{"id":5425,"date":"2020-07-24T10:54:10","date_gmt":"2020-07-24T17:54:10","guid":{"rendered":"https:\/\/blogs.infoblox.com\/?p=5425"},"modified":"2020-12-05T15:13:10","modified_gmt":"2020-12-05T23:13:10","slug":"apt29-threat-group-targets-covid-19-vaccine-research","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/security\/apt29-threat-group-targets-covid-19-vaccine-research\/","title":{"rendered":"APT29 Threat Group Targets COVID-19 Vaccine Research"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">Late last week, intelligence agencies in Canada, the United Kingdom, and the United States have identified the APT29 threat group (also known as YTTRIUM, The Dukes, Cozy Bear<sup>1<\/sup><\/span><span style=\"font-weight: 400;\">) as behind a targeted attack on pharmaceutical and academic research organizations involved in COVID-19 vaccine development and research. These and other APT29 threat group operations appear to be directly backed by the Russian government. It is surmised that the APT29 threat group may likely be an integral part of the Russian intelligence service.<sup>2<\/sup><\/span><span style=\"font-weight: 400;\">\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The APT29 threat group has been behind a long string of malicious activities that have been identified since 2008. The APT29 threat group is the same group implicated in the criminal hacking of the Democratic National Committee that started in the summer of 2015 and was intended to influence the 2016 U.S. presidential elections. Phishing campaigns against the White House and other U.S. government agencies were also attributed to APT29.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The U.K.\u2019s National Cyber Security Centre noted that the APT29 threat group uses custom malware known as \u201cWellMess\u201d and \u201cWellMail\u201d in support of this attack upon COVID-19 vaccine development. These recent attacks on COVID-19 vaccine research are the first time that this WellMess and WellMail malware has been publicly associated with the APT29 threat group.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The APT29 threat group modus operandi is to use publicly available exploits for known vulnerabilities to gain authentication credentials. In these very recent attacks, APT29 was found to conduct vulnerability scanning against the IP addresses owned by the targeted organizations. They have also used spear-phishing to obtain authentication credentials to internet access login pages.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">APT29 then deploys WellMess malware to conduct operations on the compromised systems. WellMail malware is a tool that runs scripts or commands and then sends the results so the command and control (C2) server. This malware is named \u201cWellMail\u201d as the NCSC has noted the word \u201cmail\u201d in the file paths in the samples they analyzed.<sup>3<\/sup><\/span><span style=\"font-weight: 400;\"> The malware can communicate with the C2 server via three communication methods, which include HTTP, HTTPS, and DNS<\/span><span style=\"font-weight: 400;\">.<sup>4<\/sup>\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">APT29 knows that DNS is a well-established and trusted protocol. They also understand that many organizations still do not examine their DNS traffic for malicious activity. DNS tunneling enables the APT29 threat group to insert malware or pass stolen information into DNS queries, creating a covert communication channel that bypasses most firewalls. DNS tunneling often <\/span><span style=\"font-weight: 400;\">includes data payloads that can be added to an attacked DNS server and used to control a remote server and applications.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">DNS tunneling doesn&#8217;t require the compromised system to have external network connectivity, as DNS tunneling involves access to an internal DNS server with network access. The APT29 threat group must also control a domain and a server that can act as an authoritative server to execute the server-side tunneling and data payload executable programs.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Other sources of information on this attack may be referenced here:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\"><b>Detailed information on the DNS Communications used in the APT29 attack chain<\/b><span style=\"font-weight: 400;\">: <\/span><a href=\"https:\/\/www.pwc.co.uk\/issues\/cyber-security-services\/insights\/cleaning-up-after-wellmess.html\"><span style=\"font-weight: 400;\">https:\/\/www.pwc.co.uk\/issues\/cyber-security-services\/insights\/cleaning-up-after-wellmess.html<\/span><\/a><\/li>\n<li style=\"font-weight: 400;\"><b>National Cyber Security Centre Advisory on APT29 Targeting COVID-19 vaccine development<\/b><span style=\"font-weight: 400;\">: <\/span><a href=\"https:\/\/media.defense.gov\/2020\/Jul\/16\/2002457639\/-1\/-1\/0\/NCSC_APT29_ADVISORY-QUAD-OFFICIAL-20200709-1810.PDF\"><span style=\"font-weight: 400;\">https:\/\/media.defense.gov\/2020\/Jul\/16\/2002457639\/-1\/-1\/0\/NCSC_APT29_ADVISORY-QUAD-OFFICIAL-20200709-1810.PDF<\/span><\/a><\/li>\n<li style=\"font-weight: 400;\"><b>MITRE ATT&amp;CK &#8211; APT29 Attack Group disambiguation<\/b><span style=\"font-weight: 400;\">: <\/span><a href=\"https:\/\/attack.mitre.org\/groups\/G0016\/\"><span style=\"font-weight: 400;\">https:\/\/attack.mitre.org\/groups\/G0016\/<\/span><\/a><\/li>\n<li style=\"font-weight: 400;\"><b>AP News &#8211; Russian is hacking virus vaccine trials<\/b><span style=\"font-weight: 400;\">: <\/span><a href=\"https:\/\/apnews.com\/47797e89ddb470b3244fae3a799481c5\"><span style=\"font-weight: 400;\">https:\/\/apnews.com\/47797e89ddb470b3244fae3a799481c5<\/span><\/a><\/li>\n<\/ul>\n<p><sup>1<\/sup><a href=\"https:\/\/attack.mitre.org\/groups\/G0016\/\">https:\/\/attack.mitre.org\/groups\/G0016\/<\/a><br \/>\n<sup>2<\/sup><a href=\"https:\/\/www.healthcareitnews.com\/news\/russian-hackers-targeting-healthcare-orgs-coronavirus-vaccine-info\">https:\/\/www.healthcareitnews.com\/news\/russian-hackers-targeting-healthcare-orgs-coronavirus-vaccine-info<\/a><br \/>\n<sup>3<\/sup><a href=\"https:\/\/www.ncsc.gov.uk\/files\/Advisory-APT29-targets-COVID-19-vaccine-development-V1-1.pdf\">https:\/\/www.ncsc.gov.uk\/files\/Advisory-APT29-targets-COVID-19-vaccine-development-V1-1.pdf<\/a><br \/>\n<sup>4<\/sup><a href=\"https:\/\/www.pwc.co.uk\/issues\/cyber-security-services\/insights\/cleaning-up-after-wellmess.html\">https:\/\/www.pwc.co.uk\/issues\/cyber-security-services\/insights\/cleaning-up-after-wellmess.htm-1.pdf<\/a><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Late last week, intelligence agencies in Canada, the United Kingdom, and the United States have identified the APT29 threat group (also known as YTTRIUM, The Dukes, Cozy Bear1) as behind a targeted attack on pharmaceutical and academic research organizations involved in COVID-19 vaccine development and research. These and other APT29 threat group operations appear to [&hellip;]<\/p>\n","protected":false},"author":324,"featured_media":3599,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[2],"tags":[255,32,307,15,48,40,346],"class_list":{"0":"post-5425","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-security","8":"tag-covid-19","9":"tag-malware","10":"tag-phishing","11":"tag-security","12":"tag-threat","13":"tag-threat-intelligence","14":"tag-healthcare","15":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>APT29 Threat Group Targets COVID-19 Vaccine Research<\/title>\n<meta name=\"description\" content=\"Late last week, intelligence agencies in Canada, the United Kingdom, and the United States have identified the APT29 threat group (also known as YTTRIUM, The Dukes, Cozy Bear) as behind a targeted attack on pharmaceutical and academic research organizations involved in COVID-19 vaccine development and research. These and other APT29 threat group operations appear to be directly backed by the Russian government. It is surmised that the APT29 threat group may likely be an integral part of the Russian intelligence service.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/security\/apt29-threat-group-targets-covid-19-vaccine-research\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"APT29 Threat Group Targets COVID-19 Vaccine Research\" \/>\n<meta property=\"og:description\" content=\"Late last week, intelligence agencies in Canada, the United Kingdom, and the United States have identified the APT29 threat group (also known as YTTRIUM, The Dukes, Cozy Bear) as behind a targeted attack on pharmaceutical and academic research organizations involved in COVID-19 vaccine development and research. These and other APT29 threat group operations appear to be directly backed by the Russian government. It is surmised that the APT29 threat group may likely be an integral part of the Russian intelligence service.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/security\/apt29-threat-group-targets-covid-19-vaccine-research\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2020-07-24T17:54:10+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-12-05T23:13:10+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/september1-1-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"660\" \/>\n\t<meta property=\"og:image:height\" content=\"454\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Michael Zuckerman\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Michael Zuckerman\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/apt29-threat-group-targets-covid-19-vaccine-research\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/apt29-threat-group-targets-covid-19-vaccine-research\\\/\"},\"author\":{\"name\":\"Michael Zuckerman\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/212816c17be869578ba1574b5fc7abf4\"},\"headline\":\"APT29 Threat Group Targets COVID-19 Vaccine Research\",\"datePublished\":\"2020-07-24T17:54:10+00:00\",\"dateModified\":\"2020-12-05T23:13:10+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/apt29-threat-group-targets-covid-19-vaccine-research\\\/\"},\"wordCount\":597,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/apt29-threat-group-targets-covid-19-vaccine-research\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/september1-1-1.jpg\",\"keywords\":[\"Covid-19\",\"Malware\",\"Phishing\",\"Security\",\"Threat\",\"Threat Intelligence\",\"Healthcare\"],\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/apt29-threat-group-targets-covid-19-vaccine-research\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/apt29-threat-group-targets-covid-19-vaccine-research\\\/\",\"name\":\"APT29 Threat Group Targets COVID-19 Vaccine Research\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/apt29-threat-group-targets-covid-19-vaccine-research\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/apt29-threat-group-targets-covid-19-vaccine-research\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/september1-1-1.jpg\",\"datePublished\":\"2020-07-24T17:54:10+00:00\",\"dateModified\":\"2020-12-05T23:13:10+00:00\",\"description\":\"Late last week, intelligence agencies in Canada, the United Kingdom, and the United States have identified the APT29 threat group (also known as YTTRIUM, The Dukes, Cozy Bear) as behind a targeted attack on pharmaceutical and academic research organizations involved in COVID-19 vaccine development and research. These and other APT29 threat group operations appear to be directly backed by the Russian government. It is surmised that the APT29 threat group may likely be an integral part of the Russian intelligence service.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/apt29-threat-group-targets-covid-19-vaccine-research\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/apt29-threat-group-targets-covid-19-vaccine-research\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/apt29-threat-group-targets-covid-19-vaccine-research\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/september1-1-1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/september1-1-1.jpg\",\"width\":660,\"height\":454,\"caption\":\"Enhanced IPAM with Network Insight\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/apt29-threat-group-targets-covid-19-vaccine-research\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/security\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"APT29 Threat Group Targets COVID-19 Vaccine Research\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/212816c17be869578ba1574b5fc7abf4\",\"name\":\"Michael Zuckerman\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_324_1628613720-96x96.jpg\",\"url\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_324_1628613720-96x96.jpg\",\"contentUrl\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_324_1628613720-96x96.jpg\",\"caption\":\"Michael Zuckerman\"},\"description\":\"Michael Zuckerman is a seasoned B2B product marketing and marketing strategy consultant with experience in the cybersecurity marketplace. Zuckerman\u2019s domain experience in cybersecurity over the past 10 years includes DNS security, threat intelligence, threat intelligence platforms (TIP), container security, mobile device security, moving target defense, network threat analysis (AI), sandbox, deception technology, cloud access security brokers (CASB), SASE, AI based SIEM, secure collaborative governance, and related technology sets to include data loss prevention (DLP), user and entity behavior analytics (UEBA), and encryption.\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/michael-zuckerman\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"APT29 Threat Group Targets COVID-19 Vaccine Research","description":"Late last week, intelligence agencies in Canada, the United Kingdom, and the United States have identified the APT29 threat group (also known as YTTRIUM, The Dukes, Cozy Bear) as behind a targeted attack on pharmaceutical and academic research organizations involved in COVID-19 vaccine development and research. These and other APT29 threat group operations appear to be directly backed by the Russian government. It is surmised that the APT29 threat group may likely be an integral part of the Russian intelligence service.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/security\/apt29-threat-group-targets-covid-19-vaccine-research\/","og_locale":"en_US","og_type":"article","og_title":"APT29 Threat Group Targets COVID-19 Vaccine Research","og_description":"Late last week, intelligence agencies in Canada, the United Kingdom, and the United States have identified the APT29 threat group (also known as YTTRIUM, The Dukes, Cozy Bear) as behind a targeted attack on pharmaceutical and academic research organizations involved in COVID-19 vaccine development and research. These and other APT29 threat group operations appear to be directly backed by the Russian government. It is surmised that the APT29 threat group may likely be an integral part of the Russian intelligence service.","og_url":"https:\/\/www.infoblox.com\/blog\/security\/apt29-threat-group-targets-covid-19-vaccine-research\/","og_site_name":"Infoblox Blog","article_published_time":"2020-07-24T17:54:10+00:00","article_modified_time":"2020-12-05T23:13:10+00:00","og_image":[{"width":660,"height":454,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/september1-1-1.jpg","type":"image\/jpeg"}],"author":"Michael Zuckerman","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Michael Zuckerman","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/security\/apt29-threat-group-targets-covid-19-vaccine-research\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/apt29-threat-group-targets-covid-19-vaccine-research\/"},"author":{"name":"Michael Zuckerman","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/212816c17be869578ba1574b5fc7abf4"},"headline":"APT29 Threat Group Targets COVID-19 Vaccine Research","datePublished":"2020-07-24T17:54:10+00:00","dateModified":"2020-12-05T23:13:10+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/apt29-threat-group-targets-covid-19-vaccine-research\/"},"wordCount":597,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/apt29-threat-group-targets-covid-19-vaccine-research\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/september1-1-1.jpg","keywords":["Covid-19","Malware","Phishing","Security","Threat","Threat Intelligence","Healthcare"],"articleSection":["Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/security\/apt29-threat-group-targets-covid-19-vaccine-research\/","url":"https:\/\/www.infoblox.com\/blog\/security\/apt29-threat-group-targets-covid-19-vaccine-research\/","name":"APT29 Threat Group Targets COVID-19 Vaccine Research","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/apt29-threat-group-targets-covid-19-vaccine-research\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/apt29-threat-group-targets-covid-19-vaccine-research\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/september1-1-1.jpg","datePublished":"2020-07-24T17:54:10+00:00","dateModified":"2020-12-05T23:13:10+00:00","description":"Late last week, intelligence agencies in Canada, the United Kingdom, and the United States have identified the APT29 threat group (also known as YTTRIUM, The Dukes, Cozy Bear) as behind a targeted attack on pharmaceutical and academic research organizations involved in COVID-19 vaccine development and research. These and other APT29 threat group operations appear to be directly backed by the Russian government. It is surmised that the APT29 threat group may likely be an integral part of the Russian intelligence service.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/apt29-threat-group-targets-covid-19-vaccine-research\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/security\/apt29-threat-group-targets-covid-19-vaccine-research\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/security\/apt29-threat-group-targets-covid-19-vaccine-research\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/september1-1-1.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/september1-1-1.jpg","width":660,"height":454,"caption":"Enhanced IPAM with Network Insight"},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/security\/apt29-threat-group-targets-covid-19-vaccine-research\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Security","item":"https:\/\/www.infoblox.com\/blog\/category\/security\/"},{"@type":"ListItem","position":3,"name":"APT29 Threat Group Targets COVID-19 Vaccine Research"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/212816c17be869578ba1574b5fc7abf4","name":"Michael Zuckerman","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_324_1628613720-96x96.jpg","url":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_324_1628613720-96x96.jpg","contentUrl":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_324_1628613720-96x96.jpg","caption":"Michael Zuckerman"},"description":"Michael Zuckerman is a seasoned B2B product marketing and marketing strategy consultant with experience in the cybersecurity marketplace. Zuckerman\u2019s domain experience in cybersecurity over the past 10 years includes DNS security, threat intelligence, threat intelligence platforms (TIP), container security, mobile device security, moving target defense, network threat analysis (AI), sandbox, deception technology, cloud access security brokers (CASB), SASE, AI based SIEM, secure collaborative governance, and related technology sets to include data loss prevention (DLP), user and entity behavior analytics (UEBA), and encryption.","url":"https:\/\/www.infoblox.com\/blog\/author\/michael-zuckerman\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/5425","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/324"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=5425"}],"version-history":[{"count":5,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/5425\/revisions"}],"predecessor-version":[{"id":5434,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/5425\/revisions\/5434"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/3599"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=5425"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=5425"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=5425"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}