Security News > 2021 > May > Russian cyber-spies changed tactics after the UK and US outed their techniques – so here's a list of those changes

Russian cyber-spies changed tactics after the UK and US outed their techniques – so here's a list of those changes
2021-05-07 18:49

Russian spies from APT29 responded to Western agencies outing their tactics by adopting a red-teaming tool to blend into targets' networks as a legitimate pentesting exercise.

A couple of weeks ago, Britain and the US joined forces to out the SVR's Tactics, Techniques and Procedures, giving the world's infosec defenders a chance to look out for the state-backed hackers' fingerprints on their networked infrastructure.

"SVR cyber operators appear to have reacted to this report by changing their TTPs in an attempt to avoid further detection and remediation efforts by network defenders," said the poker-faced NCSC today, in an advisory detailing precisely what those changed TTPs are.

On top of all that the SVR is also posing as legitimate red-team pentesters: looking for easy camouflage, the spies hopped onto GitHub and downloaded the free open-source Sliver red-teaming platform, in what the NCSC described as "An attempt to maintain their accesses."

There are more vulns being abused by the Russians and the full NCSC advisory on what these are can be read on the NCSC website.

Drawing on this, the NCSC has published a set of "Connected places cyber security principles" for operators of public spaces with connectivity kit and sensors in them.


News URL

https://go.theregister.com/feed/www.theregister.com/2021/05/07/ncsc_russia_vulns_smart_cities_china_warning/