← All Actors

SVR / APT29 / Cozy Bear

Russia — SVR (Foreign Intelligence Service)

Mission Type

Strategic intelligence collection, long-duration supply chain compromise, targeting of foreign government and technology vendors

Primary Sectors

GovernmentTechnologyDefense

Operational Period

2008 – present

Attributed Cases

2

Attributed Cases

TTP Pattern Summary

APT29 specialises in patient, low-signature supply chain compromise and abuse of cloud authentication mechanisms. The group demonstrates exceptional operational security, carefully limiting second-stage payload deployment to high-value targets while maintaining broad initial access. Authentication token manipulation and OAuth abuse are recurring techniques reflecting deep understanding of cloud identity architecture.

Lateral Movement (2)Initial Access (1)Persistence (1)Command and Control (1)Credential Access (1)Collection (1)

Behavioural Signature

APT29 operates within traditional espionage parameters but at unprecedented scale. Its operations are characterised by restraint in execution — broad access coupled with selective targeting — and a focus on intelligence collection from technology providers' own internal systems rather than their customers directly. This patience distinguishes APT29 from the more aggressive GRU-linked operations.

Governance Footprint

Subject to US sanctions and diplomatic expulsions (April 2021). SolarWinds prompted Executive Order 14028, the most significant US cybersecurity policy reform in a decade. Midnight Blizzard triggered CISA Emergency Directive 24-02 and intensified scrutiny of cloud vendor security accountability.