FireEye, Inc. | APT29: HAMMERTOSS - Stealthy Tactics Define a Russian Cyber Threat Group

It hides in network communications, in all the noise—designed so that defenders can neither detect nor characterize its activity. But its purpose is transparent: to use Twitter, GitHub, and cloud storage services to relay commands and extract data from compromised networks.

Download the report and read about the recently discovered HAMMERTOSS, a malware backdoor created by the Russian advanced persistent threat (APT) group APT29.

Learn:

  • How HAMMERTOSS works—the five stages, from looking for a Twitter handle to executing commands, including uploading victim’s data to cloud storage services
  • Who APT29 is—their history, targets and methodology
  • Why it’s difficult to detect HAMMERTOSS

Download the report now. 

Uncovering a Malware Backdoor that Uses Twitter

HAMMERTOSS: Stealthy Tactics Define a Russian Cyber Threat Group

Download the Report

APT29: HAMMERTOSS - Stealthy Tactics Define  a Russian Cyber Threat Group

© 2015 FireEye, Inc. All rights reserved. Privacy Policy. FireEye on Facebook    FireEye on Twitter    FireEye on LinkedIn    FireEye Blog: Malware Intelligence Lab