Matthew Dunwoody Profile picture
Nov 10, 2017 13 tweets 4 min read Twitter logo Read on Twitter
Some observations about Russian #APT29, after dealing with them for years (my views, not my employer's):
#APT29 has used generic phishing emails, like "efax notification". They work on gullible users and hinder identification as targeted attack.
#APT29 uses at least 3 types of backdoors: phishing, operational, persistence.
#APT29 abandons their phishing backdoor as soon as they pivot off patient zero, in favor of their operational tools.
#APT29 deploys stealthy persistence backdoors on systems with no other activity, and ignores them unless needed.
#APT29 uses a phishing backdoor so that when defenders identify the backdoor/email, they will miss the other backdoors and declare victory.
#APT29 phishing attacks are often designed to reside in roaming profiles, in order to persist in VDI environments.
#APT29 sometimes uses misdirection for opsec. They're brazen in some of their activity to hide more discreet actions.
#APT29 appears to use multiple teams for intrusion. B team establishes initial access and persistence. A team completes mission.
#APT29 may phish their primary targets directly, rather than phishing colleagues and moving to target, to ensure access to data.
#APT29 has rotated, changed and combined TTPs during incidents to determine how they are being detected and to confuse defenders.
#APT29 actively monitors the security and IT organizations of victims to track detection and response efforts.
I suspect that #APT29 uses large-scale phishing campaigns to hide their true targets (more distraction-based opsec)

• • •

Missing some Tweet in this thread? You can try to force a refresh
 

Keep Current with Matthew Dunwoody

Matthew Dunwoody Profile picture

Stay in touch and get notified when new unrolls are available from this author!

Read all threads

This Thread may be Removed Anytime!

PDF

Twitter may remove this content at anytime! Save it as PDF for later use!

Try unrolling a thread yourself!

how to unroll video
  1. Follow @ThreadReaderApp to mention us!

  2. From a Twitter thread mention us with a keyword "unroll"
@threadreaderapp unroll

Practice here first or read more on our help page!

More from @matthewdunwoody

Aug 12, 2018
In my experience, once an attacker is tipped off to a response, a few things can happen. What happens likely depends on where they are in their mission, mission priority, tolerance for being publicly identified, etc. It also likely depends on how badly they think they're burned.
A victim identifying a phishing doc or phishing backdoor doesn't necessarily mean the op is blown. In fact, it may give the victim a false confidence if they found the initial infection but didn't follow lateral movement. Same if an attacker loses a couple of implants out of many
However, trying to remove large numbers of implants and missing some, CURLing all of their C2 from your network, uploading several post-exploit backdoor samples to VT, discussing the intrusion in email, etc. - those are things that are more likely to elicit a response.
Read 9 tweets

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3/month or $30/year) and get exclusive features!

Become Premium

Don't want to be a Premium member but still want to support us?

Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal

Or Donate anonymously using crypto!

Ethereum

0xfe58350B80634f60Fa6Dc149a72b4DFbc17D341E copy

Bitcoin

3ATGMxNzCUFzxpMCHL5sWSt4DVtS8UqXpi copy

Thank you for your support!

Follow Us on Twitter!

:(