot<p>Russian State Actors: Development in Group Attributions</p><p>This analysis explores the evolution of Russian state-backed cyber actors and their operations. It highlights the activities of several prominent groups, including UNC2589, APT44 (Sandworm), APT29, and APT28. These actors, associated with various Russian intelligence agencies, have been involved in global espionage, sabotage, and influence operations. The report details their targets, which include government organizations, critical infrastructure, and diplomatic entities across multiple countries. It also describes the groups' adaptation to new security measures and their use of advanced techniques such as zero-day exploits, social engineering, and living off the land tactics. The analysis emphasizes the importance of understanding these actors' methods for improving global cybersecurity resilience.</p><p>Pulse ID: 67cc2ca27d4672d04ef4eb01<br>Pulse Link: <a href="https://otx.alienvault.com/pulse/67cc2ca27d4672d04ef4eb01" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">otx.alienvault.com/pulse/67cc2</span><span class="invisible">ca27d4672d04ef4eb01</span></a> <br>Pulse Author: AlienVault<br>Created: 2025-03-08 11:40:18</p><p>Be advised, this data is unverified and should be considered preliminary. Always do further verification.</p><p><a href="https://social.raytec.co/tags/APT28" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>APT28</span></a> <a href="https://social.raytec.co/tags/APT29" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>APT29</span></a> <a href="https://social.raytec.co/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://social.raytec.co/tags/Espionage" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Espionage</span></a> <a href="https://social.raytec.co/tags/Government" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Government</span></a> <a href="https://social.raytec.co/tags/ICS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ICS</span></a> <a href="https://social.raytec.co/tags/InfoSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InfoSec</span></a> <a href="https://social.raytec.co/tags/OTX" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OTX</span></a> <a href="https://social.raytec.co/tags/OpenThreatExchange" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenThreatExchange</span></a> <a href="https://social.raytec.co/tags/RAT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RAT</span></a> <a href="https://social.raytec.co/tags/Russia" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Russia</span></a> <a href="https://social.raytec.co/tags/Sandworm" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Sandworm</span></a> <a href="https://social.raytec.co/tags/SocialEngineering" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SocialEngineering</span></a> <a href="https://social.raytec.co/tags/Worm" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Worm</span></a> <a href="https://social.raytec.co/tags/ZeroDay" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ZeroDay</span></a> <a href="https://social.raytec.co/tags/bot" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>bot</span></a> <a href="https://social.raytec.co/tags/AlienVault" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AlienVault</span></a></p>
Just Another Blue Teamer<p>Happy Friday everyone!</p><p>A Joint Advisory from the National Security Agency, Federal Bureau of Investigation (FBI), Cyber National Mission Force, and the National Cyber Security Centre provides updates on the Russian Federation's Foreign Intelligence Service, or <a href="https://ioc.exchange/tags/SVR" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SVR</span></a>. </p><p>According to the advisory, <a href="https://ioc.exchange/tags/APT29" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>APT29</span></a> (a.k.a Midnight Blizzard, Cozy Bear, and the Dukes) has targeted the defense, technology, and finance sectors to collect foreign intelligence and enable future cyber operations. They aim to exploit software vulnerabilities for initial access and escalate privileges. They also utilize spearphishing campaigns, password spraying, abuse of supply chain and trusted relationships. They also utilize custom malware and living-off-the-land (LOLBINs) techniques for multiple techniques. </p><p>The report includes a list of <a href="https://ioc.exchange/tags/CVEs" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CVEs</span></a> that APT29 has been observed exploiting and attach the vendor and product that are effected with details that describe the vulnerability along with a section of mitigations that your organization can take to increase your security posture. </p><p>If you are looking for behaviors that are attributed to APT29, look no further than the MITRE ATT&amp;CK Matrix! This resource has collected historic <a href="https://ioc.exchange/tags/TTPs" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TTPs</span></a> and behaviors and referenced them as well. So while you are working on hardening your environment you can also hunt for their activity as well! Enjoy and Happy Hunting! </p><p>Article Source:<br>Update on SVR Cyber Operations and Vulnerability Exploitation<br><a href="https://www.ic3.gov/Media/News/2024/241010.pdf" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">ic3.gov/Media/News/2024/241010</span><span class="invisible">.pdf</span></a></p><p>Mitre source:<br><a href="https://attack.mitre.org/groups/G0016/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">attack.mitre.org/groups/G0016/</span><span class="invisible"></span></a></p><p>Intel 471 <a href="https://ioc.exchange/tags/ThreatIntel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ThreatIntel</span></a> <a href="https://ioc.exchange/tags/ThreatHunting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ThreatHunting</span></a> <a href="https://ioc.exchange/tags/ThreatDetection" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ThreatDetection</span></a> <a href="https://ioc.exchange/tags/HappyHunting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>HappyHunting</span></a> <a href="https://ioc.exchange/tags/readoftheday" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>readoftheday</span></a> <a href="https://ioc.exchange/tags/huntoftheday" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>huntoftheday</span></a> <a href="https://ioc.exchange/tags/gethunting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>gethunting</span></a> Cyborg Security, Now Part of Intel 471</p>
Prof. Dr. Dennis-Kenji Kipker<p>Wie war das nochmal mit dem Thema "staatliches <a href="https://chaos.social/tags/Schwachstellenmanagement" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Schwachstellenmanagement</span></a>"? Für diese Erkenntnis hätten wir keine Jahre gebraucht:</p><p>"Russische <a href="https://chaos.social/tags/Hacker" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Hacker</span></a> nutzen die gleichen Lücken wie <a href="https://chaos.social/tags/Staatstrojaner" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Staatstrojaner</span></a>"</p><p>"<a href="https://chaos.social/tags/APT29" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>APT29</span></a> habe dabei "identische oder auffallend ähnliche" Exploits genutzt, wie die Spysoftware-Anbieter Intellexa Alliance und <a href="https://chaos.social/tags/NSO" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NSO</span></a> Group."</p><p><a href="https://futurezone.at/netzpolitik/russische-hacker-staatstrojaner-messenger-ueberwachung-sicherheit-nso-pegasus-predator-apt29/402941959" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">futurezone.at/netzpolitik/russ</span><span class="invisible">ische-hacker-staatstrojaner-messenger-ueberwachung-sicherheit-nso-pegasus-predator-apt29/402941959</span></a></p>
Marcel SIneM(S)US<p>Cyberkriminelle nehmen <a href="https://social.tchncs.de/tags/Spyware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Spyware</span></a>-Hersteller als Vorbild bei Angriff auf Browser | Security <a href="https://www.heise.de/news/Cyberkriminelle-nehmen-Spyware-Hersteller-als-Vorbild-bei-Angriff-auf-Browser-9852070.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/Cyberkriminelle-</span><span class="invisible">nehmen-Spyware-Hersteller-als-Vorbild-bei-Angriff-auf-Browser-9852070.html</span></a> <a href="https://social.tchncs.de/tags/CyberCrime" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberCrime</span></a> <a href="https://social.tchncs.de/tags/Malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Malware</span></a> <a href="https://social.tchncs.de/tags/APT29" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>APT29</span></a> <a href="https://social.tchncs.de/tags/CozyBear" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CozyBear</span></a></p>
Chuck Darwin<p>Russian government hackers are using exploits that are “identical or strikingly similar” to those previously made by spyware makers Intellexa and NSO Group.</p><p>In a blog post on Thursday, Google said it is not sure how the Russian government acquired the exploits, <br>but said this is an example of how exploits developed by spyware makers can end up in the hands of <br>“dangerous threat actors.”</p><p>In this case, Google says the threat actors are <a href="https://c.im/tags/APT29" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>APT29</span></a>, a group of hackers widely attributed to Russia’s Foreign Intelligence Service, or the <a href="https://c.im/tags/SVR" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SVR</span></a>. </p><p>APT29 is a highly capable group of hackers, <br>known for its long-running and persistent campaigns aimed at conducting espionage and data theft against a range of targets, <br>including tech giants Microsoft and SolarWinds, as well as foreign governments.</p><p>Google said it found the hidden exploit code embedded on Mongolian government websites between November 2023 and July 2024. </p><p>During this time, anyone who visited these sites using an iPhone or Android device could have had their phone hacked and data stolen, including passwords, in what is known as a “watering hole” attack.</p><p><a href="https://techcrunch.com/2024/08/29/russian-government-hackers-found-using-exploits-made-by-spyware-companies-nso-and-intellexa/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">techcrunch.com/2024/08/29/russ</span><span class="invisible">ian-government-hackers-found-using-exploits-made-by-spyware-companies-nso-and-intellexa/</span></a></p>
Richi Jennings<p>Remote access service hacked—by <a href="https://vmst.io/tags/APT29" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>APT29</span></a>, says <a href="https://vmst.io/tags/TeamViewer" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TeamViewer</span></a>.</p><p>TeamViewer says “a compromised employee account” led to a <a href="https://vmst.io/tags/Russian" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Russian</span></a> breach. While the company makes reassuring noises about its segmented network, it also said the tool was installed on more than 2.5 billion devices.</p><p>And that’s a worry, despite the calming PR. In <a href="https://vmst.io/tags/SBBlogwatch" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SBBlogwatch</span></a>, we wonder why TeamViewer didn’t enforce <a href="https://vmst.io/tags/MFA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MFA</span></a> for employees (see also: Snowflake, Okta, Uber, etc., etc.) At @TechstrongGroup’s @SecurityBlvd: <a href="https://securityboulevard.com/2024/07/teamviewer-apt29-richixbw/?utm_source=richisoc&amp;utm_medium=social&amp;utm_content=richisoc&amp;utm_campaign=richisoc" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">securityboulevard.com/2024/07/</span><span class="invisible">teamviewer-apt29-richixbw/?utm_source=richisoc&amp;utm_medium=social&amp;utm_content=richisoc&amp;utm_campaign=richisoc</span></a></p>
Marcel SIneM(S)US<p><a href="https://social.tchncs.de/tags/TeamViewer" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TeamViewer</span></a>-Angriff: Die Spur führt nach <a href="https://social.tchncs.de/tags/Russland" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Russland</span></a> 🇷🇺 | Security <a href="https://www.heise.de/news/TeamViewer-Angriff-Die-Spur-fuehrt-nach-Russland-9782630.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/TeamViewer-Angri</span><span class="invisible">ff-Die-Spur-fuehrt-nach-Russland-9782630.html</span></a> <a href="https://social.tchncs.de/tags/Russia" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Russia</span></a> 🇷🇺 <a href="https://social.tchncs.de/tags/APT29" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>APT29</span></a> <a href="https://social.tchncs.de/tags/CozyBear" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CozyBear</span></a> <a href="https://social.tchncs.de/tags/MidnightBlizzard" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MidnightBlizzard</span></a> <a href="https://social.tchncs.de/tags/CyberCrime" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberCrime</span></a></p>
jbz<p>🪆 TeamViewer links corporate cyberattack to Russian state hackers - Bleeping Computer</p><p>"Based on continuous security monitoring, our teams identified suspicious behavior of this account and immediately put incident response measures into action. Together with our external incident response support, we currently attribute this activity to the threat actor known as APT29 / Midnight Blizzard"<br> <br><a href="https://www.bleepingcomputer.com/news/security/teamviewer-links-corporate-cyberattack-to-russian-state-hackers/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/teamviewer-links-corporate-cyberattack-to-russian-state-hackers/</span></a></p><p><a href="https://indieweb.social/tags/TeamViewer" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TeamViewer</span></a> <a href="https://indieweb.social/tags/Russia" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Russia</span></a> <a href="https://indieweb.social/tags/APT29" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>APT29</span></a> <a href="https://indieweb.social/tags/MidnightBlizzard" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MidnightBlizzard</span></a> <a href="https://indieweb.social/tags/Hacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Hacking</span></a> <a href="https://indieweb.social/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a> <a href="https://indieweb.social/tags/Infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Infosec</span></a></p>
hackmac<p>Fernwartungszugänge sind regelmäßig Thema, wenn es um Cyber-Sicherheit von Unternehmen geht. Sehr häufig nutzen Unternehmen den TeamViewer. Dort hat es wohl einen Angriff der russischen Hackergruppe Cozy Bear bzw. APT29 gegeben. Wie weitreichend der Angriff war, wird gerade untersucht. <a href="https://mastodon.social/tags/teamviewer" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>teamviewer</span></a> <a href="https://mastodon.social/tags/hackerangriff" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hackerangriff</span></a> <a href="https://mastodon.social/tags/cybercrime" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybercrime</span></a> <a href="https://mastodon.social/tags/fernwartung" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>fernwartung</span></a> <a href="https://mastodon.social/tags/cozybear" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cozybear</span></a> <a href="https://mastodon.social/tags/apt29" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>apt29</span></a> <a href="https://mastodon.social/tags/russia" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>russia</span></a> <a href="https://mastodon.social/tags/russland" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>russland</span></a></p><p><a href="https://www.welt.de/newsticker/dpa_nt/infoline_nt/netzwelt/article252248950/Cyberangriff-auf-Fernwartungssoftware-Anbieter-Teamviewer.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">welt.de/newsticker/dpa_nt/info</span><span class="invisible">line_nt/netzwelt/article252248950/Cyberangriff-auf-Fernwartungssoftware-Anbieter-Teamviewer.html</span></a></p>
Tarnkappe.info<p>📬 Sicherheitsvorfall bei TeamViewer: Steckt der russische Geheimdienst dahinter?<br><a href="https://social.tchncs.de/tags/ITSicherheit" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ITSicherheit</span></a> <a href="https://social.tchncs.de/tags/APT29" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>APT29</span></a> <a href="https://social.tchncs.de/tags/CozyBear" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CozyBear</span></a> <a href="https://social.tchncs.de/tags/HealthISAC" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>HealthISAC</span></a> <a href="https://social.tchncs.de/tags/NCCGroup" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NCCGroup</span></a> <a href="https://social.tchncs.de/tags/Sicherheitsvorfall" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Sicherheitsvorfall</span></a> <a href="https://social.tchncs.de/tags/TeamViewer" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TeamViewer</span></a> <a href="https://sc.tarnkappe.info/ce70e5" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">sc.tarnkappe.info/ce70e5</span><span class="invisible"></span></a></p>
Not Simon<p><strong>Splunk</strong> provides a detailed analysis of the tactics, techniques, and procedures (TTPs) employed by APT29 in the campaign targeting German political parties with the new WINELOADER backdoor. APT29, aka Midnight Blizzard and Cozy Bear, is publicly attributed to Russian Foreign Intelligence Service (SVR). IOC and Yara rules provided.🔗 <a href="https://www.splunk.com/en_us/blog/security/wineloader-analysis.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">splunk.com/en_us/blog/security</span><span class="invisible">/wineloader-analysis.html</span></a></p><p><a href="https://infosec.exchange/tags/APT29" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>APT29</span></a> <a href="https://infosec.exchange/tags/MidnightBlizzard" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MidnightBlizzard</span></a> <a href="https://infosec.exchange/tags/CozyBear" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CozyBear</span></a> <a href="https://infosec.exchange/tags/threatintel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>threatintel</span></a> <a href="https://infosec.exchange/tags/WINELOADER" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WINELOADER</span></a> <a href="https://infosec.exchange/tags/threatintel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>threatintel</span></a> <a href="https://infosec.exchange/tags/IOC" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IOC</span></a> <a href="https://infosec.exchange/tags/Russia" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Russia</span></a> <a href="https://infosec.exchange/tags/cyberespionage" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cyberespionage</span></a></p>
Not Simon<p>Hot off the press! <strong>CISA</strong> issues Emergency Directive (ED) 24-02: Mitigating the Significant Risk from Nation-State Compromise of Microsoft Corporate Email System. Affected agencies are required to take immediate remediation action for tokens, passwords, API keys, or other authentication credentials known or suspected to be compromised; identify the full content of the agency correspondence with compromised Microsoft accounts, etc. 🔗 <a href="https://www.cisa.gov/news-events/directives/ed-24-02-mitigating-significant-risk-nation-state-compromise-microsoft-corporate-email-system" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">cisa.gov/news-events/directive</span><span class="invisible">s/ed-24-02-mitigating-significant-risk-nation-state-compromise-microsoft-corporate-email-system</span></a></p><p>cc: <span class="h-card" translate="no"><a href="https://infosec.exchange/@briankrebs" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>briankrebs</span></a></span> <span class="h-card" translate="no"><a href="https://mastodon.social/@campuscodi" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>campuscodi</span></a></span> </p><p><a href="https://infosec.exchange/tags/Russia" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Russia</span></a> <a href="https://infosec.exchange/tags/CISA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CISA</span></a> <a href="https://infosec.exchange/tags/cyberespionage" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cyberespionage</span></a> <a href="https://infosec.exchange/tags/Microsoft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Microsoft</span></a> <a href="https://infosec.exchange/tags/APT29" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>APT29</span></a></p>
WinFuture.de<p>Experten des US-IT-Sicherheitsunternehmens <a href="https://mastodon.social/tags/Mandiant" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Mandiant</span></a> haben entdeckt, dass die Hackergruppe <a href="https://mastodon.social/tags/APT29" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>APT29</span></a> zum ersten Mal politische Parteien in Deutschland ins Visier nimmt. Geködert wird mit einem Essen bei der <a href="https://mastodon.social/tags/CDU" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CDU</span></a>. <a href="https://winfuture.de/news,141882.html?utm_source=Mastodon&amp;utm_medium=ManualStatus&amp;utm_campaign=SocialMedia" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">winfuture.de/news,141882.html?</span><span class="invisible">utm_source=Mastodon&amp;utm_medium=ManualStatus&amp;utm_campaign=SocialMedia</span></a></p>
Bodo Menke<p>Five Eyes warning, that APT29 is going after MS customers</p><p>Why do I need a Wapo article to stumble over it? Were there any alerts in EU I missed (BSI?)? Any news on this already in European media outlets?</p><p>„Microsoft attributed the ongoing attacks to an SVR group that it calls Midnight Blizzard and that other security companies refer to as APT29 or Cozy Bear.“</p><p><a href="https://hessen.social/tags/Microsoft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Microsoft</span></a> <a href="https://hessen.social/tags/M365" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>M365</span></a> <a href="https://hessen.social/tags/O365" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>O365</span></a> <a href="https://hessen.social/tags/EntraID" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>EntraID</span></a> <a href="https://hessen.social/tags/AzureAD" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AzureAD</span></a> <a href="https://hessen.social/tags/Russia" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Russia</span></a> <a href="https://hessen.social/tags/SVR" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SVR</span></a> <a href="https://hessen.social/tags/APT29" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>APT29</span></a> <a href="https://hessen.social/tags/MidnightBlizzard" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MidnightBlizzard</span></a> <a href="https://infosec.exchange/@JosephMenn/112062526327167579" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">infosec.exchange/@JosephMenn/1</span><span class="invisible">12062526327167579</span></a></p>