COVID-19 Research and Vaccine Research Targeted by APT29 Group


July 17, 2020

Promo Protect all your devices, without slowing them down.
Free 30-day trial
COVID-19 Research and Vaccine Research Targeted by APT29 Group

Organizations from the US, UK and Canada involved in COVID-19 research have been targeted by a hacking group known as APT29.

APT, or Advanced Persistent Threat, groups are usually nation-state or state-sponsored groups, working to compromise critical infrastructure and gain access to networks belonging to other countries. Many active hacking groups exist, and their allegiance is usually known.

The United Kingdom”s National Cyber Security Centre (NCSC) and Canada”s Communications Security Establishment (CSE) say that APT29 (also known as “the Dukes” or “Cozy Bear”) is likely a part of Russian intelligence services. Law enforcement agencies, including NCSC, CSE, DHS CISA, and the NSA issued a joint advisory regarding the recent activities of APT29.

“Throughout 2020, APT29 has targeted various organizations involved in COVID-19 vaccine development in Canada, the United States and the United Kingdom, highly likely with the intention of stealing information and intellectual property relating to the development and testing of COVID-19 vaccines,” states the advisory.

“APT29 is using custom malware known as “WellMess” and “WellMail” to target a number of organisations globally. This includes those organisations involved with COVID-19 vaccine development. WellMess and WellMail have not previously been publicly associated to APT29.”

The group probes IP-facing networks of organizations working in COVID-19 research and is looking to exploit known vulnerabilities, some with success. Examples include Citrix, Pulse Secure, FortiGate, and Zimbra vulnerabilities.

They also resort to spear phishing in an effort to obtain legitimate credentials. After the group gains access to a particular system, it deploys other tools and, in some cases, a malware named WellMess that allows them to run shell commands, upload and download files.

The advisory also provides indicators of compromises and some detection rules, indicating the need to patch existing systems and networks. The law enforcement agencies haven”t said how successful APT29 was in its attempts or if they managed to obtain the data they were looking for.




Silviu is a seasoned writer who followed the technology world for almost two decades, covering topics ranging from software to hardware and everything in between.

View all posts

You might also like