Midnight Blizzard

Threat Actor updated a month ago (2024-11-29T13:46:21.655Z)
Download STIX
Preview STIX
Midnight Blizzard, also known as APT29 or Cozy Bear, is a Russia-linked threat actor associated with the country's Foreign Intelligence Service (SVR). Throughout 2024, the group has been implicated in several high-profile cyber-attacks, targeting global organizations and demonstrating sophisticated hacking techniques. Notably, they breached Microsoft systems twice, compromising corporate email systems and gaining access to source code repositories and internal systems. In addition, Midnight Blizzard executed a successful hack against Hewlett Packard Enterprise (HPE), further underlining their capabilities. The group's modus operandi includes large-scale spear-phishing campaigns, often utilizing Remote Desktop Protocol (RDP) files, a novel access vector for this actor. This technique was notably used when Amazon identified domains mimicking its service being abused by Midnight Blizzard, following Ukrainian language phishing emails containing RDP configuration files. The group's use of signed RDP files in its campaigns is significant, allowing them to establish a quick, bidirectional connection with compromised devices. There are concerns about potential collaborations between Midnight Blizzard and other Russian nation-state threat actors, such as Nobelium, particularly given the abnormality of 2024's high-profile attacks against the healthcare sector. To mitigate the threat posed by Midnight Blizzard, Microsoft has released a list of indicators of compromise for the new campaign, including email sender domains, RDP files, and RDP remote computer domains. Cybersecurity experts recommend vigilance and proactive defense measures against these evolving threats.
Description last updated: 2024-11-28T11:51:52.023Z
What's your take? (Question 1 of 5)
Help tune the shared Cybergeist dataset, assist your peers, and earn karma. Expand the panel to get started.
Possible Aliases / Cluster overlaps
It's hard to track cluster overlaps and naming conventions between vendors, so here are some possible overlapping names / profiles you also may want to look at. Create a free account to see the source evidence for each alias, and help fix any errors.
Alias DescriptionVotes
APT29 is a possible alias for Midnight Blizzard. APT29, also known as Midnight Blizzard and linked to Russia's Foreign Intelligence Service (SVR), is a notorious threat actor that has been implicated in several high-profile cyberattacks. The group has demonstrated sophisticated capabilities, exploiting vulnerabilities such as the WinRAR 0day flaw
8
Cozy Bear is a possible alias for Midnight Blizzard. Cozy Bear, also known as APT29 and Midnight Blizzard, is a threat actor believed to be linked to the Russian government. This entity has been behind numerous cyberattacks with malicious intent, targeting various organizations and systems worldwide. The first significant intrusion attributed to Cozy
6
NOBELIUM is a possible alias for Midnight Blizzard. Nobelium, a Russia-linked Advanced Persistent Threat (APT) group also known as APT29, SVR Group, BlueBravo, Cozy Bear, Midnight Blizzard, and The Dukes, has been identified as a significant cybersecurity threat. In 2024, Nobelium targeted French diplomatic entities, posing a major concern to the int
6
The Dukes is a possible alias for Midnight Blizzard. The Dukes, also known as APT29, Cozy Bear, Midnight Blizzard, Nobelium, and BlueBravo, is a threat actor associated with the Russian government. The group has been active since at least 2008 and has targeted various governments, think tanks, diplomatic entities, and political parties. Notably, in Se
5
Bluebravo is a possible alias for Midnight Blizzard. BlueBravo, a threat actor linked to the Russia-based Advanced Persistent Threat (APT) group APT29, has been identified as a significant cyber threat. Also known by various other names such as SVR Group, Cozy Bear, Nobelium, Midnight Blizzard, and The Dukes, this entity is suspected of conducting sev
3
Cozybear is a possible alias for Midnight Blizzard. CozyBear, also known as APT29 and Midnight Blizzard, is a threat actor believed to be linked to the Russian state. This group has been actively engaged in cyber operations against Ukraine and its allies and has been involved in several major breaches, including attacks on Okta, Dropbox, Department o
2
Svr is a possible alias for Midnight Blizzard. SVR, Russia's civilian foreign intelligence service and the successor organization to the KGB’s First Chief Directorate, has been conducting cyber espionage activities for years. Known in open source as APT29, Cozy Bear, Midnight Blizzard, Nobelium, and the Dukes, SVR hackers have been spying on US,
2
UNC2452 is a possible alias for Midnight Blizzard. UNC2452, also known as Midnight Blizzard, Cozy Bear, APT29, and Nobelium, is a sophisticated threat actor responsible for several high-profile cyber attacks. The group gained notoriety in December 2020 when it compromised SolarWinds' supply chain, an event tracked by Mandiant, a leading cybersecurit
2
Miscellaneous Associations
Other elements of context that could aid in the identification of relevance
Microsoft
State Sponso...
Apt
Phishing
Blizzard
Russia
CISA
Malware
Proxy
Exploit
Email Accounts
France
Source
Vulnerability
Svr
Corporate
Lateral Move...
Zimbra
Domains
Teamcity
Espionage
Zero Day
Credentials
Analyst Notes & Discussion
Be the first to leave your mark here! Log in to share your views and vote.
Associated Threat Actors
To see the evidence that has resulted in these threatActor associations, create a free account
Alias DescriptionAssociation TypeVotes
The APT28 Threat Actor is associated with Midnight Blizzard. APT28, also known as Fancy Bear, Pawn Storm, Sofacy Group, Sednit, and STRONTIUM, is a threat actor linked to Russia. The group has been associated with cyber espionage campaigns across Central Asia and has historically targeted areas of national security, military operations, and geopolitical influUnspecified
2
Source Document References
Information about the Midnight Blizzard Threat Actor was read from the documents corpus below. This display is limited to 20 results, create a free account to see more
PreviewSource LinkCreatedAtTitle
Securityaffairs
6 days ago
DARKReading
6 days ago
DARKReading
6 days ago
DARKReading
a month ago
CERT-EU
9 months ago
BankInfoSecurity
2 months ago
DARKReading
a month ago
CISA
2 months ago
DARKReading
2 months ago
Securityaffairs
2 months ago
InfoSecurity-magazine
2 months ago
Securityaffairs
2 months ago
InfoSecurity-magazine
3 months ago
DARKReading
3 months ago
DARKReading
4 months ago
Securityaffairs
4 months ago
Securityaffairs
4 months ago
Securityaffairs
5 months ago
Securityaffairs
5 months ago
CERT-EU
a year ago