Security

Here's 30 servers Russian intelligence uses to fling malware at the West, beams RiskIQ

Biden-Putin summit went well, then


Details of 30 servers thought to be used by Russia's SVR spy agency (aka APT29) as part of its ongoing campaigns to steal Western intellectual property were made public today by RiskIQ.

Russia's Foreign Intelligence Service "is actively serving malware (WellMess, WellMail) previously used in espionage campaigns targeting COVID-19 research in the UK, US, and Canada," according to threat intel firm.

"Team Atlas assesses with high confidence that these IP addresses and certificates are in active use by APT29 at the time of this writeup," said RiskIQ in its blog post. "We were unable to locate any malware which communicated with this infrastructure, but we suspect it is likely similar to previously identified samples."

Previously the SVR was linked to the WellMess malware, seen being deployed against Western medical science institutions in early 2020 as nation states raced to develop effective vaccines against COVID-19.

In revealing these 30 servers' IP addresses and details of their SSL certificates, RiskIQ follows the lead of the US CISA infosec agency, which in April told the world exactly what the SVR was deploying and from where, along with offering avoidance advice. The company also highlighted Japan's CERT's uncovering of WellMess as a new malware strain targeting Windows and Linux back in 2018.

Known to the infosec industry as APT29*, the SVR does not appear to have slowed down since the well-publicised Biden-Putin summit of June, where the American president nicely asked his Russian counterpart to tone it down a bit.

SVR operations against the West have been fairly brazen, with responses varying from quiet warnings through direct attribution to outright "they won't sodding well stop so we're telling you exactly what the naughty buggers have moved onto now" from a fed-up National Cyber Security Centre in the UK. Just for good measure, the GCHQ offshoot also briefed national newspapers in November that they were countering the SVR's continuing efforts to break into British research institutions, hinting they were deploying a form of encryption malware (think ransomware without the ransom) against the Russians. ®

Bootnote

*The SVR is also known as APT29, The Dukes, Cozy Bear, Yttrium, etc. etc. depending on which vendor's marketing team you're listening to that day. They're all the same crew.

Send us news
21 Comments

Meta comms chief handed six-year Russian prison sentence for 'justifying terrorism'

Memo to Andy Stone: Don't go to Moscow for your holidays

Germany cuffs alleged Russian spies over plot to bomb industrial and military targets

Apparently an attempt to damage Ukraine's war effort

Kremlin's Sandworm blamed for cyberattacks on US, European water utilities

Water tank overflowed during one system malfunction, says Mandiant

Old Windows print spooler bug is latest target of Russia's Fancy Bear gang

Putin's pals use 'GooseEgg' malware to launch attacks you can defeat with patches or deletion

US sanctions spree continues with 15 more for Russian entities

Financial firms that help evade existing restrictions in crosshairs

Russia's Cozy Bear caught phishing German politicos with phony dinner invites

Forget the Riesling, bring on the WINELOADER

Is Russia using Starlink in Ukraine? Congress demands answers

And saying Starlink doesn't work inside Russian borders isn't sufficient...

Kremlin accuses America of plotting cyberattack on Russian voting systems

Don't worry, we have a strong suspicion Putin's still gonna win

German defense chat overheard by Russian eavesdroppers on Cisco's WebEx

Officials can't tell whether the tape was edited, but fear Kremlin has more juicy bits to release in the future

Russia plans to put a nuclear reactor on the Moon – with China's help

Roscosmos has had a few problems landing on the lunar surface recently

Microsoft confirms Russian spies stole source code, accessed internal systems

Still 'no evidence' of any compromised customer-facing systems, we're told

That home router botnet the Feds took down? Moscow's probably going to try again

Non-techies told to master firmware upgrades and firewall rules. For the infosec hardheads: have some IOCs