20 Apr, 2021

APT29 Attack Methods Most Used by Threat Actors 

National Security Agency (NSA), Cybersecurity and Infrastructure Security Agency (CISA) and Federal Bureau of Investigation (FBI),  SVR'  (Russia's Foreign Intelligence Service) announced that the APT29 hacker group, which is thought to be supporting, frequently exploits five known vulnerabilities.

APT29 known as cyber threat actors named Cozy Bear and The DukesThe vulnerabilities exploited by the hacker group are listed in the CVE data base .
CAND lists here is: 

 

Techniques used by attackers; 

  • Use publicly available vulnerabilities: Enemies can cause unwanted or unexpected behavior connected from a weakness in a computer or program try to leveragefolds.
  • Use external remote servicess: Cyber ​​threat actors outsource to initially access and/or stay within a networkconnected can use remote services. Remote services such as VPNs, Citrix, and other access mechanisms (especially RDP) allow users to access external locations. allows it to connect to internal corporate network resources.
  • Users may manipulate products or product delivery mechanisms before they are received by the final consumer for data or system consensus purposes. 
  • Default using accounts: Competitors can obtain and misuse the credentials of existing accounts as a way to gain access or elevate permissions. 
  • Cyber ​​threat actors can exploit software vulnerabilities to collect credentials.
  • Fake web credentials: Attackerto a valid SAML token-signing certificate

The NSA, CISA and FBI are encouraging them to check their networks for Indicators of Compromise (IOCs) on five vulnerabilities.  

Source:
nsa.gov


To request a quotation for the following: Cyber Security, Digital Transformation, MSSP, Penetration Testing, KVKK, GDPR, ISO 27001 and ISO 27701, please click here.

About Content:
Share on Social Media:
Facebook
Twitter
LinkedIn
Telegram