APT29
Executive Summary
APT29, also known as Cozy Bear, NOBELIUM, and Midnight Blizzard, is a Russian state-sponsored cyber-espionage group attributed to the Foreign Intelligence Service (SVR) of the Russian Federation. Active since at least 2008, the group conducts strategic intelligence collection targeting government, diplomatic, policy, and technology organizations, with a focus on NATO member states and the United States.
APT29 is responsible for the SolarWinds supply chain compromise (discovered December 2020), one of the most consequential cyber-espionage operations ever identified. The campaign affected approximately 18,000 organizations and led to confirmed compromise of multiple U.S. federal agencies. APT29 is characterized by advanced tradecraft, long dwell times, and sophisticated use of cloud infrastructure and identity federation abuse.
Notable Campaigns
2020 — SolarWinds Supply Chain Compromise
APT29 compromised the SolarWinds Orion build environment and embedded the SUNBURST backdoor into legitimate software updates distributed to approximately 18,000 organizations. Fewer than 100 organizations were selected for follow-on exploitation, including the U.S. Departments of Treasury, Commerce, Homeland Security, State, and Justice, as well as FireEye (Mandiant) and Microsoft.
2016 — Democratic National Committee
APT29 compromised the DNC network in mid-2015, operating alongside but separately from APT28 (GRU). The group deployed the SeaDaddy and CozyCar backdoors for persistent intelligence collection over several months before discovery.
2020 — COVID-19 Vaccine Research Targeting
APT29 targeted organizations involved in COVID-19 vaccine development in the United States, United Kingdom, and Canada, using WellMess and WellMail malware. The campaign was disclosed in a joint NCSC/CISA/CSE advisory in July 2020.
2024 — Microsoft Corporate Email Compromise
In January 2024, Microsoft disclosed that Midnight Blizzard had compromised its corporate email system through a password spray attack on a legacy test tenant account. The group accessed email accounts of senior leadership and cybersecurity staff, exfiltrating internal communications related to APT29 itself.
Technical Capabilities
APT29 demonstrates advanced technical capabilities with a focus on stealth and long-term access. The group excels at cloud environment exploitation, including abuse of Azure AD, OAuth applications, SAML token forgery, and identity federation manipulation.
SUNBURST used sophisticated anti-detection measures including a two-week dormancy period, environment checks to avoid sandbox execution, and C2 communications designed to mimic legitimate Orion traffic. FoggyWeb and MagicWeb targeted Active Directory Federation Services (AD FS) servers to forge authentication tokens, enabling persistent access to cloud resources.
The group frequently leverages legitimate cloud services for C2, including Azure, Dropbox, Google Drive, and Notion. APT29 uses residential proxy networks and Tor to obfuscate operational infrastructure, making network-level detection difficult.
Attribution
In April 2021, the U.S. government formally attributed the SolarWinds campaign to the SVR, supported by the White House, NSA, FBI, and CISA. The UK’s NCSC concurrently attributed the activity to APT29/SVR. The attribution was based on technical analysis, intelligence community assessments, and the strategic alignment of targets with SVR collection priorities.
Multiple private-sector firms including Mandiant, Microsoft, CrowdStrike, and Volexity independently tracked the SolarWinds campaign and corroborated the SVR attribution. The operational sophistication, targeting focus on government and diplomatic targets, and avoidance of destructive actions are consistent with a foreign intelligence service mandate.
MITRE ATT&CK Profile
Initial Access: APT29 uses supply chain compromise (T1195.002), spearphishing with links (T1566.002), valid accounts from credential spraying (T1078), and exploitation of public-facing applications (T1190).
Persistence: The group abuses cloud account credentials (T1078.004), forges SAML tokens (T1606.002), creates OAuth applications, and deploys AD FS backdoors (MagicWeb, FoggyWeb).
Defense Evasion: Domain trust modification (T1484.002), use of legitimate cloud services for C2, residential proxy networks, and steganography in C2 communications.
Collection: APT29 targets email collections (T1114) and cloud storage, with a focus on policy documents, intelligence assessments, and internal communications of targeted organizations.
Exfiltration: Data exfiltration occurs over C2 channels (T1041) or via legitimate cloud services (T1567.002), with data staged and compressed before transfer.
Sources & References
- MITRE ATT&CK: APT29 — MITRE ATT&CK
- White House: Imposing Costs for Russian Activities — The White House, 2021-04-15
- CISA: Advisory AA20-352A — CISA, 2020-12-17
- Microsoft: NOBELIUM Email-Based Attack — Microsoft Security, 2021-05-27