What We Do
How we do it
May 11, 2022
CVE-2022-26923 - Active Directory Domain Services Elevation of Privilege Vulnerability
THE THREAT Microsoft has disclosed a new vulnerability impacting Active Directory Certificate Services (ADCS) tracked as CVE-2022-26923 (Active Directory Domain Services Elevation of Privilege Vulnerability). If exploited successfully, an authenticated attacker can escalate privileges in environments where ADCS is running on the domain. eSentire is aware of technical details and tooling [2] for…
Read More
View all Advisories →
About Us
eSentire is The Authority in Managed Detection and Response Services, protecting the critical data and applications of 1200+ organizations in 75+ countries from known and unknown cyber threats. Founded in 2001, the company’s mission is to hunt, investigate and stop cyber threats before they become business disrupting events.
Read about how we got here
Leadership Work at eSentire
May 17, 2022
Cybersecurity Leader eSentire Continues Its Commitment to Rigorous Security Standards Earning PCI DSS Certification
Waterloo, ON, May 17, 2022 — eSentire, the Authority in Managed Detection and Response (MDR), maintains one of the most secure and robust IT environments of any MDR provider in the industry. To that end, eSentire today announced that it has received the Payment Card Industry Data Security Standard (PCI DSS) certification, considered one of the most stringent and comprehensive payment card…
Read More
e3 Ecosystem
We provide sophisticated cybersecurity solutions for Managed Security Service Providers (MSSPs), Managed Service Providers (MSPs), and Value-Added Resellers (VARs). Find out why you should partner with eSentire, the Authority in Managed Detection and Response, today.
Learn more
Apply to become an e3 ecosystem partner with eSentire, the Authority in Managed Detection and Response.
Login to the Partner Portal for resources and content for current partners.
Security advisories — Oct 27, 2021

NOBELIUM Supply Chain Attacks

Speak With A Security Expert Now


Researchers from Microsoft have released both a high-level report and a technical guidance report relating to ongoing supply chain attacks attributed to the NOBELIUM threat actor group (aka. APT29, The Dukes, CozyBear). Law Enforcement and governments have attributed NOBELIUM to Russia's Foreign Intelligence Service (SVR).

Since May 2021, NOBELIUM has attempted to compromise Managed Service Providers (MSPs), Cloud Service Providers (CPSs), and other IT services, in order to breach their customer bases. Attacks have been observed against more than 140 service providers; at least 14 unnamed organizations have been confirmed as compromised.

Organizations are recommended to review the recommendations in this advisory and ensure that proactive defenses are in place.

eSentire is a customer of its own products and services and is already following the recommended mitigation strategies as a part of our ongoing security best practices. As a precaution, eSentire is accelerating our access review cycle, which includes delegated administrative access and will continue to monitor user activity.

What we’re doing about it

What you should do about it

Additional information

Targeted organizations have been identified in the United States and multiple European countries. NOBELIUM is abusing trusted relationships in order to compromise governments, think tanks, and other organizations with information valuable to the Russian state. Initial access to services providers is gained via a variety of methods including spear-phishing emails, password spraying, token theft and API abuse. Microsoft has not shared information on organizations confirmed to be compromised by NOBELIUM. According to the recent reports all impacted organizations have been privately notified by Microsoft.

Indicators of Compromise (IoCs) relating to this activity are not publicly available at this time. NOBELIUM is a sophisticated APT that shifts indicators based on campaigns; as such, detecting techniques employed by the group is critical.

Techniques employed by NOBELIUM in the recent supply chain attacks include:


[1] https://blogs.microsoft.com/on-the-issues/2021/10/24/new-activity-from-russian-actor-nobelium/
[2] https://www.microsoft.com/security/blog/2021/10/25/nobelium-targeting-delegated-administrative-privileges-to-facilitate-broader-attacks/
[3] https://us-cert.cisa.gov/bsi/articles/knowledge/principles/least-privilege

View Most Recent Blogs