Tom Latimer’s Post

View profile for Tom Latimer, graphic

Cyber Security Leader & Architect | CISSP | CCSP | CISM | SCF | CRISC | CPDSE

"On Jan. 12, Microsoft detected a threat actor who gained access to a small percentage of corporate email accounts, exfiltrated emails and attached documents of high-value targets, including those of senior leadership, cybersecurity and legal teams, along with other internal employee identities. Based on the details provided by Microsoft at the time of this writing, it appears the initial objective of the attack was to acquire information. Once inside target email accounts, Cozy Bear searched for specific information about, well, Cozy Bear. The group likely wanted to better understand its adversary (the intelligence teams gathering information on it) and discover the countermeasures intended to lure and stop it. Examples of what the threat actor might be interested in include indicators of compromise (IoC), exposed cloud infrastructure used by the attacker, IP ranges and known tactics, techniques and procedures (TTPs)." https://lnkd.in/gqtHJehn

APT29’s Attack on Microsoft: Tracking Cozy Bear’s Footprints

APT29’s Attack on Microsoft: Tracking Cozy Bear’s Footprints

cyberark.com

To view or add a comment, sign in

Explore topics