• Menu
  • Skip to main content
  • Skip to primary sidebar

All Tech News

Latest Technology News

APT29 Exploited a Windows Feature to Compromise European Diplomatic Entity Network

You are here: Home / Cyber Security News / APT29 Exploited a Windows Feature to Compromise European Diplomatic Entity Network

The Russia-joined APT29 nation-condition actor has been uncovered leveraging a “lesser-identified” Windows feature called Credential Roaming as portion of its attack against an unnamed European diplomatic entity.

“The diplomatic-centric concentrating on is constant with Russian strategic priorities as well as historic APT29 concentrating on,” Mandiant researcher Thibault Van Geluwe de Berlaere mentioned in a specialized produce-up.

APT29, a Russian espionage team also referred to as Cozy Bear, Iron Hemlock, and The Dukes, is identified for its intrusions aimed at accumulating intelligence that align with the country’s strategic aims. It is considered to be sponsored by the International Intelligence Assistance (SVR).

Some of the adversarial collective’s cyber actions are tracked publicly less than the moniker Nobelium, a risk cluster responsible for the widespread provide chain compromise by way of SolarWinds software program in December 2020.

The Google-owned danger intelligence and incident response business said it identified the use of Credential Roaming all through the time APT29 was existing within the victim network in early 2022, at which position “numerous LDAP queries with atypical properties” were performed against the Lively Listing system.

Introduced in Windows Server 2003 Company Pack 1 (SP1), Credential Roaming is a system that permits customers to accessibility their credentials (i.e., private keys and certificates) in a protected manner across distinctive workstations in a Windows area.

Investigating its internal workings more, Mandiant highlighted the discovery of an arbitrary file publish vulnerability that could be weaponized by a danger actor to attain remote code execution in the context of the logged-in victim.

The shortcoming, tracked as CVE-2022-30170, was addressed by Microsoft as aspect of Patch Tuesday updates shipped on September 13, 2022, with the organization emphasizing that exploitation necessitates a user to log in to Windows.

“An attacker who efficiently exploited the vulnerability could get distant interactive logon rights to a equipment where by the victim’s account would not generally keep such privilege,” it pointed out.

Mandiant stated the investigation “delivers perception into why APT29 is actively querying the related LDAP attributes in Lively Directory,” urging organizations to apply the September 2022 patches to protected towards the flaw.

Found this post fascinating? Observe THN on Fb, Twitter  and LinkedIn to examine much more exceptional articles we post.

Some parts of this article are sourced from:
thehackernews.com

Previous Post: « The Morning After: Tesla recalls 40,000 cars with broken power steering
Next Post: IBM's latest quantum computing processor triples the qubits of its predecessor »

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Recent Posts

  • Chinese Hackers Exploit Trimble Cityworks Flaw to Infiltrate U.S. Government Networks
  • Critical Windows Server 2025 dMSA Vulnerability Enables Active Directory Compromise
  • Chinese Hackers Exploit Ivanti EPMM Bugs in Global Enterprise Network Attacks
  • Webinar: Learn How to Build a Reasonable and Legally Defensible Cybersecurity Program
  • Unpatched Versa Concerto Flaws Let Attackers Escape Docker and Compromise Host

Copyright © 2025 · AllTech.News, All Rights Reserved.