
The discussion in this podcast provide an extensive analysis of the Russian threat actor Cozy Bear (APT29), focusing on its sophisticated cyber espionage operations. The first source concentrates on the 2020 SolarWinds supply chain attack, detailing how the group injected the Sunburst backdoor into legitimate software updates to compromise numerous organizations, including U.S. government entities, and discusses the subsequent remediation, legal action, and lessons learned regarding supply chain security. The discussion also offers a retrospective on the 2015-2016 intrusion into the Democratic National Committee (DNC), contrasting Cozy Bear’s quiet, long-term intelligence gathering with Fancy Bear’s disruptive data dump, highlighting organizational security failures, and emphasizing the evolution of state-sponsored cyber influence operations. Collectively, it establishes Cozy Bear as a patient, strategic espionage unit linked to Russia’s SVR, known for adapting its tradecraft from spear-phishing and "living-off-the-land" techniques to complex supply chain and cloud identity compromises.