At a glance.
- Amazon shuts down APT29 watering-hole campaign.
- Salesloft Drift breach affects security firms.
- TamperedChef spreads via malicious PDF editor tools.
Amazon shuts down APT29 watering-hole campaign.
Amazon’s threat intelligence team describes a watering-hole campaign run by APT29, a threat actor tied to Russia's Foreign Intelligence Service (SVR). The threat actor used "compromised websites to redirect visitors to malicious infrastructure designed to trick users into authorizing attacker-controlled devices through Microsoft’s device code authentication flow." Amazon shut down the campaign on AWS infrastructure, then tracked the activity and disrupted it again when the threat actor moved to another cloud provider.
The researchers urge users to follow security best practices and to "[f]ollow Microsoft’s security guidance on device authentication flows and consider disabling this feature if not required."

