Home Latest News Several C&C Servers Connected to WellMess Malware have been Discovered

Several C&C Servers Connected to WellMess Malware have been Discovered

by CISOCONNECT Bureau

Researchers discovered new Command-and-Control (C2) infrastructure linked to the Russian threat actor APT29, aka Cozy Bear, on Friday, which has been seen serving WellMess malware as part of an ongoing attack campaign.

The activity is being tracked by the cybersecurity community under a variety of codenames, including UNC2452 (FireEye), Nobelium (Microsoft), SolarStorm (Unit 42), StellarParticle (Crowdstrike), Dark Halo (Volexity), and Iron Ritual (Secureworks), citing differences in the adversary’s Tactics, Techniques, and Procedures (TTPs) with known attacker profiles, such as APT29.

WellMess aka WellMail malware was first identified by Japan’s JPCERT/CC in 2018 and has previously been used in espionage campaigns by the threat actor to steal intellectual property from multiple organisations involved in COVID-19 research and vaccine development in the United Kingdom, the United States, and Canada.

Recommended for You

Recommended for You

This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Close Read More

See Ads