WaterISAC Navigation
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
Home Community Partnerships Threat Awareness – One Threat Activity Group is Being a Royal Pain
Become a Member

Log in

  • Upcoming Events
  • Resource Center
  • Tools
  • Webcasts
  • Contaminant Databases
  • Directory
  • About
  • Log in

  • My Account

  • Logout

  • Report Incident
  • Contact Us
  • NRWA Signup
  • WaterISAC Champions
More Resources

Threat Awareness – One Threat Activity Group is Being a Royal Pain

Author: Jennifer Walker

Created: Tuesday, November 22, 2022 - 20:14

Categories: Cybersecurity

DEV-0569, a threat group/actor that Microsoft is tracking has become quite nimble in its tactics, which includes the deployment of Royal ransomware and other malicious payloads. According to Microsoft, DEV-0569 attacks show a pattern of continuous innovation, with regular incorporation of new discovery techniques, defense evasion, and various post-compromise payloads, alongside increasing ransomware facilitation. Current behaviors currently attributed to DEV-0569 include, but are not limited to:

  • Malvertising, including the incorporation of Google Ads to blend in with normal traffic.
  • The use of contact forms on targeted organizations’ websites to deliver phishing links.
  • Hosting fake installer files on legitimate-looking software download sites such as TeamViewer, Adobe Flash Player, Zoom, and AnyDesk and on legitimate repositories such as GitHub and OneDrive to make malicious downloads look authentic to target.
  • The use of file formats like Virtual Hard Disk (VHD) impersonating legitimate software for first-stage payloads.
  • Using PowerShell and batch scripts for downloading malware payloads or remote management tools to maintain persistence or proliferate ransomware.
  • Tampering with antivirus products in an attempt to disable them.

User education goes a long way to help protect against these tactics and techniques that often begin with some form of social engineering. Additionally, to help limit damage when users do fall victim, members are encouraged to verify or implement appropriate cybersecurity controls to protect from the plethora of behaviors currently attributed to DEV-0569, such as:

  • Maintaining positive credential hygiene, including MFA.
  • Implementing the principle of least-privilege.
  • Restricting/limiting widespread use of local administrative privileges.
  • Avoiding the use of domain-wide, admin-level service accounts.

Visit Microsoft for more.

Related Resources

Members Only

(TLP:AMBER+STRICT) Situation Report: Heightened Threat Environment – Potential Retaliation by Iranian Threat Actors Following U.S. Strikes on Iran (Updated May 7, 2026)

May 7, 2026 in Cybersecurity, OT-ICS Security, Physical Security, Security Preparedness
Members Only

(TLP:GREEN) Gate 15 TARGET Report – Identity Centric Attacks: The Shift from Network to Identity as the Primary Attack Surface

May 7, 2026 in Cybersecurity, Security Preparedness

(TLP:CLEAR) CISA and Partners Release Guidance for Careful Adoption of Agentic AI Services

May 7, 2026 in Cybersecurity, Federal & State Resources, Security Preparedness

Become a Member
FAQs
About
Report Incident

Terms & Conditions
Privacy Policy
AI Policy
Contact Us

LinkedIn

1250 I Street NW, Suite 350
Washington, DC 20005
1-866-H2O-ISAC (1-866-426-4722)
© 2026 WaterISAC. All Rights Reserved.

Toggle the Widgetbar