{"id":7236,"date":"2021-10-28T10:24:35","date_gmt":"2021-10-28T17:24:35","guid":{"rendered":"https:\/\/blogs.infoblox.com\/?p=7236"},"modified":"2021-10-28T10:25:32","modified_gmt":"2021-10-28T17:25:32","slug":"nobelium-rides-again","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/security\/nobelium-rides-again\/","title":{"rendered":"NOBELIUM Rides Again"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">Microsoft noted in a 24 October, 2021 <\/span><a href=\"https:\/\/blogs.microsoft.com\/on-the-issues\/2021\/10\/24\/new-activity-from-russian-actor-nobelium\/\"><span style=\"font-weight: 400;\">publication<\/span><\/a><span style=\"font-weight: 400;\"> that Russia\u2019s external intelligence service, the SVR, is behind yet another campaign to compromise targeted corporate and U.S. government networks and assets. As before, the resources of threat actors sponsored by a major nation state are focused against global IT supply chains.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">SVR involved has been identified by U.S. intelligence and tracked by Microsoft as NOBELIUM. NOBELIUM is also known as the APT29 and Cozy Bear hacking groups\u00b9<\/span><span style=\"font-weight: 400;\">. This is the same notorious threat actor that executed the SolarWinds attack against U.S. software companies in 2020. NOBELIUM appears to have been operating since 2008. They directly target government networks in Europe, research institutes, and think tanks. <\/span><a href=\"https:\/\/attack.mitre.org\/groups\/G0016\"><span style=\"font-weight: 400;\">APT29<\/span><\/a><span style=\"font-weight: 400;\"> is infamous for their compromise of the Democratic National Committee starting in the summer of 2015.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The targeted business segment receiving attention during this attack window seems to be \u201cresellers and other technology service providers that customize, deploy and manage cloud services and other technologies on behalf of their customers.\u201d\u00b2<\/span><span style=\"font-weight: 400;\"> Microsoft has estimated that \u201cas many as 14 of these resellers and service providers have been compromised.\u201d Microsoft first observed this latest campaign in May 2021 and has notified over 140 resellers and technology partners.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">NOBELIUM was previously tied to attacks against critical organizations in the global IT supply chain. In the SolarWinds attack, the threat actors introduced malware via a software update platform that ultimately provided direct access to thousands of downstream customer networks. Microsoft\u2019s conclusion is that Russia is trying to gain \u201clong-term, systematic access to a variety of points in the technology supply chain and establish a mechanism for surveilling &#8211; now or in the future &#8211; targets of interest to the Russian government.\u201d\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Infoblox has been tracking and investigating NOBELIUM and their various malicious efforts for some time. On 2 June, 2021, our Cyber Intelligence Unit (CIU) published the <\/span><a href=\"https:\/\/blogs.infoblox.com\/cyber-threat-intelligence\/nobelium-campaigns-and-malware\/\"><span style=\"font-weight: 400;\">Cyber Threat Advisory: Nobelium Campaigns and Malware<\/span><\/a><span style=\"font-weight: 400;\">. In this CTA we noted that NOBELIUM began conducting a new malicious email campaign since February 2021. It differs significantly from their previous operations that ran from the widely publicized Solarwinds attack. In this early summer campaign, NOBELIUM distributed multiple waves of spear-phishing emails, each revealing an evolution of their malware delivery techniques.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The following cyber threat advisories published by Infoblox on the SolarWinds attack provide more information.\u00a0<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><a href=\"https:\/\/blogs.infoblox.com\/cyber-threat-intelligence\/cyber-threat-advisory-solarwinds-supply-chain-attack\/\"><span style=\"font-weight: 400;\">Cyber Threat Advisory: SolarWinds Supply Chain Attack<\/span><\/a><span style=\"font-weight: 400;\"> &#8211; FireEye had just publicly disclosed information about a supply chain attack affecting SolarWinds\u2019 Orion IT monitoring and management software. This attack infected all versions of Orion software released between March and June 2020 with SUNBURST malware, a sophisticated backdoor that uses HTTP to communicate with attacker infrastructure.\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><a href=\"https:\/\/blogs.infoblox.com\/cyber-threat-intelligence\/cyber-threat-advisory\/solarwinds-and-sunburst-update\/\"><span style=\"font-weight: 400;\">Cyber Threat Advisory: SolarWinds and SUNBURST Update<\/span><\/a><span style=\"font-weight: 400;\"> &#8211; CIU gathered additional information about the wide-ranging effects of this campaign, and the update included some of the latest information from OSINT, conveyed what we have been able to validate, and provided some additional IOCs.<\/span><\/li>\n<\/ul>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><a href=\"https:\/\/blogs.infoblox.com\/cyber-threat-intelligence\/cyber-threat-advisory\/solarwinds-second-update\/\"><span style=\"font-weight: 400;\">Cyber Threat Advisory: SolarWinds Second Update<\/span><\/a><span style=\"font-weight: 400;\">, included new information provided by the latest alert from CISA and recent OSINT on additional attack vectors, use of anti-analysis blocklists, additional information in privilege escalation and persistence, compromised accounts and applications in Azure\/Microsoft 365 environments, and command and control (C&amp;C) protocol.\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><a href=\"https:\/\/blogs.infoblox.com\/cyber-threat-intelligence\/cyber-threat-advisory\/solarwinds-third-update\/\"><span style=\"font-weight: 400;\">Cyber Threat Advisory: SolarWinds Third Update<\/span><\/a><span style=\"font-weight: 400;\">, included new information provided by the Cybersecurity and Infrastructure Security Agency (CISA) and the Department of Defense (DoD) Cyber National Mission Force (CNMF) on additional SolarWinds-related malware variants \u2013 referred to as SUNSHUTTLE and SOLARFLARE. This update also covered recent Russian SVR activities.<\/span><\/li>\n<\/ul>\n<h3><span style=\"font-weight: 400;\">Protecting the Organization\u00a0<\/span><\/h3>\n<h5><span style=\"font-weight: 400;\">There are several best practices, including guidance from CISA, that should be followed to strengthen the security of an organization. They include the following:\u00a0\u00a0\u00a0<\/span><\/h5>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Maintain up-to-date antivirus signatures and engines.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Keep operating system patches up-to-date.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Restrict users\u2019 ability (permissions) to install and run software applications. Do not add users to the local administrators group unless required.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Enforce a strong password policy and implement regular password changes.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Exercise caution when opening email attachments even if the attachment is expected and the sender appears to be known. Scan for and remove suspicious email attachments; ensure the scanned attachment is its \u201ctrue file type\u201d (i.e., the extension matches the file header).<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Monitor users\u2019 web browsing habits; restrict access to sites with unfavorable content.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Scan all software downloaded from the Internet prior to installation.<\/span><\/li>\n<\/ul>\n<h3><span style=\"font-weight: 400;\">Leveraging DNS Security<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Using a DNS security solution like Infoblox\u2019s <\/span><a href=\"https:\/\/www.infoblox.com\/products\/bloxone-threat-defense\/\"><span style=\"font-weight: 400;\">BloxOne Threat Defense<\/span><\/a><span style=\"font-weight: 400;\"> as part of defense in depth to look at threats using DNS is recommended. Coupled with Microsoft\u2019s recommendations for multi-factor authentication, the audit of delegated admin privileges, and more, BloxOne Threat Defense would enhance a strong ecosystem for hardened defense against sophisticated threats.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">DNS security is designed to prevent users&#8217; connection to malicious destinations, and to detect anomalous behaviors in the network such as C&amp;C communications, advanced persistent threat activity, domain generation algorithm (DGA) activity, botnet communications, DNS tunneling, and data exfiltration. In addition, Infoblox DNS security integrates with Security Orchestration Automation and Remediation (SOAR) systems, ITSM solutions, vulnerability scanners and other security ecosystem tools to trigger remediation actions automatically when any malicious activity is detected. This helps speed up an organization&#8217;s response to security events and rapid threat containment.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Analyzing DNS logs is a highly effective way to see what resources a client has been accessing historically. DHCP fingerprint and IPAM metadata provide contextual information on compromised devices such as type of device, OS information, network location and current and historical IP address allocations. All this information helps with event correlation and understanding the scope of a breach.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">BloxOne Threat Defense also combines advanced analytics based on machine learning, highly accurate and aggregated threat intelligence and automation to detect and prevent a broad range of threats, including DGA families, data exfiltration, look-alike domain use, fast flux and many others.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">To find out more about our programs and products please reach out to us via <\/span><a href=\"https:\/\/info.infoblox.com\/contact-sales.html\"><span style=\"font-weight: 400;\">https:\/\/info.infoblox.com\/contact-sales.html<\/span><\/a><span style=\"font-weight: 400;\">.\u00a0<\/span><\/p>\n<h3>Endnotes<\/h3>\n<p>\u00b9<a href=\"https:\/\/attack.mitre.org\/groups\/G0016\/\">https:\/\/attack.mitre.org\/groups\/G0016\/<\/a><\/p>\n<p>\u00b2<a href=\"https:\/\/blogs.microsoft.com\/on-the-issues\/2021\/10\/24\/new-activity-from-russian-actor-nobelium\/\">https:\/\/blogs.microsoft.com\/on-the-issues\/2021\/10\/24\/new-activity-from-russian-actor-nobelium\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Microsoft noted in a 24 October, 2021 publication that Russia\u2019s external intelligence service, the SVR, is behind yet another campaign to compromise targeted corporate and U.S. government networks and assets. As before, the resources of threat actors sponsored by a major nation state are focused against global IT supply chains. SVR involved has been identified [&hellip;]<\/p>\n","protected":false},"author":324,"featured_media":6733,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[2],"tags":[587,480,588,481,368,228],"class_list":{"0":"post-7236","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-security","8":"tag-nobellium","9":"tag-apt29","10":"tag-svr","11":"tag-cozy-bear","12":"tag-federal","13":"tag-bloxone-threat-defense","14":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>NOBELIUM Rides Again<\/title>\n<meta name=\"description\" content=\"NOBELIUM Rides Again. Microsoft noted in a 24 October, 2021 publication that Russia\u2019s external intelligence service, the SVR, is behind yet another campaign to compromise targeted corporate and U.S. government networks and assets. As before, the resources of threat actors sponsored by a major nation state are focused against global IT supply chains.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/security\/nobelium-rides-again\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"NOBELIUM Rides Again\" \/>\n<meta property=\"og:description\" content=\"NOBELIUM Rides Again. Microsoft noted in a 24 October, 2021 publication that Russia\u2019s external intelligence service, the SVR, is behind yet another campaign to compromise targeted corporate and U.S. government networks and assets. As before, the resources of threat actors sponsored by a major nation state are focused against global IT supply chains.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/security\/nobelium-rides-again\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2021-10-28T17:24:35+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-10-28T17:25:32+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/ciu-image-37.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"612\" \/>\n\t<meta property=\"og:image:height\" content=\"344\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Michael Zuckerman\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Michael Zuckerman\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/nobelium-rides-again\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/nobelium-rides-again\\\/\"},\"author\":{\"name\":\"Michael Zuckerman\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/212816c17be869578ba1574b5fc7abf4\"},\"headline\":\"NOBELIUM Rides Again\",\"datePublished\":\"2021-10-28T17:24:35+00:00\",\"dateModified\":\"2021-10-28T17:25:32+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/nobelium-rides-again\\\/\"},\"wordCount\":991,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/nobelium-rides-again\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/ciu-image-37.jpg\",\"keywords\":[\"Nobellium\",\"APT29\",\"SVR\",\"Cozy Bear\",\"Federal\",\"BloxOne\u00ae Threat Defense\"],\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/nobelium-rides-again\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/nobelium-rides-again\\\/\",\"name\":\"NOBELIUM Rides Again\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/nobelium-rides-again\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/nobelium-rides-again\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/ciu-image-37.jpg\",\"datePublished\":\"2021-10-28T17:24:35+00:00\",\"dateModified\":\"2021-10-28T17:25:32+00:00\",\"description\":\"NOBELIUM Rides Again. Microsoft noted in a 24 October, 2021 publication that Russia\u2019s external intelligence service, the SVR, is behind yet another campaign to compromise targeted corporate and U.S. government networks and assets. As before, the resources of threat actors sponsored by a major nation state are focused against global IT supply chains.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/nobelium-rides-again\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/nobelium-rides-again\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/nobelium-rides-again\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/ciu-image-37.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/ciu-image-37.jpg\",\"width\":612,\"height\":344,\"caption\":\"computer screen with programming code and an alert message, concept of computer security, malware or hacker attack (3d render)\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/nobelium-rides-again\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/security\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"NOBELIUM Rides Again\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/212816c17be869578ba1574b5fc7abf4\",\"name\":\"Michael Zuckerman\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_324_1628613720-96x96.jpg\",\"url\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_324_1628613720-96x96.jpg\",\"contentUrl\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_324_1628613720-96x96.jpg\",\"caption\":\"Michael Zuckerman\"},\"description\":\"Michael Zuckerman is a seasoned B2B product marketing and marketing strategy consultant with experience in the cybersecurity marketplace. Zuckerman\u2019s domain experience in cybersecurity over the past 10 years includes DNS security, threat intelligence, threat intelligence platforms (TIP), container security, mobile device security, moving target defense, network threat analysis (AI), sandbox, deception technology, cloud access security brokers (CASB), SASE, AI based SIEM, secure collaborative governance, and related technology sets to include data loss prevention (DLP), user and entity behavior analytics (UEBA), and encryption.\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/michael-zuckerman\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"NOBELIUM Rides Again","description":"NOBELIUM Rides Again. Microsoft noted in a 24 October, 2021 publication that Russia\u2019s external intelligence service, the SVR, is behind yet another campaign to compromise targeted corporate and U.S. government networks and assets. As before, the resources of threat actors sponsored by a major nation state are focused against global IT supply chains.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/security\/nobelium-rides-again\/","og_locale":"en_US","og_type":"article","og_title":"NOBELIUM Rides Again","og_description":"NOBELIUM Rides Again. Microsoft noted in a 24 October, 2021 publication that Russia\u2019s external intelligence service, the SVR, is behind yet another campaign to compromise targeted corporate and U.S. government networks and assets. As before, the resources of threat actors sponsored by a major nation state are focused against global IT supply chains.","og_url":"https:\/\/www.infoblox.com\/blog\/security\/nobelium-rides-again\/","og_site_name":"Infoblox Blog","article_published_time":"2021-10-28T17:24:35+00:00","article_modified_time":"2021-10-28T17:25:32+00:00","og_image":[{"width":612,"height":344,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/ciu-image-37.jpg","type":"image\/jpeg"}],"author":"Michael Zuckerman","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Michael Zuckerman","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/security\/nobelium-rides-again\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/nobelium-rides-again\/"},"author":{"name":"Michael Zuckerman","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/212816c17be869578ba1574b5fc7abf4"},"headline":"NOBELIUM Rides Again","datePublished":"2021-10-28T17:24:35+00:00","dateModified":"2021-10-28T17:25:32+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/nobelium-rides-again\/"},"wordCount":991,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/nobelium-rides-again\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/ciu-image-37.jpg","keywords":["Nobellium","APT29","SVR","Cozy Bear","Federal","BloxOne\u00ae Threat Defense"],"articleSection":["Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/security\/nobelium-rides-again\/","url":"https:\/\/www.infoblox.com\/blog\/security\/nobelium-rides-again\/","name":"NOBELIUM Rides Again","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/nobelium-rides-again\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/nobelium-rides-again\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/ciu-image-37.jpg","datePublished":"2021-10-28T17:24:35+00:00","dateModified":"2021-10-28T17:25:32+00:00","description":"NOBELIUM Rides Again. Microsoft noted in a 24 October, 2021 publication that Russia\u2019s external intelligence service, the SVR, is behind yet another campaign to compromise targeted corporate and U.S. government networks and assets. As before, the resources of threat actors sponsored by a major nation state are focused against global IT supply chains.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/nobelium-rides-again\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/security\/nobelium-rides-again\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/security\/nobelium-rides-again\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/ciu-image-37.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/ciu-image-37.jpg","width":612,"height":344,"caption":"computer screen with programming code and an alert message, concept of computer security, malware or hacker attack (3d render)"},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/security\/nobelium-rides-again\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Security","item":"https:\/\/www.infoblox.com\/blog\/category\/security\/"},{"@type":"ListItem","position":3,"name":"NOBELIUM Rides Again"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/212816c17be869578ba1574b5fc7abf4","name":"Michael Zuckerman","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_324_1628613720-96x96.jpg","url":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_324_1628613720-96x96.jpg","contentUrl":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_324_1628613720-96x96.jpg","caption":"Michael Zuckerman"},"description":"Michael Zuckerman is a seasoned B2B product marketing and marketing strategy consultant with experience in the cybersecurity marketplace. Zuckerman\u2019s domain experience in cybersecurity over the past 10 years includes DNS security, threat intelligence, threat intelligence platforms (TIP), container security, mobile device security, moving target defense, network threat analysis (AI), sandbox, deception technology, cloud access security brokers (CASB), SASE, AI based SIEM, secure collaborative governance, and related technology sets to include data loss prevention (DLP), user and entity behavior analytics (UEBA), and encryption.","url":"https:\/\/www.infoblox.com\/blog\/author\/michael-zuckerman\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/7236","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/324"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=7236"}],"version-history":[{"count":3,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/7236\/revisions"}],"predecessor-version":[{"id":7239,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/7236\/revisions\/7239"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/6733"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=7236"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=7236"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=7236"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}