back to article Russia's Cozy Bear dives into cloud environments with a new bag of tricks

Russia's notorious Cozy Bear, the crew behind the SolarWinds supply chain attack, has expanded its targets and evolved its techniques to break into organizations' cloud environments, according to the Five Eyes governments. Cozy Bear, also known as APT29 and Midnight Blizzard, is a cyber espionage group linked to the Russian …

  1. amanfromMars 1 Silver badge

    For those with learning difficulties or just hopelessly moronic or psychotic, this is what to expect

    And the moral of the tale, El Regers ‽ ...... Don’t [do] shit in the Cozy Bear woods for it is a favourite unusual playground of Western enemies and Eastern frenemies alike, virtual ghost busters and hunters of haunting daemons and eight international agencies* all struggling not so much with, but rather more for advantageous autonomous security and attractive anonymous supremacy in a novel times and boundless space environment empty of useless prisoners.

    * ..... The UK National Cyber Security Centre (NCSC), the US National Security Agency (NSA), the US Cybersecurity and Infrastructure Security Agency (CISA), the US Cyber National Mission Force (CNMF), the Federal Bureau of Investigation (FBI), Australian Signals Directorate's Australian Cyber Security Centre (ASD's ACSC), the Canadian Centre for Cyber Security (CCCS), and New Zealand Government Communications Security Bureau (GCSB).

    1. 42656e4d203239 Silver badge
      WTF?

      Re: For those with learning difficulties or just hopelessly moronic or psychotic, this is what to

      Hang on a minute - that almost made sense.

      Who are you and what have you done with amanfromMars1?

      p.s. title truncated because "Title is too long" error

      1. Anonymous Coward
        Anonymous Coward

        Re: For those with learning difficulties or just hopelessly moronic or psychotic, this is what to

        > Hang on a minute - that almost made sense.

        The language suggests an unconscious projection of the shadow and suppression of the anima. A projection of inflated self-importance, lack of ego integration and possibly underlying psychic fragmentation. Overall, the passage can be seen as an expression of unconscious psychic dynamics, with elements of shadow projection, anima suppression, and archetypal activation. It may indicate a need for individuation and integration of unconscious contents to achieve psychic wholeness and balance.

        1. amanfromMars 1 Silver badge

          Hang on a minute, for piss poor preparation and planning guarantees pathetic performance

          I’d like a second professional opinion/psyche evaluation, please, with particular peculiar regard being paid to the language suggests an unconscious projection of the shadow and suppression of the anima and it [the passage] may indicate a need for individuation and integration of unconscious contents to achieve psychic wholeness and balance. for such can so very easily be totally wrong and dangerously misleading if one be minded to compete or oppose with a denial of freely shared information which may or not be representative of the Artificial General Intelligence of Generative Pre-trained Transformers and the more learned of the most conscientious of Learned Large Language Learning Machines.

  2. Dr_Sandra_Lee

    It's fascinating to read about the new TTPs being used. The move to the cloud makes a lot of sense from an attacker's perspective, as it can make it harder to detect their activity. It really highlights how crucial it is for organizations to have strong cloud security protocols in place, including monitoring and logging, to catch these more subtle threats.

POST COMMENT House rules

Not a member of The Register? Create a new account here.

  • Enter your comment

  • Add an icon

Anonymous cowards cannot choose their icon

Other stories you might like