APT 29, Cozy Bear, The Dukes

Description

(F-Secure) The Dukes are a well-resourced, highly dedicated and organized cyberespionage group that we believe has been working for the Russian Federation since at least 2008 to collect intelligence in support of foreign and security policy decision-making.

The Dukes primarily target Western governments and related organizations, such as government ministries and agencies, political think tanks, and governmental subcontractors. Their targets have also included the governments of members of the Commonwealth of Independent States; Asian, African, and Middle Eastern governments; organizations associated with Chechen extremism; and Russian speakers engaged in the illicit trade of controlled substances and drugs.

The Dukes are known to employ a vast arsenal of malware toolsets, which we identify as MiniDuke, CosmicDuke, OnionDuke, CozyDuke, CloudDuke, SeaDuke, HammerDuke, PinchDuke, and GeminiDuke. In recent years, the Dukes have engaged in apparently biannual large-scale spear-phishing campaigns against hundreds or even thousands of recipients associated with governmental institutions and affiliated organizations.

These campaigns utilize a smash-and-grab approach involving a fast but noisy break-in followed by the rapid collection and exfiltration of as much data as possible. If the compromised target is discovered to be of value, the Dukes will quickly switch the toolset used and move to using stealthier tactics focused on persistent compromise and long-term intelligence gathering.

In addition to these large-scale campaigns, the Dukes continuously and concurrently engage in smaller, much more targeted campaigns, utilizing different toolsets. These targeted campaigns have been going on for at least 7 years. The targets and timing of these campaigns appear to align with the known foreign and security policy interests of the Russian Federation at those times.

Names

NameName-Giver
APT 29Mandiant
Cozy BearCrowdStrike
The DukesF-Secure
Group 100Talos
YttriumMicrosoft
Iron HemlockSecureWorks
MinidionisPalo Alto
CloudLookKaspersky
ATK 7Thales
ITG11IBM
Grizzly SteppeUS Government
UNC2452FireEye
Dark HaloVolexity
SolarStormPalo Alto
StellarParticleCrowdStrike
SilverFishProdaft
NobeliumMicrosoft
Iron RitualSecureWorks
Cloaked UrsaPalo Alto
BlueBravoRecorded Future
Midnight BlizzardMicrosoft
UNC3524Mandiant
CraneflySymantec
TEMP.MonkeysFireEye
Blue Dev 5PWC
NobleBaronSentinelOne
Solar PhoenixPalo Alto
Earth KoshcheiTrend Micro

Country

State-sponsored

Motivation

  • Information theft and espionage

First Seen

2008

Observed Sectors

Observed Countries

Tools

Operations

Counter Operations

Information

Mitre Attack

Playbook

Other Information

Uuid

93ba9804-335e-4782-855d-40af22b93201

Last Card Change

2025-06-28