www.mandiant.com
Open in
urlscan Pro
2606:4700:300b::a29f:f07d
Public Scan
URL:
https://www.mandiant.com/resources/blog/apt29-evolving-diplomatic-phishing
Submission: On October 02 via api from IN — Scanned from DE
Submission: On October 02 via api from IN — Scanned from DE
Form analysis
2 forms found in the DOMGET /search
<form action="/search" method="get">
<div class="js-form-item form-item js-form-type-textfield form-item-search js-form-item-search"> <label class="visually-hidden" for="edit-search">Search</label> <input data-drupal-selector="edit-search" type="text" id="edit-search" name="search"
value="" size="30" maxlength="128" class="form-text" placeholder="Search"></div>
<div data-drupal-selector="edit-actions" class="form-actions js-form-wrapper form-wrapper" id="edit-actions"> <button data-drupal-selector="edit-submit-acquia-search" type="submit" id="edit-submit-acquia-search"
class="button js-form-submit form-submit"> <span class="visually-hidden">Submit search form</span> <svg width="16" height="17" viewBox="0 0 16 17" fill="none" xmlns="http://www.w3.org/2000/svg" aria-hidden="true">
<path d="M7.22574 13.9446C10.6622 13.9446 13.4481 11.1588 13.4481 7.72232C13.4481 4.28583 10.6622 1.5 7.22574 1.5C3.78925 1.5 1.00342 4.28583 1.00342 7.72232C1.00342 11.1588 3.78925 13.9446 7.22574 13.9446Z" stroke="currentColor"
stroke-width="2" stroke-linecap="round" stroke-linejoin="round"></path>
<path d="M15.0001 15.4996L11.6167 12.1162" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round"></path>
</svg> </button></div>
</form>
GET /search
<form action="/search" method="get">
<div class="js-form-item form-item js-form-type-textfield form-item-search js-form-item-search"> <label class="visually-hidden" for="edit-search">Search</label> <input data-drupal-selector="edit-search" type="text" id="edit-search" name="search"
value="" size="30" maxlength="128" class="form-text" placeholder="Search"></div>
<div data-drupal-selector="edit-actions" class="form-actions js-form-wrapper form-wrapper" id="edit-actions"> <button data-drupal-selector="edit-submit-acquia-search" type="submit" id="edit-submit-acquia-search"
class="button js-form-submit form-submit"> <span class="visually-hidden">Submit search form</span> <svg width="16" height="17" viewBox="0 0 16 17" fill="none" xmlns="http://www.w3.org/2000/svg" aria-hidden="true">
<path d="M7.22574 13.9446C10.6622 13.9446 13.4481 11.1588 13.4481 7.72232C13.4481 4.28583 10.6622 1.5 7.22574 1.5C3.78925 1.5 1.00342 4.28583 1.00342 7.72232C1.00342 11.1588 3.78925 13.9446 7.22574 13.9446Z" stroke="currentColor"
stroke-width="2" stroke-linecap="round" stroke-linejoin="round"></path>
<path d="M15.0001 15.4996L11.6167 12.1162" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round"></path>
</svg> </button></div>
</form>
Text Content
mandiant.com uses cookies to deliver and enhance the quality of its services and to analyze traffic. If you agree, cookies are also used to serve advertising and to personalize the content and advertisements that you see. Learn more. AgreeNo thanks Skip to main content Mandiant is now part of Google Cloud. Learn More. * Platform * Solutions * Intelligence * Services * Resources * Company MANDIANT ADVANTAGE Explore our multi-vendor XDR platform, delivering Mandiant products and integrating with a range of leading security operations technology. Explore the platformarrow_forward Start with free account * Attack Surface Management Free Subscription Map your external environment * Breach Analytics for Chronicle Know what we know when we know it * Security Validation Validate controls are working properly * Threat Intelligence Free Subscription Access latest intel from the frontlines * Digital Threat Monitoring Visibility into deep, dark, and open web * Managed Defense Managed detection and response MANDIANT SOLUTIONS Solve your toughest cyber security challenges with combinations of products and services. * Featured solutionsarrow_forward * By use casearrow_forward * By industryarrow_forward * Featured solutions * Proactive Exposure Management New! Reduce exposures before adversaries act * Government New! Protect national services and agencies * Digital Risk Protection Prioritize and focus on threats that matter * Ransomware Increase resilience against ransomware and multifaceted extortion * Know Who is Targeting You Prioritize threats that matter most * Know What Is Exposed Identify attack surface exposures * Know If You Are Prepared Test and measure your cyber defense program * Know If You Have Been Breached Detect and respond to breach activity quickly and effectively * Use Case * Ransomware Increase resilience against multifaceted extortion * Cyber Risk Management Advance your business approach to cyber security * Digital Risk Protection Prioritize and focus on threats that matter * Industrial Controls Strengthen OT and ICS security * Insider Threats Uncover and manage internal vulnerabilities * Skills Gap Close gaps with training and access to expertise * Private Industry * Finance New! Extend your security posture and operationalize resilience * Manufacturing New! Protect against cyber security threats to maintain business continuity * Government * Election Security Focus on Election Infrastructure Protection * Government New! Protect natural services and agencies MANDIANT SERVICES Mitigate threats, reduce risk, and get back to business with the help of leading experts. Learn morearrow_forward View all services (47)arrow_forward Schedule a consultation * Featured categories * Cyber Security Transformation Establish and activate cyber defenses * Incident Response Tackle breaches confidently * Strategic Readiness Increase resilience to risk * Technical Assurance Test your security program * Expertise On Demand Access to Mandiant Experts * Training * Browse courses Browse on-demand and live training * Mandiant Academy Train your teams to protect effectively CYBER THREAT INTELLIGENCE Mandiant specializes in cyber threat intelligence, offering products, services, and more to support our mission to defend against cyber crime. Intelligence resourcesarrow_forward * Products * Threat Intelligence Free Subscription Access latest intel from the frontlines * Digital Threat Monitoring visibility into deep, dark, and open web * Services * Intelligence capability development build a comprehensive threat intelligence program * Intelligence Training Develop practical application skills * Executive Briefings Get live, interactive briefings from the frontlines * Advanced Intelligence Access Hire a dedicated analyst for your needs RESOURCE CENTER Get the latest insights from cyber security experts at the frontlines of threat intelligence and incident response M-Trends 2023 reportarrow_forward mWISEarrow_forward View all resourcesarrow_forward * Resource types * Mandiant Blog Expert perspectives and industry news * Podcasts Interviews, hot topics, and more * Customer Stories Case studies and customer testimonials * Reports Research from the frontlines * Webinars Livestreams and pre-recorded speaker events * Insights Cyber security concepts, methods, and more * Events Upcoming conferences and collaboration * Infographics Visualization of security research and process * Datasheets Information on Mandiant offerings and more * eBooks High-impact cyber security guides * White Papers Cyber security insights and technical expertise COMPANY Learn more about us and our mission to help organizations defend against cyber crime. Learn morearrow_forward Contact us * Careers Life at Mandiant and open roles * Noteholder and Preferred Shareholder Documents * Media Center Press releases and news mentions * Partners Ecosystem and resources * Elevate Empowering women in cyber security * Mandiant Gives Back Our commitment to a better future * Create a free account * Sign in to Advantage en expand_more * English * Français * Deutsch * Italiano * 日本 * 한국어 * Español Start for Free Search Submit search form Search Submit search form * Platform * Mandiant Advantage Overview * Breach Analytics for Chronicle * Security Validation * Attack Surface Management * Threat Intelligence * Digital Threat Monitoring * Managed Defense * Solutions * Proactive Exposure Management * Government * Ransomware * Know Who is Targeting You * Know What Is Exposed * Know If You Are Prepared * Know If You Have Been Breached * Cyber Risk Management * Digital Risk Protection * OT/ICS Security * Insider Threats * Cyber Security Skills Gap * Finance * Manufacturing * Election Security * Intelligence * Intelligence resources * Threat Intelligence * Digital Threat Monitoring * Intelligence Capability Development * Intelligence Training * Executive Briefings * Advanced Intelligence Access * Services * Services Overview * Incident Response * Strategic Readiness * Cyber Security Transformation * Technical Assurance * View all Services (48) * Mandiant Academy * Find a Course * Expertise On Demand * Resources * Resources * Mandiant Blogs * Customer Stories * Webinars * Events * Podcasts * Reports * Insights * Datasheets * Infographics * White Papers * eBooks * Company * About Mandiant * Careers * Media Center * Partners * Elevate * Mandiant Gives Back * Noteholder and Preferred Shareholder Documents * Mobile Footer Section * See what’s new at Mandiant * Get started * Incident Response Help * Contact Sales * Support * Sign In * Create a Free Mandiant Advantage Account TOP * Incident Response * Contact sales * Support * Advantage Free Trial * Blog * Support * Contact us * report_problemIncident Response Assistance BREADCRUMB 1. Home 2. Backchannel Diplomacy: APT29’s Rapidly Evolving Diplomatic Phishing Operations Blog BACKCHANNEL DIPLOMACY: APT29’S RAPIDLY EVOLVING DIPLOMATIC PHISHING OPERATIONS Luke Jenkins, Josh Atkins, Dan Black Sep 21, 2023 21 min read | Last updated: Sep 22, 2023 Threat Intelligence phishing Advanced Persistent Threats (APTs) KEY INSIGHTS * APT29’s pace of operations and emphasis on Ukraine increased in the first half of 2023 as Kyiv launched its counteroffensive, pointing to the SVR’s central role in collecting intelligence concerning the current pivotal phase of the war. * During this period, Mandiant has tracked substantial changes in APT29’s tooling and tradecraft, likely designed to support the increased frequency and scope of operations and hinder forensic analysis. * APT29 has used various infection chains simultaneously across different operations, indicating that distinct initial access operators or subteams are possibly operating in parallel to service different regional targets or espionage objectives. THREAT DETAIL During the lead up to Ukraine's counteroffensive, Mandiant and Google’s Threat Analysis Group (TAG) have tracked an increase in the frequency and scope of APT29 phishing operations. Investigations into the group’s recent activity have identified an intensification of operations centered on foreign embassies in Ukraine. Notably, as part of this activity, we have seen phishing emails targeting a wide range of diplomatic representations in Kyiv including those of Moscow’s partners, representing the first time we have observed this cluster of APT29 activity pursuing governments strategically aligned with Russia. Based on the timing and focus of APT29’s Ukraine-focused operations, we judge they are intended to aid Russia’s Foreign Intelligence Service (SVR) in intelligence collection concerning the current pivotal phase of the war. APT29’s increased phishing activity in Ukraine has occurred alongside an uptick in the group’s more routine espionage operations against global diplomatic entities. Across these malware delivery operations, APT29 continues to prioritise European Ministries of Foreign Affairs and embassies, but it has also sustained operations that are global in scope and illustrative of Russia’s far-reaching ambitions and interests in other regions. The current secondary focus is concentrated in Asia, with governments in Türkiye (formerly known as Turkey), India, and other regions of vital strategic importance to Moscow such as Africa factoring into its 2023 priorities. We judge that Russia’s war in Ukraine has almost certainly shaped APT29’s espionage priorities, but it has not supplanted them. We track this diplomatic-focused phishing activity as operationally distinct from APT29’s ongoing initial access operations targeting cloud-based Microsoft products. Although APT29’s cloud-focused exploitation may lead to the compromise of diplomatic entities, variance in the scale, quality and targeting patterns of the two lines of effort indicate that they are highly likely distinct initial access clusters operating with different priorities and levels of capability. However, we continue to see significant overlap in post-compromise methods across both lines of effort, indicating that multiple initial access teams may hand-off to a centralized exploitation team once inside a victim environment. Figure 1: APT29’s distinct initial access clusters Alongside the increased pace of operations and changes in targeting, we have also seen a major shift in the group’s tooling and tradecraft. APT29 has rebuilt several of its tools and has made repeated iterative modifications to its existing malware delivery chain, likely to ensure its operational longevity despite long-term persistent use. We assess that several of these changes are highly likely specifically designed to sidestep research methods and tools commonly used by the threat intelligence community to track their operations, indicating that operational security priorities continue to factor heavily into APT29’s tooling decisions. APT29’S EVOLVING APPROACH TO MALWARE DELIVERY Starting in 2021, APT29 adopted a tactic called HTML smuggling in its malware delivery operations, hiding its first-stage JavaScript dropper in malicious HTML attachments we call ROOTSAW (also known as EnvyScout). As detailed in previous research by Mandiant, CERT-Polska, Palo Alto Networks and others, ROOTSAW has been a constant feature of APT29's operations over the past two years and has been the primary vehicle to decode and deliver the group’s next stage malware. Upon opening the archive file, victims are presented with either a Windows shortcut (LNK) file or a legitimate software binary, that when opened, executes an accompanying DLL, leading to commodity backdoors such as BEACON or BRC4 (Brute Ratel C4) executing on the system. ROOTSAW’s central and continued role in APT29 operations has spurred changes to the malware delivery chain over time. The most visible change has been the move away from HTML attachments as the initial infection vector, with APT29 shifting to hosting its first-stage payloads on compromised web services such as WordPress sites. Migrating the first-stage payload server side has likely provided APT29 a greater degree of control over its malware delivery chain and allowed the group to be more judicious about the exposure of its later-stage capabilities. For example, to prevent detection of malware in environments not intended for compromise, APT29 has implemented various forms of filtering in its first-stage payloads and has removed staged malware from compromised servers shortly after operational use. Notably, these efforts have also prevented payloads being acquired by public malware repositories and other common security research tools, helping to avoid detection and extend the operational lifespan of its newer malware variants. Figure 2: APT29’s diverse first-stage delivery methods As shown the following campaigns tracked throughout the first half of 2023 detail, APT29 has made continuous, iterative efforts to introduce additional obfuscation and anti-analysis components into its operations. The group has experimented with various obfuscation techniques such as the use of JavaScript Obfuscator, delivery and execution guardrails, hosting decryption keys server side, and delivering decoy documents when victim profiling checks fail. In this accelerated period of tooling evolution, the group has also begun to rotate in novel malware delivery tools and techniques instead of its mainstay first-stage payload. MARCH 2023: EARTHQUAKE-THEMED TÜRKIYE CAMPAIGN In March 2023, Mandiant identified a new APT29 phishing campaign targeting Türkiye. The phishing waves impersonated the Turkish Deputy Minister of Foreign Affairs and included a phishing link accompanied by content related to the February 2023 earthquake that struck southern Türkiye. * The first wave, conducted in early March, used a phishing link generated by a URL shortening service “https://tinyurl[.]com/mrxcjsbs” to redirect victims to a ROOTSAW dropper hosted on an actor-controlled compromised website “https://www.willyminiatures[.]com/e-yazi.htm/?v=bc78a8d162c6”. * When visited, the URL downloaded the ROOTSAW dropper "e-yazi.htm" (MD5: a3067a0262e651e94329869f43a51722) to drop additional files onto the victim machine, including a malicious ISO, "e-yazi.iso" (MD5: eeded26943a7b2fdef7608fb21bbfd66). * This is the first time Mandiant has seen APT29 introduce an additional layer of obfuscation to its phishing links using a URL shortening service. * The second wave, victims were directed to an actor-controlled compromised website “https://simplesalsamix[.]com/e-yazi.html” to download the ROOTSAW dropper "e-yazi.html" (MD5: b051e8efb40c2c435d77f3be77c59488). * The second ROOTSAW sample dropped similar decoy content and a malicious ZIP file, e-yazi.zip (MD5: 854e5c592e93b69b8ab08dbc8a0b673f), that contained second-stage downloaders and an additional ROOTSAW dropper file. In both waves, APT29 incorporated a new version of ROOTSAW with added user-agent based anti-analysis guardrails. This variant checks the user-agent of the device, looking for Windows operating systems that do not contain “.NET” and contain the value “Windows NT”. As a result, if the victim is running a non-Windows based operating system or the request is made through .NET, the server will deliver a decoy PDF file. In the second wave, this PDF file was identical to the version contained in the malicious ZIP payload. This filtering tactic is likely used to identify automated downloaders and non-compatible victim devices, further reducing the odds of exposing malware in non-compromise contexts. Each payload within the new ROOTSAW variant is obfuscated using a unique key, although the deobfuscation routine remains the same. Figure 3: ROOTSAW user-agent and operating system check to determine which file to deploy MARCH 2023: EUROPEAN DIPLOMATIC-FOCUSED PHISHING CAMPAIGNS In an additional phishing campaign in March 2023, APT29 targeted various diplomatic missions in Europe. Notably, in the two weeks that lapsed between the Turkey campaign, further changes were identified resulting in two new variants of ROOTSAW that shifted the newly added anti-analysis guardrails server side. * In the first wave, emails contained a PDF attachment (MD5: 1485b591e654327c1d032a901940b149) inviting victims to a drink reception following an event on the “Future of International Economic Relations” from the Embassy of Spain. The PDF contains a link to an actor-hosted ROOTSAW variant hosted at “https://parquesanrafael[.]cl/note.html”, ultimately leading to the deployment of MUSKYBEAT (also known publicly as QUARTERRIG). * This version of ROOTSAW sends the victim’s user-agent to the compromised server using an HTTP GET request “https://parquesanrafael[.]cl/note.php?ua=<value>”. The server then performs filtering based on an actor-defined denylist, finally returning a decryption key for the payload if the tests are successfully passed. * If these tests fail, ROOTSAW drops a corrupt file, rather than exposing the embedded decoy file like in previous versions. * In the second wave, APT29 delivered an additional new variant of ROOTSAW (MD5: 0d5b12c50173a176b0a8ba5a97a831d8), containing both user-agent and IP filtering, but ultimately leading to the same MUSKYBEAT downloader. * This version conducts an additional check by obtaining the victim’s IP address through a request to a public API service “https://api.ipify[.]org/?format=json”. Figure 4: ROOTSAW payload decryption routine APRIL 2023: OLD WINE IN A NEW BOTTLE In April 2023, APT29 continued to modify its standard malware delivery chain, introducing a new technique for malware delivery. In this operation, APT29 re-used one its frequent diplomatic event-themed lure documents spoofing the Czechia Embassy (more commonly known as the Czech Republic) that invited targets to a wine tasting event on April 13, 2023. The document contained a link to the phishing website “https://sylvio[.]com[.]br/form.php”, which delivered either an ISO or a ZIP archive to the victim. * Rather than using ROOTSAW, victims were delivered a malicious ISO or ZIP file directly from the compromised web server if they successfully passed the server-side filtering checks. * The decision to remove the HTML smuggling stage of the infection chain was likely intended to further reduce the number of forensic artifacts left on the host that are prone to detection or later analysis. MAY 2023: UKRAINE FOREIGN EMBASSY-FOCUSED CAMPAIGNS In May, in the lead up to Ukraine’s counteroffensive, APT29 conducted two distinct phishing waves targeting a wide range of diplomatic representations in Kyiv, including those of Moscow’s partners. Each campaign adopted separate intrusion chains similar to those seen in March and April 2023. * In the first wave in early May, an repurposed advert for a BMW sale in Kyiv was circulated, directing victims to an actor-controlled server at “https://resetlocations[.]com/bmw.htm”, which delivered a weaponized ISO file, "bmw.iso" (MD5: e306333093eaf198f4d416d25a40784a). * The version of ROOTSAW used in this campaign shares similarities to variants used in March against Türkiye. Depending on user-agent filtering, the ISO or a decoy image of the BMW would be displayed. * In the second wave mid-May, an invite for a charity concert in Kyiv with a mistyped filename “Invintation.zip” (MD5: 38719acc6254b7ff70dc8a7723bd8e92) was sent to targets, likely also using a copy of a legitimate document. * Similar to the April wine-themed campaign, payloads were hosted directly on actor-controlled infrastructure that used user-agent filtering to deliver either a ZIP file with decoy PDF documents (MD5:38719acc6254b7ff70dc8a7723bd8e92), or a ZIP file containing a second-stage payloads (MD5:1aee5bf23edb7732fd0e6b2c61a959ce) to victims. Figure 5: Likely repurposed legitimate invite to a charity concert in Ukraine JUNE 2023: SPLIT ROOTSAW CAMPAIGN In late June, Mandiant identified an additional APT29 phishing campaign with a new variant of ROOTSAW to target a European government. Phishing emails were sent from a compromised North American government email address and crafted to appear as an invitation to a public holiday celebration from Norwegian embassy personnel. Two different delivery mechanisms were used in this campaign, a PDF (MD5: b4141aa8d234137f0b9549a448158a95) containing a link to an actor-hosted ROOTSAW variant, and emails with an attached Scalable Vector Graphic (SVG) file (MD5: 295527e2e38da97167979ade004de880) rather than the typical HTML payload. * Notably, although APT29 used a compromised WordPress server to host the ROOTSAW payload, non-valid targets received a generic HTTP 404 error rather than the traditional WordPress 404. * Mandiant has identified that once APT29 removes the server side functionality, the compromised WordPress site will start displaying the correct WordPress 404 error indicating that the file was not found. We therefore suspect that organisations compromised by APT29 to deliver malware will likely not find logs for this activity within WordPress, although they may exist within other services such as the underlying web server. * The ROOTSAW variant contained in the SVG file is similar to those first identified in 2021, indicating that the threat actor may have only recently adopted SVG files for its HTML smuggling technique. Consistent with other cases where APT29 has introduced new delivery methods for ROOTSAW, the group reverted to a primitive ROOTSAW payload without anti-analysis techniques or other forms of hardening. Figure 6: Traditional 404 error from compromised APT29 infrastructureFigure 7: 404 error from IP filtered by APT29 JULY 2023: ICEBEAT CAMPAIGN In July, APT29 continued to experiment with new ROOTSAW delivery mechanisms and victim filtering capabilities in an operation deploying a new downloader ICEBEAT to target European diplomatic entities. Emails were sent purporting to be an invite from a non-specified German embassy for an Ambassador’s farewell reception. Of note, ICEBEAT’s use of the open source Zulip messaging platform for command and control (C2) follows a pattern of past APT29 downloaders using legitimate services for command and control including Dropbox, Firebase, OneDrive and Trello. * For the first time in this campaign, ROOTSAW was contained within a PDF document. When opened, the PDF document writes an HTML file to disk, that when launched, writes a follow-on ZIP file to disk and beacons to an actor controlled domain “https://sgrfh[.]org.pk/wp-content/idx.php?n=ks&q=<execution_path>” to profile victim information. * Victims who met filtering requirements were delivered a Save the date decoy PDF document (MD5: 50f57a4a4bf2c4b504954a36d48c99e7) and delivered the next-stage downloader ICEBEAT that is responsible for downloading follow-on capabilities from the Zulip messaging service. * In instances where the victim did not meet filtering requirements, a separate benign decoy document referencing German Unity Day (MD5: ffce57940b0257a72db4969565cbcebc) was delivered in place of ICEBEAT. Figure 8: Decoy lure used by APT29 for filtered victimsFigure 9: PDF decoy document used during successful malware delivery MALWARE CHOICES POSSIBLY REFLECT DISTINCT APT29 SUBTEAMS Beyond the continued adaptation of APT29’s malware delivery chain, Mandiant has also observed dedicated efforts to update and evolve the group’s later-stage malware into multiple variations, increasing the quantity and quality of tooling used across its campaigns. At least six distinct downloaders have been identified during the first half of 2023: * BURNTBATTER is an in-memory loader responsible for decrypting and executing a payload from disk into a running process. BURNTBATTER has been witnessed loading the SPICYBEAT downloader via a position-independent shellcode dropper called DONUT. * DONUT is a publicly available tool that creates position-independent shellcode that loads .NET assemblies, PE files, and other Windows payloads from memory and runs them with parameters. * SPICYBEAT is a downloader written in C++ responsible for downloading a next-stage payload from either DropBox or Microsoft's OneDrive. * MUSKYBEAT is an in-memory dropper that decodes the next-stage payload and strings using RC4 and executes in the current process. * STATICNOISE is a downloader written in C responsible for downloading and executing the final-stage payload in memory. DAVESHELL is shellcode that functions as an in-memory dropper relying on reflective injection. Its embedded payload is mapped into memory and executed. DAVESHELL is based in the public available repository. Figure 10: APT29’s Second-Stage Downloaders Used in 2023 As noted in the June 2023 campaign, we have also witnessed APT29 operating various infection chains simultaneously within a single campaign, suggesting that distinct initial access operators or subteams may be operating in parallel to service different regional targets or espionage objectives. Although we have been unable to ascertain the specific logic behind decisions about which malware delivery approach to use or when to introduce new later-stage malware variants, we judge with low confidence that they are likely driven by mission-specific parameters such as targets or operational objectives. * The first use of new capabilities are typically reserved for targets inside Ukraine or diplomatic entities associated with North Atlantic Treaty Organization (NATO) or European Union (EU) member states, areas of likely heightened strategic importance given Moscow’s need to understand political and military dynamics surrounding its war in Ukraine. * Upon first use of new tactics or tools in higher risk environments, we have observed APT29 incorporate these new tools into its broader operations with minimal changes, pointing to the group’s possible changing risk calculus after first exposure. * Patterns of controlled first-use possibly extend back to the emergence of APT29’s diplomatic-focused phishing cluster in 2021. In May 2021, during Russia’s initial troop-build up around Ukraine, Mandiant identified an APT29 operation using ICEBREAKER, a modified variant of BOOMMIC (also known as VaporRage) embedded in software mimicking an installer for a legitimate Ukrainian government application. As detailed by SentinelOne, multiple aspects of the malware delivery chain were likely tailored for a highly-targeted operation against Ukrainian government entities. CONCLUSIONS The increased scope and frequency of APT29's diplomatic-focused spear phishing campaigns in the first half of 2023 has compelled the initial access team to make repeated modifications to its long-standing malware delivery chain. Efforts to move capabilities server side, introduce anti-analysis components, and deliver decoy documents in non-compromise contexts have likely helped the group extend the shelf-life of its ROOTSAW-centred concept of operations. Even with this unprecedented pace of change, the group has remained highly operational security conscious, and has taken repeated steps to circumvent the methods that security researchers use to track and respond to its activity. APT29's increased operational tempo has also exposed patterns of operations that likely reflect different initial access operators or subteams supported by a centralized development team. More generally, these patterns likely reflect a growing mission and pool of resources dedicated to collecting political intelligence and that group will almost certainly continue to pose a high severity threat to governments and diplomatic entities globally. PROTECTING THE COMMUNITY As part of our efforts to combat serious threat actors, TAG uses the results of our research to improve the safety and security of Google’s products. Upon discovery, all identified websites and domains are added to Safe Browsing to protect users from further exploitation. TAG also sends all targeted Gmail and Workspace users government-backed attacker alerts notifying them of the activity and encourages potential targets to enable Enhanced Safe Browsing for Chrome and ensure that all devices are updated. Where possible, Mandiant sends victim notifications via the Victim Notification Program. We are committed to sharing our findings with the security community to raise awareness, and with companies and individuals that might have been targeted by these activities. We hope that improved understanding of tactics and techniques will enhance threat hunting capabilities and lead to stronger user protections across the industry. APPENDIX ATT&CK MATRIX ATT&CK Tactic Category Techniques Resource Development * Acquire Infrastructure (T1583) * Virtual Private Server (T1583.003) * Compromise Infrastructure (T1584) * Stage Capabilities (T1608) * Link Target (T1608.005) * Obtain Capabilities (T1588) * Digital Certificates (T1588.004) Initial Access * Phishing (T1566) * Spearphishing Attachment (T1566.001) * Spearphishing Link (T1566.002) * External Remote Services (T1133) Execution * User Execution (T1204) * Malicious Link (T1204.001) * Malicious File (T1204.002) * Command and Scripting Interpreter (T1059) * PowerShell (T1059.001) * Windows Command Shell (T1059.003) * JavaScript (T1059.007) * Scheduled Task/Job (T1053) * Scheduled task (T1053.005) Persistence * Scheduled Task/Job (T1053) * Scheduled task (T1053.005) Privilege Escalation * Process Injection (T1055) * Scheduled Task (T1053) * Scheduled task (T1053.005) Defence Evasion * Process Injection (T1055) * Obfuscated Files or information (T1027) * Indicator Removal from Tools (T1027.005) * HTML Smuggling (T1027.006) * Embedded Payloads (T1027.009) * Virtualization/Sandbox Evasion (T1497) * System Checks (T1497.004) * Modify Registry (T1112) * Deobfuscate/Decode Files or Information (T1140) * Reflective Code Loading (T1620) * Indicator Removal (T1070) * File deletion (T1070.004) * Timestomp (T1070.006) * Masquerading (T1036) Discovery * Process Discovery (T1057) * Software Discovery (T1518) * Query Registry (T1012) * Account Discovery (T1087) * Local Account (T1087.001) * Domain Account (T1087.002) * System Information Discovery (T1082) * File and Directory Discovery (T1083) Command and Control * Web Service (T1102) * Application Layer Protocol (T1071) * Web Protocols (T1071.001) * DNS (T1071.004) * Encrypted Channel (T1573) * Asymmetric Cryptography (T1573.002) * Non-Application layer Protocol (T1095) * Non-Standard Port (T1571) * Ingress Tool Transfer (T1105) Exfiltration * Data Transfer Size Limits (T1030) DETECTION RULES rule M_Dropper_BURNTBATTER_1 { meta: author = "Mandiant" date_created = "2023/04/26" description = "Searches for the custom chaskey implementation" version = "1" weight = "100" disclaimer = "This rule is meant for hunting and is not tested to run in a production environment." strings: $chaskey_imp = {41 81 C8 20 20 20 20 41 81 F8 6B 65 72 6E} condition: any of them } rule M_Dropper_Donut_1 { meta: author = "Mandiant" date_created = "2023-04-12" description = "Detects the structure of the Donut loader" version = "1" weight = "100" condition: uint8(0) == 0xE8 and uint32(1) == uint32(5) and uint8(uint32(1)+5) == 0x59 } rule M_Downloader_STATICNOISE_1 { meta: author = "Mandiant" date_created = "2023-04-14" description = "Detects the deobfuscation algorithm and rc4 from STATICNOISE" version = "1" weight = "100" strings: $ = {41 8A C8 48 B8 [8] 80 E1 07 C0 E1 03 48 D3 E8 41 30 04 10 49 FF C0} $ = {80 E1 07 C0 E1 03 48 b8 [8] 48 D3 E8 30 04 17 48 FF C7 48 83 FF} $ = {40 88 2C 3A 49 8B 02 88 0C 06 45 89 0B 44 89 03 4D 8B 0A} $ = {4D 8B 0A 46 0F BE 04 0A 44 03 C1 41 81 E0 FF 00 00 80} condition: all of them } rule M_Dropper_MUSKYBEAT_1 { meta: author = "Mandiant" date_created = "2023-04-06" description = "Detects the RC4 encryption algorithm used in MUSKYBEAT" version = "1" weight = "100" disclaimer = "This rule is meant for hunting and is not tested to run in a production environment." strings: $ = {42 8A 14 04 48 8D ?? ?? ?? ?? ?? 8A C2 41 02 04 08 44 02 D0 41 0F B6 CA} $ = {41 B9 04 00 00 00 41 B8 00 30 00 00 48 8B D3 33 C9} condition: all of them } rule M_Hunting_DaveShell_Dropper_1_2 { meta: author = "Mandiant" description = "Detects Shellcode RDI projects from https://github.com/monoxgas/sRDI/blob/master/ShellcodeRDI" disclaimer = "This rule is meant for hunting and is not tested to run in a production environment." strings: $ep = {E8 00 00 00 00 59 49 89 C8 BA [4] 49 81 c0 [4] 41 b9 [4] 56 48 89 e6 48 83 ?? f0 48 83 ec 30 48 89 4c 24 ?? 48 81 c1 [4] c7 44 24 ?? [4] e8} condition: $ep at 0 } MANDIANT SECURITY VALIDATION ACTIONS Mandiant Advantage Security Validation can automate the following process to give you real data on how your security controls are performing against these threats. The following table is a subset of MSV actions for one of the malware variants. Find out more about Mandiant Security Validation. VID Name S100-192 Malicious Activity Scenario - APT29 Continues to Leverage Meeting Agenda Themes, ROOTSAW, SALTSHAKER to Target European Diplomatic Entities S100-199 Malicious Activity Scenario - APT29 Uses BEATDROP and BOOMMIC to Deploy BEACON S100-262 Malicious Activity Scenario - APT29 Targets with ROOTSAW, FANCYBEAT Downloaders, Variant #1 A106-551 Phishing Email - Malicious Link, APT29, MUSKYBEAT, Variant #1 A106-542 Command and Control - APT29, MUSKYBEAT , DNS Query A106-544 Malicious File Transfer - APT29, MUSKYBEAT Dropper, Download, Variant #1 A106-545 Malicious File Transfer - APT29, MUSKYBEAT, Download, Variant #1 INDICATORS OF COMPROMISE MARCH 2023: EARTHQUAKE-THEMED TÜRKIYE CAMPAIGN * e-yazi.htm (MD5: a3067a0262e651e94329869f43a51722) * ROOTSAW dropper * Redirected from https://tinyurl[.]com/mrxcjsbs * Downloaded from https://www.willyminiatures[.]com/e-yazi.htm/?v=bc78a8d162c6 * Drops eeded26943a7b2fdef7608fb21bbfd66 * Drops 4a13138e1f38b2817a63417d67038429 * e-yazi.pdf (MD5: 4a13138e1f38b2817a63417d67038429) * Decoy PDF * e-yazi.iso (MD5: eeded26943a7b2fdef7608fb21bbfd66) * ISO file containing next stages * Drops 4b0921979d3054d9f0dad48e9560b9ca (BURNTBATTER) * Drops 84b078d4a9e6e2a03e8ae1eca072dc83 (DONUT) * e-yazi.html (MD5: b051e8efb40c2c435d77f3be77c59488) * ROOTSAW dropper * Downloaded from https://simplesalsamix[.]com/e-yazi.html * Drops 854e5c592e93b69b8ab08dbc8a0b673f * Drops f4ef5672af889429d95f111ea65ff490 * e-yazi.pdf (MD5: f4ef5672af889429d95f111ea65ff490) * Decoy PDF * Dropped by 854e5c592e93b69b8ab08dbc8a0b673f * Dropped by b051e8efb40c2c435d77f3be77c59488 (ROOTSAW) * e-yazi.zip (MD5: 854e5c592e93b69b8ab08dbc8a0b673f) * Zip file containing next stages * Dropped by b051e8efb40c2c435d77f3be77c59488 (ROOTSAW) * Drops 129da1e7c8613fd8c2843d9ec191e30e (BURNTBATTER) * Drops aec65c1e6a6f9b3782174c192780f5b4 (DONUT) MARCH 2023: EUROPEAN DIPLOMATIC-FOCUSED PHISHING CAMPAIGNS * Note.pdf (MD5: 1485b591e654327c1d032a901940b149) * Lure PDF * Contains link to https://parquesanrafael[.]cl/note.html * note.html (MD5: 0d5b12c50173a176b0a8ba5a97a831d8) * ROOTSAW dropper * Downloaded from https://inovaoftalmologia[.]com[.]br/note.php?ip=<IP>&ua=<UA> * Drops 22adbffd1dbf3e13d036f936049a2e98 * note.html (MD5: 9e42b22d66f0fe0fae24af219773ac87) * ROOTSAW dropper * Downloaded from https://parquesanrafael[.]cl/note.html * Drops 22adbffd1dbf3e13d036f936049a2e98 * Note.iso (MD5: 22adbffd1dbf3e13d036f936049a2e98) * Malicious ISO * Dropped by 0d5b12c50173a176b0a8ba5a97a831d8 (ROOTSAW) * Dropped by 9e42b22d66f0fe0fae24af219773ac87 (ROOTSAW) * Drops db2d9d2704d320ecbd606a8720c22559 (MUSKYBEAT encrypted payload) * Drops 166f7269c2a69d8d1294a753f9e53214 (MUSKYBEAT) APRIL 2023: OLD WINE IN A NEW BOTTLE * wine event.pdf (MD5: 62b2031f8988105efdf473bdfedd07f5) * Malicious lure PDF file * Downloads from https://sylvio[.]com[.]br/form.php * note.zip (MD5: efe86302838ad2ab091540f4e0f7b75a) * Zip file containing next stages * NOTE____.EXE (MD5: b1820abc3a1ce2d32af04c18f9d2bfc3) * Legitimate Windows Word software used for side loading * Original name: winword.exe * Compiled on: 2022/12/22 19:27:25 * note/appvisvsubsystems64.dll (MD5: 9159d3c58c5d970ed25c2db9c9487d7a) * MUSKYBEAT dropper * Original name: hijacker.dll * Compiled on: 2023/04/06 08:49:45 * Dropped by efe86302838ad2ab091540f4e0f7b75a * Drops bc4b0bd5da76b683cc28849b1eed504d (MUSKYBEAT) * note/bdcmetadataresource.xsd (MD5: bc4b0bd5da76b683cc28849b1eed504d) * Encrypted next stage * Dropped by efe86302838ad2ab091540f4e0f7b75a * Dropped by 9159d3c58c5d970ed25c2db9c9487d7a (MUSKYBEAT) * Drops 0065cffe5a1c6a33900b781835aa9693 (DAVESHELL) * Unknown (MD5: 0065cffe5a1c6a33900b781835aa9693) * DAVESHELL dropper * Dropped by bc4b0bd5da76b683cc28849b1eed504d (MUSKYBEAT) * Drops 16d489cc5a91e7dbe74d1c9399534eac (MUSKYBEAT) * runner.dll (MD5: 16d489cc5a91e7dbe74d1c9399534eac) * MUSKYBEAT dropper * Original name: runner.dll * Compiled on: 2023/04/06 08:50:03 * Dropped by 0065cffe5a1c6a33900b781835aa9693 (DAVESHELL) * Drops c60aa80e0e58c2758f0bac037ec16dca (DONUT) * Unknown (MD5: c60aa80e0e58c2758f0bac037ec16dca) * DONUT in-memory dropper * Dropped by 16d489cc5a91e7dbe74d1c9399534eac (MUSKYBEAT) * Loads 1f21f9948b412f0198f928ed3266786b (STATICNOISE) * Unknown (MD5: 1f21f9948b412f0198f928ed3266786b) * STATICNOISE downloader * Compiled on: 2023/04/04 12:04:49 * Dropped by c60aa80e0e58c2758f0bac037ec16dca * Communicates with https://sharpledge[.]com/login.php MAY 2023: UKRAINE FOREIGN EMBASSY-FOCUSED CAMPAIGNS * BMW 5 for sale in Kyiv - 2023.docx (MD5: 556857ccb27b527e05415eb6d443aee1) * Hyperlink: https://t[.]ly/1IFg * Redirects to: https://resetlocations[.]com/bmw.htm * Unknown Document * Hyperlink: https://tinyurl[.]com/ysvxa66c * Redirects to https://resetlocations[.]com/bmw.htm * bmw.htm (MD5: 880120da2f075155524430ceab7c058e) * ROOTSAW dropper * Drops e306333093eaf198f4d416d25a40784a * bmw.iso (MD5: e306333093eaf198f4d416d25a40784a) * Malicious ISO containing next stage payloads * Dropped by 880120da2f075155524430ceab7c058e (ROOTSAW) * Drops 0032b8eabdc41e01923fabca5fe8a06b (DONUT) * bmw1.png (MD5: 4355851b6fcf2d44e3fd47f47a5e9502) * Decoy image * bmw1.png (MD5: 4355851b6fcf2d44e3fd47f47a5e9502) * Decoy image * bmw2.png (MD5: 5ff4831ee70c07e33c1bbe091840d5ee) * Decoy image * bmw3.png (MD5: 1ec49b2cb9d4ba265678359e117809b8) * Decoy image * bmw4.png (MD5: f089fd7204552aec41f64b1eb6b03eda) * Decoy image * bmw5.png (MD5: 0b0707ce90548f0c8b952138fff62742) * Decoy image * bmw6.png (MD5: 33312f16fd5b88470a0e7560954ae459) * Decoy image * bmw7.png (MD5: b382d0f8b130cd1804782d400a4d4f55) * Decoy image * bmw8.png (MD5: fc47284181f2bb6785e91c9b92710d78) * Decoy image * bmw9.png (MD5: b12a4b8ec485ad9f9c4cae1e25a35db8) * Decoy image * bmw1.png.lnk (MD5: 4c00d883444c78f19c3a1af191614491) * Malicious LNK used to trigger next stage and load image * bmw2.png.lnk (MD5: 68cc826c2c58cb74abe3e5ef2123102c) * Malicious LNK used to trigger next stage and load image * bmw3.png.lnk (MD5: 9685dae9ed8d2bf13b66593c1d7cd2eb) * Malicious LNK used to trigger next stage and load image * bmw4.png.lnk (MD5: dd2e5debb0ae8b8bccac5c1fbef6bb5a) * Malicious LNK used to trigger next stage and load image * bmw5.png.lnk (MD5: 5bcf04c0fb0f62fc5f4b83789477a699) * Malicious LNK used to trigger next stage and load image * bmw6.png.lnk (MD5: 3f57258dce31ba0c80002130b8657b2b) * Malicious LNK used to trigger next stage and load image * bmw7.png.lnk (MD5: eccf100bc3d6e901f17a0eced5752ca7) * Malicious LNK used to trigger next stage and load image * bmw8.png.lnk (MD5: dbc9223af733d0140be136cf32a990d9) * Malicious LNK used to trigger next stage and load image * bmw9.png.lnk (MD5: ac78497929569682133e02dec9b67870) * Malicious LNK used to trigger next stage and load image * NOTE____.EXE (MD5: b1820abc3a1ce2d32af04c18f9d2bfc3) * Legitimate Word application used for DLL side loading * Original name: winword.exe * Compiled on: 2022/12/22 19:27:25 * Dropped by e306333093eaf198f4d416d25a40784a * PDB path: D:\dbs\el\na1\Target\x64\ship\postc2r\x-none\winword.pdb * AppvIsvSubsystems64.dll (MD5: 53270b3968004cb48dac1a1b239ed23d) * BURNTBATTER in memory dropper * Compiled on: 2023/05/03 13:27:37 * Dropped by e306333093eaf198f4d416d25a40784a * Loads 0032b8eabdc41e01923fabca5fe8a06b (DONUT) * ojg2.px (MD5: 0032b8eabdc41e01923fabca5fe8a06b) * Encrypted DONUT payload * Loaded by 53270b3968004cb48dac1a1b239ed23d (BURNTBATTER) * Dropped by e306333093eaf198f4d416d25a40784a * Drops 6b41c60c24916e3c32acd90bbd7b92f9 (DONUT) * Unknown (MD5: 6b41c60c24916e3c32acd90bbd7b92f9) * DONUT dropper * Dropped by 0032b8eabdc41e01923fabca5fe8a06b (DONUT) * Drops 036ab9f19b63d44aaccf0f965df9434c (SPICYBEAT) * Unknown (MD5: 036ab9f19b63d44aaccf0f965df9434c) * SPICYBEAT downloader * Client_id: 840aae0d-cd89-4869-bce1-94222c33035e * Application Name: Teams_test * Authentication URL: https://graph.microsoft[.]com/v1.0/me/drive/root:/Apps/Teams_test * Invintation.zip (MD5:1aee5bf23edb7732fd0e6b2c61a959ce) * Malicious ZIP containing next stage * Downloaded from https://gavice[.]ng/event_program.php * Drops 2d794d1544f933aacbd8da2dad78b381 * Drops 5569fb4e9140974a80b4b7587b026913 (BURNTBATTER) * Drops 1c0059d976795ceded7c1dd706e74bd1 * Drops 595d8ea258ef8d8ec70b0e8a740e903c (DONUT) * invitation_letter_and_programme_17.05.2023_en.pdf[spaces].exe/ invitation_letter_and_programme_17.05.2023_ua.pdf[spaces].exe (MD5:2d794d1544f933aacbd8da2dad78b381) * Legitimate Adobe plugin * Compiled on: 2022/04/07 05:19:03 * Dropped by 1aee5bf23edb7732fd0e6b2c61a959ce * Drops 1ed822cc08ba08413c4a60023e0d590c * icucnv22.dll (MD5:5569fb4e9140974a80b4b7587b026913) * BURNTBATTER dropper * Compiled on: 2023/05/13 10:04:14 * Dropped by 1aee5bf23edb7732fd0e6b2c61a959ce * Drops 595d8ea258ef8d8ec70b0e8a740e903c (DONUT) * ly.ed (MD5:595d8ea258ef8d8ec70b0e8a740e903c) * Encrypted DONUT * Dropped by 5569fb4e9140974a80b4b7587b026913 (BURNTBATTER) * Dropped by 1aee5bf23edb7732fd0e6b2c61a959ce * Drops 1d54c487e6c8a08517fdb8efedfcd459 (DONUT) * lu.ed.bin (MD5:1d54c487e6c8a08517fdb8efedfcd459) * DONUT dropper * Dropped by 595d8ea258ef8d8ec70b0e8a740e903c (DONUT) * Drops 7a5988423f731d8b36d01926e715dd11 (SPICYBEAT) * SPICYBEAT downloader (7a5988423f731d8b36d01926e715dd11) * Compiled on: 2023/05/11 14:51:55 * Dropped by 1d54c487e6c8a08517fdb8efedfcd459 (DONUT) * Connects to https://graph.microsoft[.]com/v1.0/me/drives/442834D38635845C/root:/Apps/legron_application:/children * Drops 41944bb155ecf70193245d8c3485dd2e (BEACON) * Client_id: 5470384d-91c9-40f3-8891-8fb375c7df62 * Application Name: legron_application * Authentication URL: https://graph.microsoft[.]com/v1.0/me/drive/root:/Apps/ legron_application * Unknown (MD5:41944bb155ecf70193245d8c3485dd2e) * BEACON backdoor * Downloaded from OneDrive * Dropped by 7a5988423f731d8b36d01926e715dd11 (SPICYBEAT) * Resolves zone kitaeri[.]com * Connects to https://kitaeri[.]com/images * Connects to https://kitaeri[.]com/gen_204 JUNE 2023: SPLIT ROOTSAW CAMPAIGN * invitation.svg (MD5: 295527e2e38da97167979ade004de880) * ROOTSAW dropper * Attached to emails referencing “santa lucia celebration” * Drops 800f766f728a4418b0c682a867673341 * invitation.iso (MD5: 800f766f728a4418b0c682a867673341) * ISO containing next stages * Dropped by 295527e2e38da97167979ade004de880 * Drops 5e1389b494edc86e17ff1783ed6b9d37 (STATICNOISE) * Drops 9e51506816ad620c9e6474c52a9004a6 * Drops 301a7273418bceaa3fb15b15f69dd32a * Drops b48a16fdf890283cac7484ef0911a1f2 * CCLEANER.dll (MD5: 5e1389b494edc86e17ff1783ed6b9d37) * STATICNOISE downloader * Side loaded by 301a7273418bceaa3fb15b15f69dd32a * Downloads from https://kegas[.]id/search/s=1&id=APOX8NWOV4<userid> * INVITATI.LNK (MD5: 9e51506816ad620c9e6474c52a9004a6) * LNK launcher * Copies content of ISO to c:\Windows\Tasks and executes CCLeanerReactivator (301a7273418bceaa3fb15b15f69dd32a) * CCleanerReactivator.EXE (MD5: 301a7273418bceaa3fb15b15f69dd32a) * Legitimate CCleaner executable * Side loads 5e1389b494edc86e17ff1783ed6b9d37 (STATICNOISE) JULY 2023: ICEBEAT CAMPAIGN * Invitation_Farewell_DE_EMB.pdf (MD5: fc53c75289309ffb7f65a3513e7519eb) * Malicious PDF document * Drops 78062da99751c0a520ca4ac9fa59af73 (ROOTSAW) * Invitation_Farewell_DE_EMB.html (MD5: 78062da99751c0a520ca4ac9fa59af73) * ROOTSAW dropper * Dropped by fc53c75289309ffb7f65a3513e7519eb (ROOTSAW) * Connects to https://sgrhf[.]org.pk/wp-content/idx.php?n=ks&q= * Drops d6986d991c41afcc2e71fc30bde851d1 * invitation_farewell_de_emb.zip (MD5: d6986d991c41afcc2e71fc30bde851d1) * Malicious ZIP containing HTA smuggler * Dropped by 78062da99751c0a520ca4ac9fa59af73 (ROOTSAW) * Drops d67f83dcda6d01bedf08a51df7415d14 * invitation_farewell_de_emb.hta (MD5: d67f83dcda6d01bedf08a51df7415d14) * Malicious HTML smuggler * Dropped by d6986d991c41afcc2e71fc30bde851d1 * Drops 0be11b4f34ede748892ea49e473d82db (ICEBEAT) * Drops dfbdd308e22898f680b6c2c8eb052fb5 * Drops 4f744666d2a2dc95419208c61e42f163 Link to RSS feed CYBER DEFENSE SELF-ASSESSMENT Determine your cyber defense effectiveness Validated by ESG Take The Assessment HAVE QUESTIONS? LET'S TALK. Mandiant experts are ready to answer your questions. Contact Us * Follow us * * * * FOOTER * Mandiant Advantage Platform * Platform Overview * Breach Analytics for Chronicle * Security Validation * Attack Surface Management * Threat Intelligence * Digital Threat Monitoring * Managed Defense * Solutions * Proactive Exposure Management * Ransomware * Industrial Controls & OT * Cyber Risk Management * Digital Risk Protection * Insider Threats * Cyber Security Skills Gap * Election Security * Government Cyber Security * Manufacturing * Cyber Threat Visibility * Attack Surface Visibility * Cyber Preparedness * Detection and Response * Financial Services Cyber Security * Services * Services Overview * Incident Response * Strategic Readiness * Cyber Security Transformation * Technical Assurance * View all Services (48) * Expertise on Demand * Mandiant Academy * Overview * Education Formats * Upcoming Courses * On-Demand Courses * Certifications * ThreatSpace Cyber Range * Free Course Sneak Peaks * Resources * Resource Center * Blog * Podcasts * Customer Stories * Reports * Webinars * Insights * eBooks * Infographics * White Papers * Datasheets * Company * About Us * Careers * Events * Media Center * Noteholder and Preferred Shareholder Documents * Partners * Partners Overview * Technology Partners * Cyber Risk Partners * Service Partners * Channel Partners * Partner Portal * Connect with Mandiant * Contact Us * Report an Incident * Customer Support * Email Preferences * Customer Success * Media Inquiries © Copyright 2023 Mandiant. All rights reserved. BOTTOM * Website Privacy Policy * Terms & Conditions * Compliance * Site Map