#Wineloader

2025-04-19

Russian hacker group Cozy Bear (aka #MidnightBlizzard, APT29) is back, using wine-tasting invites to phish EU diplomats. The bait? A new wave of WineLoader malware. 🍷🎣

Read: hackread.com/cozy-bear-wine-lu

#CyberSecurity #APT29 #WineLoader #Russia #EU

Just Another Blue TeamerLeeArchinal@ioc.exchange
2025-04-17

Good day everyone!

Check Point Software researchers produced another great article that involves #APT29 and #phishing and a little bit of masquerading. This phishing campaign targeted European diplomatic entities that distributes fake invitations to diplomatic events and appears to be a continuation of a previous campaign run by the same actors. These phishing emails utilized a backdoor known as #Wineloader and also employs a new loader #Grapeloader. There is a lot to unpack here and I hope you enjoy!

Renewed APT29 Phishing Campaign Against European Diplomats
research.checkpoint.com/2025/a

Intel 471 Cyborg Security, Now Part of Intel 471 #ThreatIntel #ThreatHunting #ThreatDetection #HappyHunting #readoftheday

2024-04-16

Splunk provides a detailed analysis of the tactics, techniques, and procedures (TTPs) employed by APT29 in the campaign targeting German political parties with the new WINELOADER backdoor. APT29, aka Midnight Blizzard and Cozy Bear, is publicly attributed to Russian Foreign Intelligence Service (SVR). IOC and Yara rules provided.🔗 splunk.com/en_us/blog/security

#APT29 #MidnightBlizzard #CozyBear #threatintel #WINELOADER #threatintel #IOC #Russia #cyberespionage

acrypthash👨🏻‍💻acrypthash@infosec.exchange
2024-04-04

It looks like someone found a way to DLL side load with sqlwriter.exe using the exported set_se_translator function :D

zscaler.com/blogs/security-res

#security #dllsideloading #malware #wineloader #sqlwriter

Scripter :verified_flashing:scripter@social.tchncs.de
2024-03-25
Prof. Dr. Dennis-Kenji Kipkerkenji@chaos.social
2024-03-23

Inklusive #CDU-Logo: #Fake-Politiker Einladung von #APT29 zum Abendessen - macht aber einen ziemlich hölzernen Eindruck:

"Die Links führten nach Angaben von #Mandiant jeweils zu einer Zip-Datei mit einem Malware-Dropper namens #Rootsaw. Dieser präsentierte der Zielperson ein Köderdokument mit weiteren Informationen zu dem Abendessen und lud eine Backdoor namens #Wineloader nach."

golem.de/news/einladung-zum-ab

Client Info

Server: https://mastodon.social
Version: 2025.04
Repository: https://github.com/cyevgeniy/lmst