Red Russians: How Russian APTs are following Red Team Research
This talk analyzes how Russian APT groups, including APT28, APT29, and Turla, actively monitor and adopt publicly disclosed red team research to enhance their cyber espionage campaigns. The speaker demonstrates how these threat actors leverage known techniques such as M365 device code phishing, RDP configuration file abuse, Azure AD password spraying, and HTML smuggling to target government and non-governmental organizations. The presentation highlights the critical need for defenders to proactively implement detections for these publicly documented methods before they are weaponized in the wild. A comprehensive matrix of tools and techniques used by these groups is provided to assist security teams in threat hunting and engineering.
Russian APTs Are Weaponizing Your Public Red Team Research
TLDR: Russian intelligence services are actively monitoring public red team research and weaponizing disclosed techniques within weeks of publication. By tracking public GitHub repositories and security blogs, these groups rapidly integrate exploits like M365 device code phishing and TeamCity RCE into their espionage campaigns. Security researchers must balance the benefits of public disclosure with the reality that adversaries are using these same tools to target critical infrastructure.
Publicly sharing research is the lifeblood of our community. We publish proof-of-concept code, write detailed blog posts, and present at conferences to raise the bar for everyone. But there is a dark side to this transparency. Russian threat actors, including those linked to the GRU and SVR, are not just reading our work; they are using it as a roadmap for their own operations. They are effectively outsourcing their initial research and development to the global security community.
When a researcher drops a new technique or a bypass on GitHub, the clock starts ticking. For some of these groups, the time between a public disclosure and the first observed exploitation in the wild is measured in days, not months. This is not a theoretical risk. It is a documented pattern of behavior that turns our own contributions into a force multiplier for state-sponsored espionage.
The Mechanics of Rapid Weaponization
The most effective techniques these groups adopt are often the simplest ones. They focus on low-friction, high-impact methods that bypass traditional perimeter defenses. Take the M365 device code phishing campaign observed earlier this year. This technique relies on the legitimate OAuth 2.0 device code flow, which is designed for devices without a browser. By tricking a user into entering a code on a malicious site, the attacker gains an access token without ever needing the user's password or triggering a standard MFA prompt.
This is not a zero-day. It is a feature of the platform. When researchers first highlighted the potential for abusing this flow, they were providing a service to defenders. However, the SVR saw the same research and immediately pivoted to using it against government and non-governmental organizations. They created lures mimicking platforms like WhatsApp and Microsoft Teams to harvest these tokens.
Another prime example is the exploitation of CVE-2023-42793, a critical remote code execution vulnerability in TeamCity. Within a week of a public exploit being released, these groups were already using it to gain initial access to target environments. The speed of adoption here is staggering. They are not waiting for complex, custom-built malware; they are grabbing the latest public PoC and running with it.
Why Your Research Matters to Them
For a pentester, these techniques are bread and butter. You use Impacket to move laterally or Cobalt Strike to maintain persistence during an engagement. These are standard tools. But when an APT group uses them, they are often paired with custom, stealthy C2 infrastructure that makes detection significantly harder.
The real danger lies in the "living off the land" approach. By using legitimate tools and features—like RDP configuration files or standard PowerShell commands—they blend into the noise of a busy network. When they use a technique that has been publicly documented, they know exactly what the detection signatures look like. They can test their payloads against the same open-source detection rules that you are using to protect your clients.
Defensive Engineering in an Adversarial World
Defenders cannot afford to wait for a vendor patch or a formal threat intelligence report to start building detections. If a technique is public, you should assume it is being tested against your environment. This requires a shift in how we approach threat hunting. You need to move beyond static indicators of compromise and focus on behavioral patterns.
For instance, if you see mstsc.exe being launched with a suspicious .rdp file, that is a high-fidelity alert. You do not need to wait for a specific hash or IP address to block that activity. Similarly, monitoring for unusual OAuth device code requests in your Microsoft Entra ID logs can help you identify phishing attempts before they result in a full account takeover.
The goal is to make the cost of operation higher for the adversary. If they have to constantly change their infrastructure and techniques because you have robust, behavioral-based detections in place, they will eventually look for an easier target.
What Comes Next
We are not going to stop sharing research. That would be a victory for the bad guys. But we need to be more intentional about how we disclose. When you release a new tool or technique, consider the defensive implications. Provide the detection logic alongside the exploit code. If you are releasing a PoC, make sure it is not easily weaponizable without significant effort.
The Russian APT tool matrix is constantly evolving, and they are always looking for the next path of least resistance. As researchers and practitioners, we have a responsibility to ensure that our work makes the world safer, not just more efficient for those who wish to do us harm. Keep building, keep sharing, but keep your eyes on the horizon. The adversary is watching.
CVEs
Vulnerability Classes
Tools Used
Target Technologies
Attack Techniques
OWASP Categories
All Tags
Up Next From This Conference
Similar Talks

Exploiting Shadow Data in AI Models and Embeddings

Social Engineering A.I. and Subverting H.I.




