This week we are releasing our last APT29 themed chain based on the RNC hack in 2021. ESET has identified and attributed the attack to APT29. Like our previous case studies, not much information about this attack has been released.
This week's kill chain focused on APT29’s utilization of 3rd party software. APT29 used AdFind, an Active Directory query tool, in order to collect information about compromised networks. They’ve also extensively utilized Dropbox as a means upload results of reconnaissance. To model these behaviors, we created our latest chain, ExBox. This chain executes AdFind to collect information, compresses these results, and exfiltrates these results to Dropbox.
Watch a demonstration: APT29 RNC Hack
Thanks for reading our latest TTP Tuesday release! Please subscribe and reach out with any feedback. We love to hear from our community!
There are several ways to follow us and learn more about Prelude and our team members:
Download Prelude Operator: https://www.prelude.org/download/current
See the latest kill chain and TTP Releases: https://chains.prelude.org/
See our open-source repositories: https://github.com/preludeorg
Listen to our Podcast: https://anchor.fm/preludeorg
Read our blog: https://feed.prelude.org
Watch our live streams: https://www.twitch.tv/preludeorg
Watch our pre-recorded content: https://www.youtube.com/c/preludeorg