Also known as: Cozy Bear, The Dukes, Nobelium, Midnight Blizzard, YTTRIUM, UNC2452, Dark Halo, Iron Hemlock, Cloaked Ursa, BlueBravo, UNC6293, CozyLarch, ICECAP, StellarParticle, UAC-0029
T1195.002
T1078.004
T1550.001
T1556
T1027.013
T1071.001
T1568.002
T1098.003
T1114.002
T1199
T1621
T1528
T1656
T1550
T1091
T1534
T1213
T1606
T1213.002
T1087.004
T1110.001
T1213.003
Sophisticated backdoor inserted into SolarWinds Orion software updates (supply chain attack). Used passive DNS-based C2 and multiple evasion techniques to remain undetected for months.
Memory-only dropper deployed via SUNBURST to load Cobalt Strike beacons. Never touched disk, making forensic recovery extremely difficult.
Post-compromise backdoor targeting AD FS servers. Extracts configuration databases and intercepts/modifies SAML tokens for persistent access to cloud resources.
Evolved version of FoggyWeb that manipulates AD FS authentication claims, allowing the actor to authenticate as any user without their credentials.
HTML smuggling tool delivered via spear-phishing emails. Deobfuscates and drops ISO/IMG files containing malicious payloads, bypassing email security gateways.
Cross-platform backdoor (Go/.NET) used to target COVID-19 vaccine research organizations. Supports encrypted C2 communication via HTTP/TLS.
Go-based C2 backdoor deployed as second-stage after SUNBURST. Uses decoy traffic generators and time-based execution guards to evade sandbox analysis.
Backdoor that uses the Microsoft Notion API as C2 channel, blending command traffic with legitimate cloud service usage.
Primary post-exploitation framework used after initial access. Memory-resident beacons provide persistent C2, lateral movement, and credential harvesting capabilities.
Deployed for credential extraction from LSASS memory, Kerberos ticket manipulation (Golden/Silver Tickets), and DCSync attacks for domain-wide compromise.
Commercial red team C2 framework used as an alternative to Cobalt Strike. Designed to evade EDR/AV detection with features like syscall manipulation.
Legitimate remote desktop tool deployed post-compromise for persistent remote access. Harder for defenders to flag as malicious due to legitimate business use.
Used for fileless payload execution, token manipulation, and accessing Microsoft Graph API for cloud environment reconnaissance.
PowerShell module for Azure AD manipulation. Used to extract tokens, modify tenant configurations, and maintain persistent access to Microsoft 365 environments.
Loader malware used in SolarWinds campaign to deploy Cobalt Strike. Used a modified Lempel-Ziv-Markov chain algorithm for steganographic payload hiding.
Open-source C2 framework used as alternative to Cobalt Strike. Supports mTLS, WireGuard, DNS, and HTTP C2 channels with cross-platform implants.
Malicious ISO-based loader used to deploy additional payloads
Custom backdoor delivered via ISO files in phishing campaigns
Modular backdoor targeting diplomatic entities
Python-based backdoor with web shell capabilities
Shellcode-based backdoor deployed in recent campaigns
Downloader used to fetch and execute additional payloads
Custom malicious OAuth application for email access
| Type | Value |
|---|---|
| domain | avsvmcloud[.]com |
| domain | freescanonline[.]com |
| domain | theyardservice[.]com |
| ip | 13[.]59[.]205[.]66 |
| ip | 54[.]193[.]127[.]66 |
| hash | b91ce2fa41029f6955bff20079468448 |
| domain | bakenhof[.]com |
| domain | silry[.]com |
| domain | bravecup[.]com |
| hash | 653db3b63bb0e8c2db675cd047b737cefebb1c955bd99e7a93899e2144d34358 |
| hash | 78a810e47e288a6aff7ffbaf1f20144d2b317a1618bba840d42405cddc4cff41 |
| hash | d931078b63d94726d4be5dc1a00324275b53b935b77d3eed1712461f0c180164 |
| domain | dataplane[.]theyardservice[.]com |
| domain | msedgepackageinfo[.]com |
| domain | cdn[.]msstatic[.]com |
| hash | fc2c3d3d2b0f9a6e5c8f5e4d3c2b1a0987654321fedcba0987654321fedcba09 |
| domain | dataplane[.]cakewalkcompany[.]com |
| Domain / Host | Status |
|---|---|
avsvmcloud[.]comSUNBURST C2 domain (SolarWinds attack) | ip_changed |
freescanonline[.]comC2 infrastructure for SUNBURST second-stage | whois_changed |
theyardservice[.]comNobelium phishing infrastructure (2021) | active |
13[.]59[.]205[.]66SolarWinds SUNBURST C2 infrastructure | offline |
54[.]193[.]127[.]66C2 node used in government targeting | offline |
bakenhof[.]com | whois_changed |
silry[.]com | active |
bravecup[.]com | whois_changed |
Infrastructure data reflects monitoring status only — no raw fingerprint data is exposed.
MITRE ATT&CK - APT29
https://attack.mitre.org/groups/G0016/
Microsoft - Midnight Blizzard (Nobelium)
https://www.microsoft.com/en-us/security/blog/threat-intelligence/midnight-blizzard-nobelium/
CISA - SolarWinds Supply Chain Compromise
https://www.cisa.gov/news-events/cybersecurity-advisories/aa20-352a
Check Point: Renewed APT29 Phishing Campaign Against European Diplomats
https://research.checkpoint.com/2025/apt29-phishing-campaign/
Microsoft: Midnight Blizzard conducts large-scale spear-phishing campaign using RDP files
https://www.microsoft.com/en-us/security/blog/2024/10/29/midnight-blizzard-conducts-large-scale-spear-phishing-campaign-using-rdp-files/
Google: What's in an ASP? Creative Phishing Attack on Prominent Academics and Critics of Russia
https://cloud.google.com/blog/topics/threat-intelligence/creative-phishing-academics-critics-of-russia
Citizen Lab: Russian Government-Linked Social Engineering Targets App-Specific Passwords
https://citizenlab.ca/2025/06/russian-government-linked-social-engineering-targets-app-specific-passwords/
Picus: Understanding and Mitigating Midnight Blizzard's RDP-Based Spear Phishing Campaign
https://www.picussecurity.com/resource/blog/understanding-and-mitigating-midnight-blizzards-rdp-based-spearphishing-campaign
Microsoft: Midnight Blizzard: Guidance for responders on nation-state attack
https://www.microsoft.com/en-us/security/blog/2024/01/25/midnight-blizzard-guidance-for-responders-on-nation-state-attack/
Mandiant: Suspected APT29 Operation Launches Election Fraud-Themed Phishing Campaigns
https://www.mandiant.com/resources/blog/apt29-wineloader-german-political-parties
CISA: Russian Foreign Intelligence Service SVR Exploiting JetBrains TeamCity CVE Globally
https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-347a
Volexity: Ongoing Investigation into CVE-2023-42793 Exploitation by APT29
https://www.volexity.com/blog/2023/10/13/cve-2023-42793-quick-assessment-guide/
Unit 42: NOBELIUM Targets Government Agencies with HTML Smuggling
https://unit42.paloaltonetworks.com/nobelium-targets-government-html-smuggling/