Russian Hacker Group APT 29 Target Diplomats And Government Agencies

May 4, 2022

Researchers at the cybersecurity firm Mandiant have uncovered a new campaign from state-sponsored Russian hacker group APT 29.

The malicious campaign targets diplomats and government agencies using spear phishing to deploy a novel strain of malware.

Victims are tricked into downloading the malicious files via spear-phishing emails disguised as embassy administrative updates.

To bypass spam filters and other detections, APT 29 used legitimate email addresses from other diplomatic entities while targeting large publicly available lists of embassy personnel.

The malicious mail sent to diplomats uses the malicious HTML dropper ROOTSAW (also known as EnvyScout) to deliver and decode IMG or ISO files.

Both IMG and ISO can be written to disk and execute a malicious .DLL file that contains the BEATDROP downloader.

BEATDROP and BEACON can guarantee backdoor access to a victim’s network. After that, they quickly deploy BOOMMIC to gain deeper access into the victim’s environment. Once BOOMMIC is deployed, it downloads malicious payloads into memory on a target machine.

The sources for this piece include a story in TechRepublic.

Top Stories

Related Articles

December 23, 2025 South Korea will require facial recognition scans to open new mobile phone accounts. The new rule is more...

December 22, 2025 Apple is requiring iPhone users who have not upgraded to iOS 26 to update now after confirming more...

December 12, 2025 The United States has extradited a Ukrainian national accused of working with Russian-backed hacktivist groups that targeted more...

November 24, 2025 Google is rolling out its Gemini artificial intelligence assistant to vehicles equipped with Android Auto, promising a more...

Jim Love

Jim is an author and podcast host with over 40 years in technology.

Share:
Facebook
Twitter
LinkedIn