Security News > 2021 > July > Experts Uncover Several C&C Servers Linked to WellMess Malware

Experts Uncover Several C&C Servers Linked to WellMess Malware
2021-07-30 03:00

Cybersecurity researchers on Friday unmasked new command-and-control infrastructure belonging to the Russian threat actor tracked as APT29, aka Cozy Bear, that has been spotted actively serving WellMess malware as part of an ongoing attack campaign.

More than 30 C2 servers operated by the Russian foreign intelligence have been uncovered, Microsoft-owned cybersecurity subsidiary RiskIQ said in a report shared with The Hacker News.

RiskIQ said it began its investigation into APT29's attack infrastructure following a public disclosure about a new WellMess C2 server on June 11, leading to the discovery of a cluster of no fewer than 30 active C2 servers.

One of the servers is believed to have been active as early as October 9, 2020, although it's not clear how these servers are being used or who the targets are.

In April, it unearthed an additional set of 18 servers with high confidence that likely communicated with the targeted, secondary Cobalt Strike payloads delivered via the TEARDROP and RAINDROP malware deployed in the attacks.

"RiskIQ's Team Atlas assesses with high confidence that these IP addresses and certificates are in active use by APT29," said Kevin Livelli, RiskIQ's director of threat intelligence.


News URL

http://feedproxy.google.com/~r/TheHackersNews/~3/OGQmE6b-OF4/experts-uncover-several-c-servers.html