← All Threat Actors
APT29
Russian state-sponsored (SVR) · Espionage / intelligence collection / supply chain access
Reports 1
Active Since 2008
Last Reported 21 May 2026
Sectors Targeted government, critical-infrastructure
Tactics, Techniques & Procedures (TTPs)
- Supply chain compromise (SolarWinds Orion, IT service providers)
- OAuth application abuse for persistent cloud tenant access
- Residential proxy networks for detection evasion
- WINELOADER and ROOTSAW staged downloaders
- Dormant account reactivation in cloud directories
- Cloud management plane lateral movement
Known Targets
US and EU government agenciesDefence contractorsTechnology vendors and MSPsCOVID-19 vaccine research institutionsMicrosoft corporate infrastructure
Analyst Notes
SVR Foreign Intelligence Service. The SolarWinds Orion supply chain compromise (2020) affected approximately 18,000 organisations and provided access to multiple US federal agencies. Compromised Microsoft senior leadership email in January 2024 while actively searching for information about APT29 detection capabilities — a sophisticated counter-intelligence operation.
Also Known As
Cozy BearMidnight BlizzardNOBELIUMThe DukesDark Halo