Red Hot Cyber

Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search

Russian domestic hackers Cozy Bear (APT29). Analysis of the main attacks and their TTPs.

Redazione RHC : 13 July 2025 12:02

Author: Gianluca Tiepolo

APT29 is a highly sophisticated Advanced Persistent Threat (APT) group that has been attributed to Russia’s Foreign Intelligence Service (SVR). The group has been active since at least 2008 and has been involved in a wide range of espionage campaigns and cyber attacks against governments, organizations militarys, defense contractors, and various industries in the United States, Europe, and Asia. Bear (Crowdstrike), The Dukes (Kaspersky), JACKMACKEREL (iDefense), BlueBravo (Recorded Future) and UNC2452 (FireEye).

The group is known for its subtle and sophisticated craft in stealing geopolitical information: unlike other Russian state-sponsored groups such as APT28 or Sandworm, APT29 has not been linked to disruptive operations and operates much more discreetly.

The group has been attributed to a number of high-profile cyberattacks, including:

  • The 2019 Democratic National Committee (DNC) hack 2016: APT29 was one of two Russian groups responsible for the cyber attack on the DNC during the 2016 US presidential election. The group gained access to the DNC’s email system and stole sensitive information, which was later leaked to the public.
  • The Pyeongchang 2018 Winter Olympics Cyber Attack: APT29 has been attributed to a cyber attack against the Pyeongchang Winter Olympics in South Korea. The group used sophisticated malware called “Olympic Destroyer” to disrupt the games’ IT systems and infrastructure.
  • The supply chain attack SolarWinds: APT29 has been attributed to the sophisticated supply chain attack against SolarWinds, a leading IT management software provider. The attack allowed the group to gain access to the systems of several U.S. government agencies, including the Department of Justice, the State Department, and the Department of Homeland Security.

In May 2021, it was revealed that APT29 was responsible for a large-scale cyberattack on multiple U.S. government agencies and private companies, including Microsoft. The group used a compromised email marketing system to send spear-phishing emails to over 3,000 individual accounts, installing a backdoor that allowed attackers to access victims’ networks. The group has also been linked to other significant cyberattacks, including the theft of COVID-19 research from US-based pharmaceutical companies.

Overall, APT29 is one of the most sophisticated and well-resourced APT groups in the world, and its TTPs are constantly evolving and changing.

Tactics, Techniques, and Procedures

APT29 is known for its patient and persistent targeting of its victims, often using multi-stage attacks that take weeks or even months to complete. Below is a list of the group’s most notable TTPs:

  • Spear-phishing: The group uses highly targeted and convincing spear-phishing emails to gain access to a target’s system. These emails are typically tailored to the recipient’s interests and appear to come from a trusted source.
  • Watering hole attacks: APT29 is also known to use watering hole attacks, in which the group compromises a trusted website frequented by the target and then injects malware into the site to infect visitors.
  • Custom Malware: APT29 uses highly customized malware, such as “SeaDuke” and “CosmicDuke,” designed to evade detection and maintain persistence on the target system. The group is also known to use tools known as “Cobalt Strike” and “PowerShell Empire.”
  • Use of 0-day Exploits: The group is known for using zero-day exploits to gain access to target systems. For example, APT29 is known to use exploits for popular software such as Microsoft Office and Adobe Flash.
  • Living-off-the-land Tactics: APT29 often uses LotL tactics in which the group uses legitimate tools and techniques that are already present on the target system to evade detection. This can include tools such as PowerShell, Windows Management Instrumentation (WMI), and Remote Desktop Protocol (RDP).

In this particular research, I focused on analyzing APT29’s command and control capabilities.

This threat group has a history of using trusted and legitimate cloud services (such as social media services and Google Drive) for their cyberattacks in an attempt to blend into normal network traffic and evade detection. The malware distributed by APT29 also contains data exfiltration capabilities over those same C2 channels. For example:

  • The The group’s MiniDuke malware searched for specific tweets that contained URLs to access C2 servers.
  • The CosmicDuke and PolyglotDuke malware from APT29 also have the ability to use Twitter to obtain C2 URLs, as well as other social media services such as Imgur and Reddit.
  • The backdoor APT29’s HAMMERTOSS uses GitHub, Twitter, and cloud storage services for C2 communication.

    APT29 also used custom encryption methods, such as those found in the group’s SeaDuke malware, where a unique fingerprint was generated for the infected host and Base64 encoding and RC4/AES encryption were used to layer data during communications with its own server. C2. The group also used techniques such as “domain fronting ” and TOR obfuscation plug-ins to create encrypted network tunnels.




    Using social networks for C2 communications is not an entirely new technique: other Russian groups such as Turla (Poisonous Bear) have exploited comments posted on Instagram to obtain the address of their command and control servers.

    APT29 was first detected using Twitter to control infected machines as early as 2015: in the HAMMERTOSS campaign, the group was able to receive commands and send stolen data through the popular social network, which allowed them to evade detection by security solutions that did not monitor social media traffic.

    EnvyScout

    In a more recent campaign dating back to June 2021, APT29 targeted Italian diplomatic organizations with a spear phishing campaign that distributed the EnvyScout backdoor.

    C2 communication via Slack

    The backdoor first calls a function to create a custom Slack channel, adding the attacker’s user ID to the newly created channel. The backdoor obtains the username and hostname of the victim host, adds 4 random numbers to form the channel name, and sends an HTTP request with an authorization token to the Slack API.

    After the channel is established, the backdoor enters an infinite loop: it uses the “chat.postMessage” API request to send a beacon message to the newly created channel and receives a response with a list of additional files and payloads that are downloaded and executed on the target machine.

    Beatdrop

    In mid-January 2022, APT29 launched another spear phishing campaign against a diplomatic entity, which was detected and remediated by Mandiant. During the investigation, Mandiant discovered that malicious emails were used to distribute the downloader BEATDROP and BOOMMIC .

    BEATDROP is a downloader written in C that leverages Trello for Command-and-Control (C2) communication . Trello is a web-based project management application that allows users to organize tasks and projects using customizable cards, lists, and tabs.

    When executed, BEATDROP maps its own copy ntdll.dll in memory to execute shellcode in its own process. It creates a suspended thread, then enumerates the system for the username, computer name, and IP address to create a victim ID. This victim ID is used by BEATDROP to store and retrieve victim payloads from its C2. Once the victim ID is created, BEATDROP sends an initial request to Trello to determine if the current victim has already been compromised. The shellcode payload is then retrieved from Trello and is targeted for each victim. Once the payload has been retrieved, it is deleted from Trello.

    Notion for C2 communication

    In October 2022, ESET Research discovered a sample uploaded to VirusTotal that closely resembled the one APT29 used a few months ago, with the key difference being that it used Notion , a cloud-based note-taking software platform, for Command-and-Control (C&C) communications.

    The Notion API for C2 communications can be abused by embedding commands in the Notion workspace, which the malware accesses as if it were a legitimate user. This misuse of Notion allows threat actors to evade detection and bypass security controls, as traffic between the malware and the Notion server is likely to be perceived as legitimate traffic.

    ESET researchers suspect that the downloader distributed in this particular campaign was designed to collect and execute additional malicious payloads, such as Cobalt Strike. The campaign was analyzed in more detail by researchers at Hive Pro e Recorded Future , which identify the sample as theGraphicalNeutrino malware.

    According to Recorded Future, APT29 used a compromised website with a decoy text of “Ambassador Program November 2022” to distribute the ZIP file “programma.zip”, suggesting that the campaign’s targets are related to embassy staff or an ambassador. GraphicalNeutrino, the malware used in the operation, acts as a loader with basic C2 functionality and employs various anti-analysis techniques to avoid detection, including API unhooking and sandbox evasion.

    Neutrino graphics artifact — 140runtime.dll

    After establishing persistence, the malware decrypts several strings, including a Notion API key and a database identifier, and calculates a unique ID for the victim based on the username and hostname. It then uses the Notion API for C2 communication and to deliver additional payloads to the victim’s machine.

    For each request to C2, GraphicalNeutrino parses the response in JSON format and looks for a “file ” array. If the array is not empty, the malware will parse the URL field. will download the file and decrypt it using a custom cipher. Once decrypted, the shellcode is generated indirectly in a new thread.

    An example of an answer from the notion C2

    The use of bait Diplomatic intervention during periods of heightened geopolitical tensions, such as the ongoing war in Ukraine, is likely to be effective for Russian APT groups, given the potential impact of information gathered from compromised entities or individuals on Russian foreign policy and strategic decisions. implementation processes. It is perhaps for this reason that APT29 has adopted the same tactics – specifically stealthy C2 communication via Notion – for its next major campaign, this time targeting the European Commission.

    Attack on the European Commission

    In this final section of the blog post, I am analyzing a previously unknown campaign attributed to APT29 that targeted the European Commission. Hopefully, the previous introduction to the group’s TTPs and campaigns is beneficial to the reader, as this attack shares some similarities with the GraphicalNeutrino campaign that was was exposed by Recorded Future .

    Initial access

    Starting in mid-February 2023, a spear phishing campaign targeted a number of email addresses related to members of the European Commission. The attack involved the distribution of an .iso image malicious file that contained a new sample of the VaporRage downloader. Once executed, the malware was observed leveraging the Notion API to deploy Cobalt Strike beacons.

    Execution flow of the VaporRage attack. European Commission

    The first phishing email, sent on February 13, 2023, disguised as an administrative notice regarding documents available for download from eTrustEx, a web-based exchange platform that ensures the secure transmission of documents between Commission members. The decoy emails are written in English and were delivered to a highly targeted number of key people using the eTrustEx platform.

    Reminder email sent to the European Commission

    Furthermore, I noticed that in several email samples, the senders are likely compromised email accounts belonging to legitimate government organizations. This could trick victims into believing that the emails are coming from trusted partners, making recipients more likely to click the links.

    When the link is opened, the victim is redirected to a malicious HTML page hosted at hxxps://literaturaelsalvador[.]com/Instructions.html which uses a known technique such as HTML smuggling to download an ISO image to the target system. I believe this domain is not owned by the actor but has been compromised, which is consistent with previous APT29 activity.

    Decoy Website

    The ISO file is set to download automatically when the website is visited by the victim; this is achieved through the following JavaScript code. The contents of Instructions.iso are stored in the d variable.

    JS code that downloads the first-stage payload

    Execution

    Once the file has been written to disk, when a user double-clicks it in Windows 10 or later, the image is mounted and the contents of the folder are displayed in Windows Explorer. The ISO contains two files: a Windows shortcut file ( Instructions.lnl) and a malicious DLL ( BugSplatRc64.dll).

    If the user clicks the LNK file, the following command is executed, unintentionally triggering the execution of the malicious DLL.

    Malicious DLL Execution

    Using LNK shortcuts to execute malicious DLLs is a technique that has been associated with APT29 in numerous campaigns. In this particular scenario, I recognized the sample as VaporRage, a downloader used by APT29 since 2021.

    Persistence

    When run with the InitiateDs export, VaporRage first runs some reconnaissance commands and generates a host-id by hex-encoding the DNS domain and username. It then creates a copy of itself at:

    C:Users%USERNAME%AppDataLocalDsDiBacksBugSplatRc64.dll

    VaporRage creates a copy of itself

    VaporRage then establishes persistence on the compromised system by creating a registry execution key located in: SoftwareMicrosoftWindowsCurrentVersionRunDsDiBacks.

    VaporRage establishes persistence through a registry key

    Command and Control

    As I mentioned at the beginning of this post, the VaporRage example provided in the execution chain leverages its command and control by communicating on HTTPS using Notion APIs. Notion’s database function is also used to store victim information and stage additional payloads for download.

    PCAP collected during C2 communication

    Based on my Observations: This VaporRage sample periodically makes a POST request to the Notion API to check for the availability of a second-stage malware payload, which is then retrieved and executed in memory. In this particular campaign, APT29 used VaporRage to deploy Cobalt Strike beacons to further establish a foothold within the environment.

    The following endpoint was used for C2 communications:

    • URL: hxxps://api[.]notion[.]com/v1/databases/37089abc0926463182bb5343bce252cc/query
    • Address IP: 104[.] 18.42.99
    • Authorization Header: %HOST-ID%
    • Agent user: Mozilla/5.0 (Windows NT 6.3; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/35.0.1916.114 Safari/537.36

    This technique exemplifies APT29’s ongoing attempts to obscure its actions and maintain continuous access to target systems. This has been extensively documented by Mandiant, which described APT29 using a variety of techniques, including whichscheduled tasks , execution keys,malicious certificates, and

    in-memory backdoors, sometimes using multiple methods for each target.

    Overall, the use ofcloud services such asTrello andNotion for C2 communications not only provides a threat actor with greater capabilities to evade network security controls, but also increases resilience to law enforcement takedown operations: social media and cloud services are often hosted on multiple servers and locations, making it more difficult for authorities to remove the entire platform. This means that the threat actor can continue to use the platform for C2 communications even if some servers are taken down. These advantages make it an attractive option for threat groups like APT29 to conduct their malicious activities.

    Conclusions

    The range of tactics, techniques, and procedures (TTPs) used by APT29 in this campaign supports the conclusion that their goal is to establish numerous long-term means of access to facilitate intelligence gathering within the victim networks of targeted government entities. Nations that have a connection to The Ukrainian crisis, particularly those with significant geopolitical, economic, or military ties to Russia or Ukraine, face a heightened risk of being targeted by APT29.

    This threat group has shown an impressive ability to adapt rapidly throughout their operations. They use innovative and unique methods to circumvent detection and authentication requirements in their target environments. In their recent operations, the group has demonstrated a deep understanding of operational security, allowing them to move seamlessly between on-premise and cloud resources with minimal use of malware. These factors, combined with their advanced malware development capabilities, long history of operations, and extended time on targets, indicate that APT29 is a well-funded actor. andexceptionally sophisticated and will certainly continue to pose a threat during 2023.

    IOC

    Below is a list of indicators associated with this campaign.

    Domains
    hxxps://literaturaelsalvador[.]com/instructions.html
    hxxps://api[.]notion[.]com/v1/databases/37089abc0926463182bb5343bce252cc/query

    PI
    108[.] 167.180.186
    104[.] 18.42.99

    File — SHA256
    21a0b617431850a9ea2698515c277cbd95de4e59c493d0d8f194f3808eb16354 (Instructions.iso)
    e957326b2167fa7ccd508cbf531779a28bfce75eb2635ab822927B9augRplat.

Redazione
The editorial team of Red Hot Cyber consists of a group of individuals and anonymous sources who actively collaborate to provide early information and news on cybersecurity and computing in general.

Lista degli articoli