🇷🇺

APT 29

APT Group Information theft and espionage 76 zero-day CVEs ETDA ✓

Also Known As 19 names

APT29 ATK7 Blue Kitsune BlueBravo COZY BEAR Cloaked Ursa G0016 Grizzly Steppe Group 100 IRON HEMLOCK ITG11 Midnight Blizzard Minidionis Nobelium SeaDuke TA421 The Dukes UAC-0029 YTTRIUM

Target Countries 47

Countries highlighted in red

Australia Azerbaijan Belgium Bulgaria Brazil Belarus Canada Switzerland Chile Cameroon China Cyprus Germany Denmark Spain France United Kingdom Georgia Hungary Ireland Israel India Italy Japan Kyrgyzstan Republic of Korea Kazakhstan Lebanon Lithuania Luxembourg Latvia Montenegro Mexico Netherlands New Zealand Poland Portugal Romania Singapore Slovenia Slovakia Thailand Turkey Ukraine Uganda United States Uzbekistan

Details

Origin 🇷🇺 RU
Last Updated 24 Sep 2025

Malware Families 4

hermeticwiper
zhmimikatz
karagany
Sliver Implant

MITRE ATT&CK 303

T1001 - Data Obfuscation T1001.002 T1001.003 - Protocol Impersonation T1003 - OS Credential Dumping T1003.001 T1003.002 - Security Account Manager T1003.004 T1003.006 T1005 - Data from Local System T1007 T1008 T1011 T1012 - Query Registry T1014 - Rootkit T1015 T1016 T1016.001 T1018 - Remote System Discovery T1020 - Automated Exfiltration T1021 - Remote Services T1021.001 - Remote Desktop Protocol T1021.002 T1021.006 T1021.007 T1022 - Data Encrypted T1023 T1025 - Data from Removable Media T1027 - Obfuscated Files or Information T1027.001 T1027.002 T1027.003 T1027.006 T1030 - Data Transfer Size Limits T1033 - System Owner/User Discovery T1036 - Masquerading T1036.004 T1036.005 T1037 - Boot or Logon Initialization Scripts T1037.004 T1039 - Data from Network Shared Drive T1040 - Network Sniffing T1041 - Exfiltration Over C2 Channel T1043 T1045 - Software Packing T1046 - Network Service Scanning T1047 - Windows Management Instrumentation T1048 - Exfiltration Over Alternative Protocol T1048.002 T1049 - System Network Connections Discovery T1053 - Scheduled Task/Job T1053.005 - Scheduled Task T1055 - Process Injection T1055.001 T1056 - Input Capture T1056.002 - GUI Input Capture T1056.003 - Web Portal Capture T1057 - Process Discovery T1059 - Command and Scripting Interpreter T1059.001 - PowerShell T1059.003 - Windows Command Shell T1059.005 - Visual Basic T1059.006 - Python T1059.007 - JavaScript T1059.009 T1060 - Registry Run Keys / Startup Folder T1064 T1068 - Exploitation for Privilege Escalation T1069 T1069.002 T1070 - Indicator Removal on Host T1070.004 T1070.006 T1070.008 T1071 - Application Layer Protocol T1071.001 - Web Protocols T1074 - Data Staged T1074.002 T1078 - Valid Accounts T1078.002 T1078.003 T1078.004 T1081 - Credentials in Files T1082 - System Information Discovery T1083 - File and Directory Discovery T1084 T1085 T1086 - PowerShell T1087 - Account Discovery T1087.002 T1087.004 T1088 T1090 - Proxy T1090.001 T1090.002 T1090.003 T1090.004 T1091 - Replication Through Removable Media T1092 - Communication Through Removable Media T1095 - Non-Application Layer Protocol T1096 - NTFS File Attributes T1097 T1098 - Account Manipulation T1098.001 T1098.002 T1098.003 T1098.005 T1102 - Web Service T1102.001 - Dead Drop Resolver T1102.002 T1102.003 - One-Way Communication T1104 - Multi-Stage Channels T1105 - Ingress Tool Transfer T1106 - Native API T1107 - File Deletion T1110 - Brute Force T1110.001 T1110.003 T1111 - Two-Factor Authentication Interception T1112 - Modify Registry T1113 - Screen Capture T1114 - Email Collection T1114.001 T1114.002 T1115 - Clipboard Data T1119 - Automated Collection T1120 - Peripheral Device Discovery T1124 T1127 - Trusted Developer Utilities Proxy Execution T1129 - Shared Modules T1130 T1132 - Data Encoding T1132.001 - Standard Encoding T1133 - External Remote Services T1134 - Access Token Manipulation T1135 T1136 T1136.003 T1137 - Office Application Startup T1137.001 - Office Template Macros T1140 - Deobfuscate/Decode Files or Information T1143 - Hidden Window T1158 - Hidden Files and Directories T1170 T1172 T1176 - Browser Extensions T1187 - Forced Authentication T1188 T1189 - Drive-by Compromise T1190 - Exploit Public-Facing Application T1192 - Spearphishing Link T1193 T1195 - Supply Chain Compromise T1195.002 T1199 - Trusted Relationship T1202 - Indirect Command Execution T1203 - Exploitation for Client Execution T1204 - User Execution T1204.001 - Malicious Link T1204.002 - Malicious File T1210 - Exploitation of Remote Services T1211 - Exploitation for Defense Evasion T1213 - Data from Information Repositories T1213.003 T1217 T1218 - Signed Binary Proxy Execution T1218.005 T1218.011 T1219 - Remote Access Software T1221 - Template Injection T1222 - File and Directory Permissions Modification T1482 T1484 T1484.002 T1485 T1486 T1489 T1490 - Inhibit System Recovery T1495 T1496 T1497 - Virtualization/Sandbox Evasion T1497.001 - System Checks T1497.003 T1498 - Network Denial of Service T1503 T1505 - Server Software Component T1505.003 T1518 - Software Discovery T1518.001 - Security Software Discovery T1528 - Steal Application Access Token T1529 T1530 - Data from Cloud Storage Object T1531 T1534 - Internal Spearphishing T1539 - Steal Web Session Cookie T1542 - Pre-OS Boot T1542.003 - Bootkit T1543 - Create or Modify System Process T1546 - Event Triggered Execution T1546.003 T1546.008 T1546.015 T1547 - Boot or Logon Autostart Execution T1547.001 - Registry Run Keys / Startup Folder T1548 T1548.002 T1550 - Use Alternate Authentication Material T1550.001 - Application Access Token T1550.003 T1550.004 T1552 - Unsecured Credentials T1552.004 T1553 - Subvert Trust Controls T1553.002 T1553.005 T1555 T1555.003 T1556 - Modify Authentication Process T1556.004 - Network Device Authentication T1556.007 T1557 - Man-in-the-Middle T1558 T1558.003 T1559 - Inter-Process Communication T1559.002 T1560 - Archive Collected Data T1560.001 T1561 T1562 - Impair Defenses T1562.001 T1562.002 T1562.004 T1562.008 T1564 - Hide Artifacts T1564.003 - Hidden Window T1565 - Data Manipulation T1566 - Phishing T1566.001 - Spearphishing Attachment T1566.002 - Spearphishing Link T1566.003 T1567 - Exfiltration Over Web Service T1568 - Dynamic Resolution T1569 - System Services T1569.002 T1571 - Non-Standard Port T1572 T1573 - Encrypted Channel T1574 - Hijack Execution Flow T1574.002 - DLL Side-Loading T1583 - Acquire Infrastructure T1583.001 - Domains T1583.002 - DNS Server T1583.006 - Web Services T1584 - Compromise Infrastructure T1584.001 - Domains T1585 T1585.001 T1586 - Compromise Accounts T1586.002 T1586.003 T1587 - Develop Capabilities T1587.001 T1587.003 T1588 - Obtain Capabilities T1588.002 T1588.006 T1589 - Gather Victim Identity Information T1589.001 T1590 T1592 - Gather Victim Host Information T1593 - Search Open Websites/Domains T1595 - Active Scanning T1595.002 T1598 - Phishing for Information T1598.002 T1601 T1602 T1606 T1606.001 T1606.002 T1608 - Stage Capabilities T1608.001 - Upload Malware T1608.005 - Link Target T1609 - Container Administration Command T1610 T1621 T1649 T1651 T1665 T1680 T1685 T1685.001 T1685.002 T1686 TA0001 TA0002 - Execution TA0003 - Persistence TA0004 - Privilege Escalation TA0005 - Defense Evasion TA0006 - Credential Access TA0007 - Discovery TA0011 - Command and Control TA0042 TA0043