Profile picture
Matthew Dunwoody @matthewdunwoody
, 13 tweets, 4 min read Read on Twitter
Some observations about Russian #APT29, after dealing with them for years (my views, not my employer's):
#APT29 has used generic phishing emails, like "efax notification". They work on gullible users and hinder identification as targeted attack.
#APT29 uses at least 3 types of backdoors: phishing, operational, persistence.
#APT29 abandons their phishing backdoor as soon as they pivot off patient zero, in favor of their operational tools.
#APT29 deploys stealthy persistence backdoors on systems with no other activity, and ignores them unless needed.
#APT29 uses a phishing backdoor so that when defenders identify the backdoor/email, they will miss the other backdoors and declare victory.
#APT29 phishing attacks are often designed to reside in roaming profiles, in order to persist in VDI environments.
#APT29 sometimes uses misdirection for opsec. They're brazen in some of their activity to hide more discreet actions.
#APT29 appears to use multiple teams for intrusion. B team establishes initial access and persistence. A team completes mission.
#APT29 may phish their primary targets directly, rather than phishing colleagues and moving to target, to ensure access to data.
#APT29 has rotated, changed and combined TTPs during incidents to determine how they are being detected and to confuse defenders.
#APT29 actively monitors the security and IT organizations of victims to track detection and response efforts.
I suspect that #APT29 uses large-scale phishing campaigns to hide their true targets (more distraction-based opsec)
Missing some Tweet in this thread?
You can try to force a refresh.

Like this thread? Get email updates or save it to PDF!

Subscribe to Matthew Dunwoody
Profile picture

Get real-time email alerts when new unrolls are available from this author!

This content may be removed anytime!

Twitter may remove this content at anytime, convert it as a PDF, save and print for later use!

Try unrolling a thread yourself!

how to unroll video

1) Follow Thread Reader App on Twitter so you can easily mention us!

2) Go to a Twitter thread (series of Tweets by the same owner) and mention us with a keyword "unroll" @threadreaderapp unroll

You can practice here first or read more on our help page!

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just three indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member and get exclusive features!

Premium member ($3.00/month or $30.00/year)

Too expensive? Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal Become our Patreon

Thank you for your support!