APT29 Exploited a Windows Feature to Compromise European Diplomatic Entity Network
by - Thursday, January 1, 1970 at 12:00 AM
APT29 Exploited a Windows Feature to Compromise European Diplomatic Entity Network



The Russia-linked APT29 nation-state actor has been found leveraging a "lesser-known" Windows feature called Credential Roaming following a successful phishing attack against an unnamed European diplomatic entity.

"The diplomatic-centric targeting is consistent with Russian strategic priorities as well as historic APT29 targeting," Mandiant researcher Thibault Van Geluwe de Berlaere said in a technical write-up.

APT29, a Russian espionage group also called Cozy Bear, Iron Hemlock, and The Dukes, is known for its intrusions aimed at collecting intelligence that align with the country's strategic objectives. It's believed to be sponsored by the Foreign Intelligence Service (SVR).

Some of the adversarial collective's cyber activities are tracked publicly under the moniker Nobelium, a threat cluster responsible for the widespread supply chain compromise through SolarWinds software in December 2020.

The Google-owned threat intelligence and incident response firm said it identified the use of Credential Roaming during the time APT29 was present inside the victim network in early 2022, at which point "numerous LDAP queries with atypical properties" were performed against the Active Directory system.



Introduced in Windows Server 2003 Service Pack 1 (SP1), Credential Roaming is a mechanism that allows users to access their credentials (i.e., private keys and certificates) in a secure manner across different workstations in a Windows domain.

According to Microsoft, "Credential Roaming is storing user credentials in the ms-PKI-DPAPIMasterKeys and ms-PKI-AccountCredentials attributes in the user object," with the latter described as a multi-valued LDAP property containing binary large objects (BLOBs) of encrypted credential objects.

One of the LDAP attributes queried by APT29, per the Google subsidiary, concerned ms-PKI-Credential-Roaming-Tokens, which handles the "storage of encrypted user credential token BLOBs for roaming."

Investigating its inner workings further, Mandiant highlighted the discovery of an arbitrary file write vulnerability that could be weaponized by a threat actor to achieve remote code execution in the context of the logged-in victim.

The shortcoming, tracked as CVE-2022-30170 (CVSS score 7.3), was addressed by Microsoft as part of Patch Tuesday updates shipped on September 13, 2022, with the company emphasizing that exploitation requires a user to log in to Windows.

"An attacker who successfully exploited the vulnerability could gain remote interactive logon rights to a machine where the victim's account would not normally hold such privilege," it noted.

Mandiant said the research "offers insight into why APT29 is actively querying the related LDAP attributes in Active Directory," urging organizations to apply the September 2022 patches to secure against the flaw.
Reply
why are you spamming this shit. u nigger
Reply
(November 13, 2022, 10:17 AM)IntelBroker Wrote: why are you spamming this shit. u nigger


i report you also as an harrasment as well...:D
Reply
(November 13, 2022, 10:37 AM)Kitang Wrote:
(November 13, 2022, 10:17 AM)IntelBroker Wrote: why are you spamming this shit. u nigger


i report you also as an harrasment as well...:D

do it. ur copy and pasting and spamming useless threads that r days old.
Reply
(November 13, 2022, 10:38 AM)IntelBroker Wrote:
(November 13, 2022, 10:37 AM)Kitang Wrote:
(November 13, 2022, 10:17 AM)IntelBroker Wrote: why are you spamming this shit. u nigger


i report you also as an harrasment as well...:D

do it. ur copy and pasting and spamming useless threads that r days old.


? Not sure why you’d consider this as spamming, it’s written on the correct thread, they’re not spamming links or empty quoting like other blue users do. The information isn’t useless it’s literally just news lol

@kitang you should post the source or link to the article next time
Reply
(November 13, 2022, 10:55 AM)shook Wrote:
(November 13, 2022, 10:38 AM)IntelBroker Wrote:
(November 13, 2022, 10:37 AM)Kitang Wrote:
(November 13, 2022, 10:17 AM)IntelBroker Wrote: why are you spamming this shit. u nigger


i report you also as an harrasment as well...:D

do it. ur copy and pasting and spamming useless threads that r days old.


? Not sure why you’d consider this as spamming, it’s written on the correct thread, they’re not spamming links or empty quoting like other blue users do. The information isn’t useless it’s literally just news lol

@kitang you should post the source or link to the article next time

this dude it farming credits to leech. look at his posts outside of the news section
Reply
(November 13, 2022, 10:55 AM)shook Wrote:
(November 13, 2022, 10:38 AM)IntelBroker Wrote:
(November 13, 2022, 10:37 AM)Kitang Wrote:
(November 13, 2022, 10:17 AM)IntelBroker Wrote: why are you spamming this shit. u nigger


i report you also as an harrasment as well...:D

do it. ur copy and pasting and spamming useless threads that r days old.


? Not sure why you’d consider this as spamming, it’s written on the correct thread, they’re not spamming links or empty quoting like other blue users do. The information isn’t useless it’s literally just news lol

@kitang you should post the source or link to the article next time

@shook thank you for your kindness suggestion.
Reply
im dumb sorry bro
Reply
F eu govt and diplomats lets russian infect them all with cryptolockers
Reply
apt is broke
Reply


 Users viewing this thread: APT29 Exploited a Windows Feature to Compromise European Diplomatic Entity Network: No users currently viewing.