A closer look at the Midnight Blizzard Crew

Russian group the Midnight Blizzard crew (Nobelium, APT29, Cozy Bear, Iron Hemlock, The Dukes) has been targeting personal credentials.
Cybersecurity
Written by
Jason Whitehurst
Published on
July 20, 2023

Microsoft's security team has recently made a significant discovery regarding an increase in cyber-attacks orchestrated by the Russian state-backed group known as the Midnight Blizzard crew. This group, which also operates under the aliases Nobelium, APT29, Cozy Bear, Iron Hemlock, and The Dukes, has been actively targeting personal credentials, according to Microsoft's findings.

The Midnight Blizzard hackers employ residential proxy services to conceal the source IP addresses of their attacks. Their targets typically include government entities, IT service providers, non-governmental organizations (NGOs), defense industries, and critical manufacturing facilities. Microsoft shared these insights through a series of informative Twitter posts.

How Does the Attack Work?

The threat actors behind the Midnight Blizzard crew have been utilizing IP addresses for brief periods, making it challenging to scope and remediate the attacks, as noted by Microsoft. However, the specific countries and organizations targeted by these Kremlin-supported hackers were not disclosed by Microsoft.

Microsoft explained that the crew employs various techniques such as password spray attacks, brute force attacks, and token theft methods. Additionally, they have also been engaged in session replay attacks, which involve exploiting stolen sessions obtained through illicit means to gain initial access to cloud resources.

Previous Activities of Nobelium

In October 2021, Microsoft reported that Nobelium, the alleged Russian state actor responsible for the SolarWinds Orion cyberattacks, had been targeting at least 140 resellers and technology service providers since May 2021. Out of those, 14 have been compromised by these attacks.

Microsoft has actively monitored this latest campaign since May 2021, notifying affected partners and customers while simultaneously developing technical assistance and guidance for the reseller community. The Windows-maker is committed to providing comprehensive support and protection in response to these cyber threats.

Challenges Faced by Managed Service Providers (MSPs)

Out of the approximately 200 MSPs supported by Microsoft, six have been specifically targeted using methods like password spraying, phishing, and token theft. While these attacks may be relatively easy to target once they commence, the challenge lies in the fact that many clients fail to protect themselves adequately, unlike their own clients. This situation makes it crucial for MSPs to identify and block these attacks efficiently, often necessitating the use of third-party platforms such as Checkpoint Harmony or Ironscales.  

Leveraging Octiga for Enhanced Security

To address these challenges, MSPs are suggested to leverage tools like Octiga to determine the Microsoft 365 security baseline and facilitate streamlined remediation of vulnerabilities with just a single click. This approach offers a user-friendly and efficient means of protecting organizations against cyber threats. For MSPs seeking an effective and convenient solution, Octiga has proven to be as close to an "easy button" as they have found.

Conclusion

The recent surge in cyber-attacks orchestrated by the Russian state-backed Midnight Blizzard crew has caught the attention of Microsoft's security team. By shedding light on the techniques used by these threat actors and their targets, Microsoft aims to raise awareness about the importance of robust cybersecurity measures. With the collaboration of industry professionals and the adoption of advanced security tools, we can effectively combat these malicious activities and safeguard our digital landscape. Stay vigilant, protect your personal credentials, and together, let's ensure a secure and resilient cyber environment.

Have a question?

If you’d like more information, we’re here to help

Heading

This is some text inside of a div block.
Cybersecurity
Written by
This is some text inside of a div block.
Published on
This is some text inside of a div block.

Heading 1

Heading 2

Heading 3

Heading 4

Heading 5
Heading 6

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Duis aute irure dolor in reprehenderit in voluptate velit esse cillum dolore eu fugiat nulla pariatur.

Block quote

Ordered list

  1. Item 1
  2. Item 2
  3. Item 3

Unordered list

  • Item A
  • Item B
  • Item C

Text link

Bold text

Emphasis

Superscript

Subscript