36,144 views
???? Where did I end up recently? Oh, right. I talked about how, in an extremely sophisticated way, the APT29 group, cyber spies from the Foreign Intelligence Service of the Russian Federation, took control of the Orion software produced by Solarwinds. I invite you to the continuation of this story and another episode of the series of stories from moss and ferns about cybercriminal groups associated with intelligence services of various countries. This time, Poland will also play a role in it. Sources: ???? Early Bird Catches the Wormhole: Observations from the StellarParticle Campaign https://www.crowdstrike.com/blog/obse... ????️ OS Credential Dumping, MITER ATT&CK https://attack.mitre.org/techniques/T... ???????? Russian cyberspies targeted the Slovak government for months https://therecord.media/russian-cyber... ???? What Is Cobalt Strike and How Does It Work? https://www.cynet.com/network-attacks... ???????? France warns of Nobelium cyberspies attacking French org https://www.bleepingcomputer.com/news... ????????️ FoggyWeb: Targeted NOBELIUM malware leads to persistent backdoor https://www.microsoft.com/en-us/secur... ????️ Trello From the Other Side: Tracking APT29 Phishing Campaigns https://www.mandiant.com/resources/bl... ???? Russian APT29 Hackers Use Online Storage Services, DropBox and Google Drive https://unit42.paloaltonetworks.com/c... ☑️ MagicWeb: NOBELIUM's post-compromise trick to authenticate as anyone https://www.microsoft.com/en-us/secur... ???????? NOBELIUM Uses Poland's Ambassador's Visit to the US to Target EU Governments Assisting Ukraine https://blogs.blackberry.com/en/2023/... ???????? CERT Polska and SKW warn against the activities of Russian spies https://cert.pl/posts/2023/04/kampani... ???? Espionage campaign linked to Russian secret services https://www.gov.pl/web/baza-wiedzy/ka... ???????? Midnight Blizzard conducts targeted social engineering over Microsoft Teams https://www.microsoft.com/en-us/secur... ???? APT29 Attacks Embassies Using CVE-2023-38831 https://www.rnbo.gov.ua/files/2023_YE... attacks Embassies using CVE-2023-38831 - report en.pdf ???????? AlessandroZ / LaZagne @ GitHub - PublicCredentials recovery project https://github.com/AlessandroZ/LaZagne Relevant xkcd: https://xkcd.com/1573/ © All trademarks are property of their respective owners. ❤️ Thanks for your attention. You can also find me on: Instagram @mateuszemsi / mateuszemsi Twitter @MateuszChrobok / mateuszchrobok Mastodon https://infosec.exchange/@mateuszchrobok LinkedIn @mateuszchrobok / mateuszchrobok Patronite @MateuszChrobok https://patronite.pl/MateuszChrobok Podcasts on: Anchor https://anchor.fm/mateusz-chrobok Spotify https://open.spotify.com/show/6y6oWs2... Apple Podcasts https://apple.co/3OwjvOh Chapters: 00:00 Intro 01:10 2021 StellarParticle 05:50 2021 Diplomacy 09:13 2022 Trello 14:43 2023 ADFS 16:53 2023 Poland 18:10 2023 Differently 20:55 2023 TeamCity 22:35 What to Do and How to Live? #Russia #SVR #APT29 #spies #cyberwar