Monday, April 21, 2025
HomeCyber Security NewsRussian APT29 Used 30+ C&C Servers Uncovered Linked to "WellMess" Malware

Russian APT29 Used 30+ C&C Servers Uncovered Linked to “WellMess” Malware

Published on

SIEM as a Service

Follow Us on Google News

Researchers from RISKIQ uncovered more than 30 commands & control server infrastructure actively serving malware known as “WellMess/WellMail”.

These C2 servers belong to Russian APT29 group hackers, and the gang was identified nearly a year back by the UK, US, and Canadian governments issued a joint advisory.

APT29(YTTRIUM, THE DUKES, COZY BEAR) group explicitly believed to be associated with Russia’s Foreign Intelligence Services (SVR) and the malware previously used in espionage campaigns targeting COVID-19 research in the UK, US, and Canada.

- Advertisement - Google News

Identified command & control servers are actively serving WellMess malware against highly targeted victims.

“The activity uncovered was notable given the context in which it appeared, coming on the heels of a public reproach of Russian hacking by President Joe Biden in a recent summit with President Vladimir Putin.” RISKIQ said.

‘WellMess’ is a custom malware used to target the number of victims globally, and the group is mainly using the recently published exploits to gain initial footholds.

A Tweets Leads to the Way

Researchers’ investigation begins with the Tweet that contains an indicator about the command and control server and the signed certificate.

Further analysis leads to uncovering several additional IP addresses and  Certificates, also revealed that the C2 server associated with the APT29 and WellMess.

The identified C2 infrastructure is actively used by APT 29, Also found new IP addresses residing in the same networks.

“Building on that discovery, RiskIQ’s Team Atlas was then able to leverage RiskIQ’s Internet Intelligence Graph to link the following SSL Certificates and IP addresses to APT29 C2 infrastructure with high confidence.”

When researchers examined the banners returned from HTTP requests made to the servers, they were able to found an entirely separate group of malicious certificates and IP addresses.

You can explore the full list of these IOCs Here.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity and hacking news updates.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Infostealer Attacks Surge 84% Weekly Through Phishing Emails

The volume of infostealer malware distributed through phishing emails has surged by 84% week-on-week...

North Korean IT Workers Use Real-Time Deepfakes to Infiltrate Organizations Through Remote Jobs

A division of Palo Alto Networks, have revealed a sophisticated scheme by North Korean...

New Phishing Technique Hides Weaponized HTML Files Within SVG Images

Cybersecurity experts have observed an alarming increase in the use of SVG (Scalable Vector...

Detecting And Blocking DNS Tunneling Techniques Using Network Analytics

DNS tunneling is a covert technique that cybercriminals use to bypass traditional network security...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Infostealer Attacks Surge 84% Weekly Through Phishing Emails

The volume of infostealer malware distributed through phishing emails has surged by 84% week-on-week...

North Korean IT Workers Use Real-Time Deepfakes to Infiltrate Organizations Through Remote Jobs

A division of Palo Alto Networks, have revealed a sophisticated scheme by North Korean...

New Phishing Technique Hides Weaponized HTML Files Within SVG Images

Cybersecurity experts have observed an alarming increase in the use of SVG (Scalable Vector...