ThreatCluster
About Blog Help Contact
Login
  • Feed
  • Dashboard
  • Saved
THREAT HUNTING
  • Domains
  • IP Addresses
  • File Hashes
  • CVEs
THREAT INTELLIGENCE
  • APT Groups
  • Ransomware Groups
  • Malware Families
  • Attack Types
  • MITRE ATT&CK
  • Security Standards
  • Vulnerability Types
BUSINESS INTELLIGENCE
  • Companies
  • Industry Sectors
  • Security Vendors
  • Government Agencies
  • Countries
  • Platforms
Home / Feed / Cluster #2296

Amazon Disrupts APT29 Watering Hole Campaign Abusing Microsoft Device Code Authentication

Threat Score:
82
2 articles
88.0% similarity
6 hours ago
JSON CSV Text STIX IoCs
Splunk Elastic Sentinel Sigma YARA All Queries

Article Timeline

2 articles
Click to navigate
Aug 29
Aug 29
Oldest
Latest

Key Insights

1
Amazon identified and disrupted a watering hole campaign by APT29, which utilized compromised websites to redirect users to malicious infrastructure, tricking them into authorizing attacker-controlled devices through Microsoft's device code authentication flow.
2
APT29, also known as Midnight Blizzard, has been linked to various phishing techniques, including device code phishing and remote desktop protocol (RDP) exploitation, targeting Ukrainian entities and others.
3
In June 2025, Google reported APT29 leveraging application-specific passwords to access emails of academics and critics of Russia, indicating a strategic focus on credential harvesting.
4
The current campaign represents an evolution in APT29's tactics, showcasing their ability to quickly adapt and refine their methods for broader intelligence gathering.
5
Amazon's Chief Information Security Officer, CJ Mosess, highlighted that this campaign reflects APT29's ongoing evolution in scaling their operations for intelligence collection.
6
Previous disruptions by Amazon against APT29 include attempts to impersonate AWS and phishing campaigns targeting users with malicious RDP files.

Threat Overview

On August 29, 2025, Amazon announced that its threat intelligence team successfully disrupted a watering hole campaign orchestrated by APT29, a Russian state-sponsored hacking group also known as Midnight Blizzard. This campaign involved the use of compromised websites to redirect unsuspecting visitors to malicious infrastructure aimed at tricking them into authorizing devices controlled by the attackers through Microsoft's device code authentication flow. Amazon's Chief Information Security Officer, CJ Mosess, stated, "This opportunistic approach illustrates APT29's continued evolution in scaling their operations to cast a wider net in their intelligence collection efforts."

APT29, which is associated with Russia's Foreign Intelligence Service (SVR), has been linked to various cyber operations targeting sensitive data. In recent months, they have employed phishing techniques including device code phishing and malicious RDP configurations, particularly against Ukrainian entities. This latest operation is part of a trend where APT29 has refined its methods to enhance its intelligence gathering capabilities. In June 2025, Google reported that APT29 was exploiting application-specific passwords to gain unauthorized access to the emails of academics and critics of Russia.

The watering hole attack works by compromising legitimate websites and redirecting users to malicious sites that employ a sophisticated authentication flow. By leveraging Microsoft's device code authentication, APT29 aims to gain unauthorized access to Microsoft 365 accounts, thereby facilitating credential harvesting. Security experts have noted that this tactic not only allows for the harvesting of credentials but also illustrates the group's ability to adapt its infrastructure rapidly following previous disruptions.

The industry response to APT29's activities has been proactive. Amazon's security teams have previously disrupted campaigns where APT29 attempted to impersonate AWS services to conduct phishing attacks. Experts in the field emphasize the importance of continuous monitoring and updating of security practices to defend against such sophisticated threats.

Organizations are encouraged to implement robust security measures including multi-factor authentication and to remain vigilant against phishing attempts. As Mosess stated, "The evolution of APT29's tactics requires organizations to be on high alert and to enhance their defensive strategies to mitigate risks associated with such advanced persistent threats."

In light of these developments, organizations are advised to review their security protocols and ensure that their systems are updated to defend against potential exploitation by APT29 and similar threat actors.

Tactics, Techniques & Procedures (TTPs)

T1566.001
Spearphishing Attachment - APT29 targets users with malicious attachments to gain access to sensitive information [1][2]
T1190
Exploit Public-Facing Application - Attackers leverage compromised websites to redirect users to malicious infrastructure [1][2]
T1059.007
JavaScript/JScript - Malicious JavaScript is injected into compromised sites to facilitate credential harvesting [1][2]
T1557
Adversary-in-the-Middle - APT29 utilizes open redirects to intercept user credentials during the authentication process [1][2]
T1053
Scheduled Task/Job - The group may employ persistence techniques to maintain access to compromised systems [2]
T1003
OS Credential Dumping - Credential harvesting techniques employed post-exploitation to gather sensitive information [2]

Timeline of Events

2025-06-2025
Google identifies APT29 phishing campaigns targeting academics using application-specific passwords [1]
2025-08-29
Amazon detects and disrupts APT29's watering hole campaign utilizing compromised websites for malicious activities [1][2]
2025-06-2025
Previous disruptions by Amazon include attempts by APT29 to impersonate AWS services for phishing purposes [2]

Source Citations

expert_quotes: {'Amazon CISO': 'Article 1'}
primary_findings: {'Disruption announcement': 'Articles 1, 2', 'Phishing campaign details': 'Articles 1, 2'}
technical_details: {'Attack methods': 'Articles 1, 2'}
Powered by ThreatCluster AI
Generated 6 hours ago
Recent Analysis
AI analysis may contain inaccuracies

Related Articles

2 articles
1

Amazon Disrupts APT29 Watering Hole Campaign Abusing Microsoft Device Code Authentication

The Hacker News • 8 hours ago

Amazon on Friday said it flagged and disrupted what it described as an opportunistic watering hole campaign orchestrated by the Russia-linked APT29 actors as part of their intelligence gathering efforts. The campaign used "compromised websites to redirect visitors to malicious infrastructure designed to trick users into authorizing attacker-controlled devices through Microsoft's device code authentication flow," Amazon's Chief Information Security Officer CJ Mosessaid. APT29, also tracked as Blu

Score
80
97.0% similarity
Read more
2
Amazon disrupts watering hole campaign by Russia’s APT29

Amazon disrupts watering hole campaign by Russia’s APT29

AWS Security Blog • 10 hours ago

Amazon disrupts watering hole campaign by Russia’s APT29 Amazon’s threat intelligence team has identified and disrupted a watering hole campaign conducted by APT29 (also known as Midnight Blizzard), a threat actor associated with Russia’s Foreign Intelligence Service (SVR). Our investigation uncovered an opportunistic watering hole campaign using compromised websites to redirect visitors to malicious infrastructure designed to trick users into authorizing attacker-controlled devices through Micr

Score
79
97.0% similarity
Read more

Save to Folder

Choose a folder to save this cluster:

Cluster Intelligence

Key entities and indicators for this cluster

ATTACK TYPES
Watering Hole Attack
Credential Harvesting
MITRE ATT&CK
T1190
T1003
T1059
T1053
T1566
PLATFORMS
Microsoft 365
CLUSTER INFORMATION
Cluster #2296
Created 6 hours ago
Semantic Algorithm

We use cookies

We use cookies and similar technologies to enhance your experience, analyse site usage, and assist in our marketing efforts.

Cookie Settings

Essential Cookies

Required for the website to function. Cannot be disabled.

  • Session management and authentication
  • Security and fraud prevention
  • Cookie consent preferences

Analytics Cookies

Help us understand how visitors interact with our website.

  • Plausible Analytics - Privacy-focused usage statistics
  • PostHog - Product analytics and feature tracking
  • Page views and user journey analysis

Performance Cookies

Help us monitor and improve website performance.

  • Page load time monitoring
  • Error tracking and debugging
  • Performance optimisation

Marketing Cookies

Used to track visitors across websites for marketing purposes.

  • Conversion tracking
  • Remarketing campaigns
  • Social media integration