Hunting Laundry Bear: Infrastructure Analysis Guide and Findings

This analysis explores the infrastructure of Laundry Bear, a Russian state-sponsored APT group active since April 2024, targeting NATO countries and Ukraine. The investigation expands on initial indicators, using advanced pivoting techniques to uncover additional domains and infrastructure. Key findings include the discovery of multiple lookalike domains, similar registration patterns, and shared hosting infrastructure. The analysis reveals a network of domains with login and account management themes, redirecting to legitimate Microsoft services. The investigation also uncovers connections to other potential malicious activities, including spear-phishing attempts and the use of PDF files for possible malware delivery. The findings demonstrate the extensive infrastructure used by the threat actor and highlight the importance of advanced threat hunting techniques in uncovering related malicious activities. Author: AlienVault

Related Tags:
ukraine targets

domain typosquatting

russian threat actor

T1589.002

infrastructure analysis

T1584.001

T1608.001

NGO

Netherlands

Associated Indicators:
ADE08CD340765E68F65174820B46C0E3D9B52AB4

micsrosoftonline.com

bidscale.net

ebsurnmit.eu

mail-forgot.com

remerelli.com

deloittesharepoint.com

usembassyservice.com

miscrsosoft.com