Researchers shed more light on APT29 activity during SolarWinds attack RiskIQ’s Atlas threat intel team uncovers new patterns and threat infrastructure used in the SolarWind’s attacks Share this item with your network: By Published: 22 Apr 2021 15:00 Threat researchers at RiskIQ’s Atlas intelligence unit have gleaned potentially important new insight into the infrastructure and tactics used in the SolarWinds cyber espionage campaign from the firm’s network telemetry. The researchers combined the firm’s Internet Intelligence Graph with patterns derived from indicators of compromise (IoCs) that had already been reported to surface 56% more attacker-owned network infrastructure, and more than 18 previously missed command and control (C2) servers.