<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic APT29 targets COVID-19 vaccine development in Tech Talk</title>
    <link>https://community.isc2.org/t5/Tech-Talk/APT29-targets-COVID-19-vaccine-development/m-p/37350#M2854</link>
    <description>&lt;P&gt;&lt;A href="https://www.ncsc.gov.uk/files/Advisory-APT29-targets-COVID-19-vaccine-development.pdf" target="_blank" rel="noopener"&gt;This report&lt;/A&gt; details recent Tactics, Techniques and Procedures (TTPs) of the group commonly known as ‘APT29’, also known as ‘the Dukes’ or ‘Cozy Bear’.&lt;/P&gt;&lt;P&gt;This report provides indicators of compromise as well as detection and mitigation advice.&lt;/P&gt;&lt;P&gt;The United Kingdom’s National Cyber Security Centre (NCSC) and Canada’s Communications Security Establishment (CSE) assess that APT29 (also known as ‘the Dukes’ or ‘Cozy Bear’) is a cyber espionage group, almost certainly part of the Russian intelligence services. The United States’ National Security Agency (NSA) agrees with this attribution and the details provided in this report.&lt;/P&gt;&lt;P&gt;The United States’ Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency (DHS CISA) endorses the technical detail and mitigation advice provided in this advisory.&lt;/P&gt;&lt;P&gt;The group uses a variety of tools and techniques to predominantly target governmental, diplomatic, think-tank, healthcare and energy targets for intelligence gain.&lt;/P&gt;&lt;P&gt;Throughout 2020, APT29 has targeted various organisations involved in COVID-19 vaccine development in Canada, the United States and the United Kingdom, highly likely with the intention of stealing information and intellectual property relating to the development and testing of COVID-19 vaccines.&lt;/P&gt;&lt;P&gt;APT29 is using custom malware known as ‘WellMess’ and ‘WellMail’ to target a number of organisations globally. This includes those organisations involved with COVID-19 vaccine development. WellMess and WellMail have not previously been publicly associated to APT29.&lt;/P&gt;</description>
    <pubDate>Thu, 16 Jul 2020 13:22:22 GMT</pubDate>
    <dc:creator>leroux</dc:creator>
    <dc:date>2020-07-16T13:22:22Z</dc:date>
    <item>
      <title>APT29 targets COVID-19 vaccine development</title>
      <link>https://community.isc2.org/t5/Tech-Talk/APT29-targets-COVID-19-vaccine-development/m-p/37350#M2854</link>
      <description>&lt;P&gt;&lt;A href="https://www.ncsc.gov.uk/files/Advisory-APT29-targets-COVID-19-vaccine-development.pdf" target="_blank" rel="noopener"&gt;This report&lt;/A&gt; details recent Tactics, Techniques and Procedures (TTPs) of the group commonly known as ‘APT29’, also known as ‘the Dukes’ or ‘Cozy Bear’.&lt;/P&gt;&lt;P&gt;This report provides indicators of compromise as well as detection and mitigation advice.&lt;/P&gt;&lt;P&gt;The United Kingdom’s National Cyber Security Centre (NCSC) and Canada’s Communications Security Establishment (CSE) assess that APT29 (also known as ‘the Dukes’ or ‘Cozy Bear’) is a cyber espionage group, almost certainly part of the Russian intelligence services. The United States’ National Security Agency (NSA) agrees with this attribution and the details provided in this report.&lt;/P&gt;&lt;P&gt;The United States’ Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency (DHS CISA) endorses the technical detail and mitigation advice provided in this advisory.&lt;/P&gt;&lt;P&gt;The group uses a variety of tools and techniques to predominantly target governmental, diplomatic, think-tank, healthcare and energy targets for intelligence gain.&lt;/P&gt;&lt;P&gt;Throughout 2020, APT29 has targeted various organisations involved in COVID-19 vaccine development in Canada, the United States and the United Kingdom, highly likely with the intention of stealing information and intellectual property relating to the development and testing of COVID-19 vaccines.&lt;/P&gt;&lt;P&gt;APT29 is using custom malware known as ‘WellMess’ and ‘WellMail’ to target a number of organisations globally. This includes those organisations involved with COVID-19 vaccine development. WellMess and WellMail have not previously been publicly associated to APT29.&lt;/P&gt;</description>
      <pubDate>Thu, 16 Jul 2020 13:22:22 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/APT29-targets-COVID-19-vaccine-development/m-p/37350#M2854</guid>
      <dc:creator>leroux</dc:creator>
      <dc:date>2020-07-16T13:22:22Z</dc:date>
    </item>
  </channel>
</rss>

