Amazon Disrupts GRU-Affiliated APT44 Campaign Targeting Critical Infrastructure
Summary
Hide ▲
Show ▼
Amazon has disrupted a years-long Russian state-sponsored campaign targeting Western critical infrastructure, including energy sector organizations and cloud-hosted network infrastructure. The campaign, attributed to the GRU-affiliated APT44 group, initially leveraged vulnerabilities in WatchGuard Firebox and XTM, Atlassian Confluence, and Veeam to gain initial access. However, starting in 2025, APT44 shifted its tactics to target misconfigured network edge devices, reducing their exposure and resource expenditure. The group targeted enterprise routers, VPN concentrators, network management appliances, and cloud-based project management systems to harvest credentials and establish persistent access. Amazon's intervention led to the disruption of the campaign, highlighting the ongoing threat posed by state-sponsored cyber actors. APT44, also known as FROZENBARENTS, Sandworm, Seashell Blizzard, and Voodoo Bear, has been active since at least 2021. The group exploited vulnerabilities in WatchGuard Firebox and XTM (CVE-2022-26318), Atlassian Confluence (CVE-2021-26084, CVE-2023-22518), and Veeam (CVE-2023-27532) to compromise network edge devices. The campaign involved credential replay attacks and targeted energy, technology/cloud services, and telecom service providers across North America, Western and Eastern Europe, and the Middle East. Amazon's threat intelligence team identified and notified affected customers, disrupting active threat actor operations. Additionally, APT28, another GRU-affiliated group, has been conducting a sustained credential-harvesting campaign targeting users of UKR[.]net, a webmail and news service popular in Ukraine. The campaign, observed between June 2024 and April 2025, involves deploying UKR[.]net-themed login pages on legitimate services like Mocky to entice recipients into entering their credentials and 2FA codes. Links to these pages are embedded within PDF documents distributed via phishing emails, often shortened using services like tiny[.]cc or tinyurl[.]com. In some cases, APT28 uses subdomains created on platforms like Blogger (*.blogspot[.]com) to launch a two-tier redirection chain leading to the credential harvesting page. The campaign is part of a broader set of phishing and credential theft operations targeting various institutions in pursuit of Russia's strategic objectives. APT28's recent campaign targeted Turkish renewable energy scientists with a climate change policy document from a real Middle Eastern think tank. The group used phishing emails themed to match their intended targets and written in the targets' native tongues. Victims were redirected to a login page mimicking a legitimate online service after following a link in a phishing email. APT28 used regular hosted services rather than custom tools and infrastructure for their attacks. The targets included an IT integrator based in Uzbekistan, a European think tank, a military organization in North Macedonia, and scientists and researchers associated with a Turkish energy and nuclear research organization. The campaign was highly selective and consistent with GRU collection priorities, aligning with geopolitical, military, or strategic intelligence objectives. APT28 has been targeting organizations associated with energy research, defense collaboration, and government communication in a new credential-harvesting campaign. The group used phishing pages impersonating Microsoft Outlook Web Access (OWA), Google, and Sophos VPN portals. Victims were redirected to legitimate domains after entering their credentials. APT28 relied heavily on free hosting and tunneling services such as Webhook.site, InfinityFree, Byet Internet Services, and Ngrok to host phishing content, capture user data, and manage redirections. In February 2025, APT28 deployed a Microsoft OWA phishing page and used the ShortURL link-shortening service for the first-stage redirection. The group employed a webhook relying on HTML to load a PDF lure document in the browser for two seconds before redirecting the victim to a second webhook hosting the spoofed OWA login page. In July, APT28 deployed a spoofed OWA login portal containing Turkish-language text and targeting Turkish scientists and researchers. In June, APT28 deployed a spoofed Sophos VPN password reset page hosted on InfinityFree infrastructure. In September, APT28 hosted two spoofed OWA expired password pages on an InfinityFree domain. In April, Recorded Future discovered a spoofed Google password reset page in Portuguese, hosted on a free apex domain from Byet Internet Services. APT28 abused Ngrok's free service to connect servers behind a firewall to a proxy server and expose that server to the internet without changing firewall rules. APT28's ability to adapt its infrastructure and rebrand credential-harvesting pages suggests it will continue to abuse free hosting, tunneling, and link-shortening services to reduce operational costs and obscure attribution. Recently, APT28 exploited CVE-2026-21509, a recently patched vulnerability in multiple versions of Microsoft Office. The attacks involved malicious DOC files themed around EU COREPER consultations in Ukraine and impersonated the Ukrainian Hydrometeorological Center. The malicious document triggers a WebDAV-based download chain that installs malware via COM hijacking, a malicious DLL (EhStoreShell.dll), shellcode hidden in an image file (SplashScreen.png), and a scheduled task (OneDriveHealth). The scheduled task execution leads to the termination and restart of the explorer.exe process, ensuring the loading of the EhStoreShell.dll file. This DLL executes shellcode from the image file, which launches the COVENANT software (framework) on the computer. COVENANT uses the Filen (filen.io) cloud storage service for command-and-control (C2) operations. APT28 used three more documents in attacks against various EU-based organizations, indicating that the campaign extends beyond Ukraine. APT28 has also been linked to the exploitation of CVE-2026-21513, a high-severity security feature bypass in the MSHTML Framework, as a zero-day before it was patched in February 2026. The vulnerability allows an attacker to bypass security features by manipulating browser and Windows Shell handling, leading to potential code execution. The group used a malicious Windows Shortcut (LNK) file that embeds an HTML file to exploit CVE-2026-21513, initiating communication with the domain wellnesscaremed[.]com. The exploit leverages nested iframes and multiple DOM contexts to manipulate trust boundaries, bypassing Mark-of-the-Web (MotW) and Internet Explorer Enhanced Security Configuration (IE ESC). The technique allows execution of malicious code outside the browser sandbox via ShellExecuteExW. The vulnerable code path can be triggered through any component embedding MSHTML, suggesting additional delivery mechanisms beyond LNK-based phishing should be expected. APT28, also known as Fancy Bear, Forest Blizzard, Strontium, and Sednit, has been using a custom variant of the open-source Covenant post-exploitation framework for long-term espionage operations. Since April 2024, APT28 has used two implants named BeardShell and Covenant in their attacks. BeardShell leverages the legitimate cloud storage service Icedrive for command-and-control (C2) communication and can execute PowerShell commands in a .NET runtime environment. BeardShell uses a unique obfuscation technique previously seen in Xtunnel, a network-pivoting tool that APT28 used in the 2010s. APT28 has modified the Covenant framework with deterministic implant identifiers tied to host characteristics, modified execution flow to evade behavioral detection, and new cloud-based communication protocols. Since July 2025, APT28 has used the Filen cloud provider with Covenant, previously using Koofr and pCloud services. Covenant is used as the primary implant, and BeardShell serves as the fallback tool. ESET believes that APT28's advanced malware development team returned to activity in 2024, giving the threat group new long-term espionage capabilities. The technical similarities with 2010-era malware indicate continuity in the threat group's development team. APT28 has been observed using a pair of implants dubbed BEARDSHELL and COVENANT to facilitate long-term surveillance of Ukrainian military personnel. The two malware families have been put to use since April 2024. APT28's malware arsenal consists of tools like BEARDSHELL and COVENANT, along with another program codenamed SLIMAGENT that's capable of logging keystrokes, capturing screenshots, and collecting clipboard data. SLIMAGENT was first publicly documented by the Computer Emergency Response Team of Ukraine (CERT-UA) in June 2025. SLIMAGENT has its roots in XAgent, another implant used by APT28 in the 2010s to facilitate remote control and data exfiltration. This is based on code similarities discovered between SLIMAGENT and previously unknown samples deployed in attacks targeting governmental entities in two European countries as far back as 2018. It's assessed that the 2018 artifacts and the 2024 SLIMAGENT sample originated from XAgent, with ESET's analysis uncovering overlaps in the keylogging between SLIMAGENT and an XAgent sample detected in the wild in late 2014. SLIMAGENT emits its espionage logs in the HTML format, with the application name, the logged keystrokes, and the window name in blue, red, and green, respectively. Also deployed in connection with SLIMAGENT is another backdoor referred to as BEARDSHELL that's capable of executing PowerShell commands on compromised hosts. It uses the legitimate cloud storage service Icedrive for command-and-control (C2). A noteworthy aspect of the malware is that it utilizes a distinctive obfuscation technique referred to as opaque predicate, which is also found in XTunnel (aka X-Tunnel), a network traversal and pivoting tool used by APT28 in the 2016 Democratic National Committee (DNC) hack. The tool provides a secure tunnel to an external C2 server. A third major piece of the threat actor's toolkit is COVENANT, an open-source .NET post-exploitation framework that has been "heavily" modified to support long-term espionage and to implement a new cloud-based network protocol that abuses the Filen cloud storage service for C2 since July 2025. Previously, APT28's COVENANT variant was said to have used pCloud (in 2023) and Koofr (in 2024-2025). This is not the first time the adversarial collective has embraced the dual-implant strategy. In 2021, Trellix revealed that APT28 deployed Graphite, a backdoor that employed OneDrive for C2, and PowerShell Empire in attacks targeting high-ranking government officials overseeing national security policy and individuals in the defense sector in Western Asia.
Timeline
-
09.01.2026 09:00 1 articles · 2mo ago
APT28 targets organizations in Balkans, Middle East, and Central Asia
APT28 conducted a credential-harvesting campaign targeting specific organizations in the Balkans, the Middle East, and Central Asia. The campaign involved phishing emails themed to match the intended targets and written in their native tongues. Victims were redirected to login pages mimicking legitimate online services after following links in the phishing emails. APT28 used regular hosted services rather than custom tools and infrastructure for their attacks. The targets included an IT integrator based in Uzbekistan, a European think tank, a military organization in North Macedonia, and scientists and researchers associated with a Turkish energy and nuclear research organization. The campaign was highly selective and consistent with GRU collection priorities, aligning with geopolitical, military, or strategic intelligence objectives.
Show sources
- Notorious Russian APT Nabs Credentials From Global Targets — www.darkreading.com — 09.01.2026 09:00
-
17.12.2025 17:30 9 articles · 2mo ago
APT28 conducts sustained credential-harvesting campaign targeting UKR[.]net users
APT28 targeted Turkish renewable energy scientists with a climate change policy document from a real Middle Eastern think tank. The group used phishing emails themed to match their intended targets and written in the targets' native tongues. Victims were redirected to a login page mimicking a legitimate online service after following a link in a phishing email. APT28 used regular hosted services rather than custom tools and infrastructure for their attacks. The targets included an IT integrator based in Uzbekistan, a European think tank, a military organization in North Macedonia, and scientists and researchers associated with a Turkish energy and nuclear research organization. The campaign was highly selective and consistent with GRU collection priorities, aligning with geopolitical, military, or strategic intelligence objectives. APT28 has been targeting organizations associated with energy research, defense collaboration, and government communication in a new credential-harvesting campaign. The group used phishing pages impersonating Microsoft Outlook Web Access (OWA), Google, and Sophos VPN portals. Victims were redirected to legitimate domains after entering their credentials. APT28 relied heavily on free hosting and tunneling services such as Webhook.site, InfinityFree, Byet Internet Services, and Ngrok to host phishing content, capture user data, and manage redirections. In February 2025, APT28 deployed a Microsoft OWA phishing page and used the ShortURL link-shortening service for the first-stage redirection. The group employed a webhook relying on HTML to load a PDF lure document in the browser for two seconds before redirecting the victim to a second webhook hosting the spoofed OWA login page. In July, APT28 deployed a spoofed OWA login portal containing Turkish-language text and targeting Turkish scientists and researchers. In June, APT28 deployed a spoofed Sophos VPN password reset page hosted on InfinityFree infrastructure. In September, APT28 hosted two spoofed OWA expired password pages on an InfinityFree domain. In April, Recorded Future discovered a spoofed Google password reset page in Portuguese, hosted on a free apex domain from Byet Internet Services. APT28 abused Ngrok's free service to connect servers behind a firewall to a proxy server and expose that server to the internet without changing firewall rules. APT28's ability to adapt its infrastructure and rebrand credential-harvesting pages suggests it will continue to abuse free hosting, tunneling, and link-shortening services to reduce operational costs and obscure attribution. Recently, APT28 exploited CVE-2026-21509, a recently patched vulnerability in multiple versions of Microsoft Office. The attacks involved malicious DOC files themed around EU COREPER consultations in Ukraine and impersonated the Ukrainian Hydrometeorological Center. The malicious document triggers a WebDAV-based download chain that installs malware via COM hijacking, a malicious DLL (EhStoreShell.dll), shellcode hidden in an image file (SplashScreen.png), and a scheduled task (OneDriveHealth). The scheduled task execution leads to the termination and restart of the explorer.exe process, ensuring the loading of the EhStoreShell.dll file. This DLL executes shellcode from the image file, which launches the COVENANT software (framework) on the computer. COVENANT uses the Filen (filen.io) cloud storage service for command-and-control (C2) operations. APT28 used three more documents in attacks against various EU-based organizations, indicating that the campaign extends beyond Ukraine. APT28 has also been linked to the exploitation of CVE-2026-21513, a high-severity security feature bypass in the MSHTML Framework, as a zero-day before it was patched in February 2026. The vulnerability allows an attacker to bypass security features by manipulating browser and Windows Shell handling, leading to potential code execution. The group used a malicious Windows Shortcut (LNK) file that embeds an HTML file to exploit CVE-2026-21513, initiating communication with the domain wellnesscaremed[.]com. The exploit leverages nested iframes and multiple DOM contexts to manipulate trust boundaries, bypassing Mark-of-the-Web (MotW) and Internet Explorer Enhanced Security Configuration (IE ESC). The technique allows execution of malicious code outside the browser sandbox via ShellExecuteExW. The vulnerable code path can be triggered through any component embedding MSHTML, suggesting additional delivery mechanisms beyond LNK-based phishing should be expected. APT28, also known as Fancy Bear, Forest Blizzard, Strontium, and Sednit, has been using a custom variant of the open-source Covenant post-exploitation framework for long-term espionage operations. Since April 2024, APT28 has used two implants named BeardShell and Covenant in their attacks. BeardShell leverages the legitimate cloud storage service Icedrive for command-and-control (C2) communication and can execute PowerShell commands in a .NET runtime environment. BeardShell uses a unique obfuscation technique previously seen in Xtunnel, a network-pivoting tool that APT28 used in the 2010s. APT28 has modified the Covenant framework with deterministic implant identifiers tied to host characteristics, modified execution flow to evade behavioral detection, and new cloud-based communication protocols. Since July 2025, APT28 has used the Filen cloud provider with Covenant, previously using Koofr and pCloud services. Covenant is used as the primary implant, and BeardShell serves as the fallback tool. ESET believes that APT28's advanced malware development team returned to activity in 2024, giving the threat group new long-term espionage capabilities. The technical similarities with 2010-era malware indicate continuity in the threat group's development team. APT28 has been observed using a pair of implants dubbed BEARDSHELL and COVENANT to facilitate long-term surveillance of Ukrainian military personnel. The two malware families have been put to use since April 2024. APT28's malware arsenal consists of tools like BEARDSHELL and COVENANT, along with another program codenamed SLIMAGENT that's capable of logging keystrokes, capturing screenshots, and collecting clipboard data. SLIMAGENT was first publicly documented by the Computer Emergency Response Team of Ukraine (CERT-UA) in June 2025. SLIMAGENT has its roots in XAgent, another implant used by APT28 in the 2010s to facilitate remote control and data exfiltration. This is based on code similarities discovered between SLIMAGENT and previously unknown samples deployed in attacks targeting governmental entities in two European countries as far back as 2018. It's assessed that the 2018 artifacts and the 2024 SLIMAGENT sample originated from XAgent, with ESET's analysis uncovering overlaps in the keylogging between SLIMAGENT and an XAgent sample detected in the wild in late 2014. SLIMAGENT emits its espionage logs in the HTML format, with the application name, the logged keystrokes, and the window name in blue, red, and green, respectively. Also deployed in connection with SLIMAGENT is another backdoor referred to as BEARDSHELL that's capable of executing PowerShell commands on compromised hosts. It uses the legitimate cloud storage service Icedrive for command-and-control (C2). A noteworthy aspect of the malware is that it utilizes a distinctive obfuscation technique referred to as opaque predicate, which is also found in XTunnel (aka X-Tunnel), a network traversal and pivoting tool used by APT28 in the 2016 Democratic National Committee (DNC) hack. The tool provides a secure tunnel to an external C2 server. A third major piece of the threat actor's toolkit is COVENANT, an open-source .NET post-exploitation framework that has been "heavily" modified to support long-term espionage and to implement a new cloud-based network protocol that abuses the Filen cloud storage service for C2 since July 2025. Previously, APT28's COVENANT variant was said to have used pCloud (in 2023) and Koofr (in 2024-2025). This is not the first time the adversarial collective has embraced the dual-implant strategy. In 2021, Trellix revealed that APT28 deployed Graphite, a backdoor that employed OneDrive for C2, and PowerShell Empire in attacks targeting high-ranking government officials overseeing national security policy and individuals in the defense sector in Western Asia.
Show sources
- APT28 Targets Ukrainian UKR-net Users in Long-Running Credential Phishing Campaign — thehackernews.com — 17.12.2025 17:30
- Notorious Russian APT Nabs Credentials From Global Targets — www.darkreading.com — 09.01.2026 09:00
- Russian APT28 Runs Credential-Stealing Campaign Targeting Energy and Policy Organizations — thehackernews.com — 09.01.2026 17:28
- Russia’s APT28 Targeting Energy Research, Defense Collaboration Entities — www.securityweek.com — 12.01.2026 14:23
- Russian hackers exploit recently patched Microsoft Office bug in attacks — www.bleepingcomputer.com — 02.02.2026 23:00
- APT28 Uses Microsoft Office CVE-2026-21509 in Espionage-Focused Malware Attacks — thehackernews.com — 03.02.2026 11:12
- APT28 Tied to CVE-2026-21513 MSHTML 0-Day Exploited Before Feb 2026 Patch Tuesday — thehackernews.com — 02.03.2026 12:36
- APT28 hackers deploy customized variant of Covenant open-source tool — www.bleepingcomputer.com — 10.03.2026 12:00
- APT28 Uses BEARDSHELL and COVENANT Malware to Spy on Ukrainian Military — thehackernews.com — 10.03.2026 12:55
-
16.12.2025 14:27 5 articles · 2mo ago
APT44 targets Western critical infrastructure with misconfigured network edge devices
The campaign targeted critical organizations in North America, Europe, and the Middle East, with a notable focus on the energy sector. Attackers targeted enterprise routers, routing infrastructure, VPN concentrators, network management appliances, collaboration platforms, and cloud-based project management systems. The shift toward targeting misconfigured network edge devices began gradually between 2021 and 2025. In 2021, the threat cluster exploited WatchGuard flaw CVE-2022-26318. Between 2022 and 2023, threat actors targeted Confluence vulnerabilities CVE-2021-26084 and CVE-2023-22518. In 2024, attackers targeted Veeam flaw CVE-2023-27532. The primary credential extraction mechanism appeared to be packet capture and traffic analysis. Amazon identified and notified customers with compromised network appliances, enabled remediation of compromised EC2 resources, shared intelligence with partners and affected vendors, and reported observations to network appliance vendors.
Show sources
- Amazon Exposes Years-Long GRU Cyber Campaign Targeting Energy and Cloud Infrastructure — thehackernews.com — 16.12.2025 14:27
- Amazon: Russian Hackers Now Favor Misconfigurations in Critical Infrastructure Attacks — www.securityweek.com — 16.12.2025 15:22
- Amazon disrupts Russian GRU hackers attacking edge network devices — www.bleepingcomputer.com — 16.12.2025 22:13
- Russia Hits Critical Orgs Via Misconfigured Edge Devices — www.darkreading.com — 16.12.2025 22:03
- APT28 Targets Ukrainian UKR-net Users in Long-Running Credential Phishing Campaign — thehackernews.com — 17.12.2025 17:30
-
29.08.2025 16:22 2 articles · 6mo ago
Amazon disrupts APT29 watering hole campaign targeting Microsoft device code authentication
The campaign targeted Microsoft 365 accounts and data. APT29 has previously targeted European embassies, Hewlett Packard Enterprise, and TeamViewer. Amazon's threat intelligence team discovered the domain names used in the watering hole campaign. The campaign used a cookie-based system to prevent the same user from being redirected multiple times. Amazon isolated the EC2 instances used by the threat actor and partnered with Cloudflare and Microsoft to disrupt the identified domains. APT29 attempted to move its infrastructure to another cloud provider and registered new domain names. The campaign reflects an evolution in APT29's technical approach, no longer relying on domains that impersonate AWS or social engineering attempts to bypass multi-factor authentication (MFA).
Show sources
- Amazon Disrupts APT29 Watering Hole Campaign Abusing Microsoft Device Code Authentication — thehackernews.com — 29.08.2025 16:22
- Amazon disrupts Russian APT29 hackers targeting Microsoft 365 — www.bleepingcomputer.com — 01.09.2025 18:35
Information Snippets
-
APT29, also known as BlueBravo, Cloaked Ursa, CozyLarch, Cozy Bear, Earth Koshchei, ICECAP, Midnight Blizzard, and The Dukes, is a state-sponsored hacking group tied to Russia's Foreign Intelligence Service (SVR).
First reported: 29.08.2025 16:222 sources, 3 articlesShow sources
- Amazon Disrupts APT29 Watering Hole Campaign Abusing Microsoft Device Code Authentication — thehackernews.com — 29.08.2025 16:22
- Amazon disrupts Russian APT29 hackers targeting Microsoft 365 — www.bleepingcomputer.com — 01.09.2025 18:35
- Amazon Exposes Years-Long GRU Cyber Campaign Targeting Energy and Cloud Infrastructure — thehackernews.com — 16.12.2025 14:27
-
The campaign used compromised websites to redirect visitors to malicious infrastructure designed to trick users into authorizing attacker-controlled devices through Microsoft's device code authentication flow.
First reported: 29.08.2025 16:222 sources, 2 articlesShow sources
- Amazon Disrupts APT29 Watering Hole Campaign Abusing Microsoft Device Code Authentication — thehackernews.com — 29.08.2025 16:22
- Amazon disrupts Russian APT29 hackers targeting Microsoft 365 — www.bleepingcomputer.com — 01.09.2025 18:35
-
APT29 has been linked to attacks leveraging malicious Remote Desktop Protocol (RDP) configuration files to target Ukrainian entities and exfiltrate sensitive data.
First reported: 29.08.2025 16:221 source, 1 articleShow sources
- Amazon Disrupts APT29 Watering Hole Campaign Abusing Microsoft Device Code Authentication — thehackernews.com — 29.08.2025 16:22
-
The adversarial collective has been observed adopting various phishing methods, including device code phishing and device join phishing, to obtain unauthorized access to Microsoft 365 accounts.
First reported: 29.08.2025 16:221 source, 1 articleShow sources
- Amazon Disrupts APT29 Watering Hole Campaign Abusing Microsoft Device Code Authentication — thehackernews.com — 29.08.2025 16:22
-
The campaign involved injecting JavaScript into compromised websites to redirect approximately 10% of visitors to actor-controlled domains.
First reported: 29.08.2025 16:222 sources, 2 articlesShow sources
- Amazon Disrupts APT29 Watering Hole Campaign Abusing Microsoft Device Code Authentication — thehackernews.com — 29.08.2025 16:22
- Amazon disrupts Russian APT29 hackers targeting Microsoft 365 — www.bleepingcomputer.com — 01.09.2025 18:35
-
The actor-controlled domains mimicked Cloudflare verification pages to deceive users into entering legitimate device codes, granting attackers access to Microsoft accounts and data.
First reported: 29.08.2025 16:222 sources, 2 articlesShow sources
- Amazon Disrupts APT29 Watering Hole Campaign Abusing Microsoft Device Code Authentication — thehackernews.com — 29.08.2025 16:22
- Amazon disrupts Russian APT29 hackers targeting Microsoft 365 — www.bleepingcomputer.com — 01.09.2025 18:35
-
The campaign employed evasion techniques such as Base64 encoding to conceal malicious code, setting cookies to prevent repeated redirects of the same visitor, and shifting to new infrastructure when blocked.
First reported: 29.08.2025 16:222 sources, 2 articlesShow sources
- Amazon Disrupts APT29 Watering Hole Campaign Abusing Microsoft Device Code Authentication — thehackernews.com — 29.08.2025 16:22
- Amazon disrupts Russian APT29 hackers targeting Microsoft 365 — www.bleepingcomputer.com — 01.09.2025 18:35
-
Amazon's intervention led to the disruption of the campaign, despite APT29's attempts to migrate to new infrastructure.
First reported: 29.08.2025 16:222 sources, 2 articlesShow sources
- Amazon Disrupts APT29 Watering Hole Campaign Abusing Microsoft Device Code Authentication — thehackernews.com — 29.08.2025 16:22
- Amazon disrupts Russian APT29 hackers targeting Microsoft 365 — www.bleepingcomputer.com — 01.09.2025 18:35
-
The campaign targeted Microsoft 365 accounts and data.
First reported: 01.09.2025 18:351 source, 1 articleShow sources
- Amazon disrupts Russian APT29 hackers targeting Microsoft 365 — www.bleepingcomputer.com — 01.09.2025 18:35
-
APT29 has previously targeted European embassies, Hewlett Packard Enterprise, and TeamViewer.
First reported: 01.09.2025 18:351 source, 1 articleShow sources
- Amazon disrupts Russian APT29 hackers targeting Microsoft 365 — www.bleepingcomputer.com — 01.09.2025 18:35
-
Amazon's threat intelligence team discovered the domain names used in the watering hole campaign.
First reported: 01.09.2025 18:351 source, 1 articleShow sources
- Amazon disrupts Russian APT29 hackers targeting Microsoft 365 — www.bleepingcomputer.com — 01.09.2025 18:35
-
The campaign used a cookie-based system to prevent the same user from being redirected multiple times.
First reported: 01.09.2025 18:352 sources, 2 articlesShow sources
- Amazon disrupts Russian APT29 hackers targeting Microsoft 365 — www.bleepingcomputer.com — 01.09.2025 18:35
- Russia Hits Critical Orgs Via Misconfigured Edge Devices — www.darkreading.com — 16.12.2025 22:03
-
Amazon isolated the EC2 instances used by the threat actor and partnered with Cloudflare and Microsoft to disrupt the identified domains.
First reported: 01.09.2025 18:351 source, 1 articleShow sources
- Amazon disrupts Russian APT29 hackers targeting Microsoft 365 — www.bleepingcomputer.com — 01.09.2025 18:35
-
APT29 attempted to move its infrastructure to another cloud provider and registered new domain names.
First reported: 01.09.2025 18:351 source, 1 articleShow sources
- Amazon disrupts Russian APT29 hackers targeting Microsoft 365 — www.bleepingcomputer.com — 01.09.2025 18:35
-
The campaign reflects an evolution in APT29's technical approach, no longer relying on domains that impersonate AWS or social engineering attempts to bypass multi-factor authentication (MFA).
First reported: 01.09.2025 18:351 source, 1 articleShow sources
- Amazon disrupts Russian APT29 hackers targeting Microsoft 365 — www.bleepingcomputer.com — 01.09.2025 18:35
-
Users are advised to verify device authorization requests, enable multi-factor authentication (MFA), and avoid executing commands copied from webpages.
First reported: 01.09.2025 18:351 source, 1 articleShow sources
- Amazon disrupts Russian APT29 hackers targeting Microsoft 365 — www.bleepingcomputer.com — 01.09.2025 18:35
-
Administrators should disable unnecessary device authorization flaws, enforce conditional access policies, and monitor for suspicious authentication events.
First reported: 01.09.2025 18:351 source, 1 articleShow sources
- Amazon disrupts Russian APT29 hackers targeting Microsoft 365 — www.bleepingcomputer.com — 01.09.2025 18:35
-
Amazon's infrastructure and services were not compromised by the campaign.
First reported: 01.09.2025 18:351 source, 1 articleShow sources
- Amazon disrupts Russian APT29 hackers targeting Microsoft 365 — www.bleepingcomputer.com — 01.09.2025 18:35
-
APT44, also known as FROZENBARENTS, Sandworm, Seashell Blizzard, and Voodoo Bear, is a GRU-affiliated cyber threat group.
First reported: 16.12.2025 14:273 sources, 4 articlesShow sources
- Amazon Exposes Years-Long GRU Cyber Campaign Targeting Energy and Cloud Infrastructure — thehackernews.com — 16.12.2025 14:27
- Amazon: Russian Hackers Now Favor Misconfigurations in Critical Infrastructure Attacks — www.securityweek.com — 16.12.2025 15:22
- Amazon disrupts Russian GRU hackers attacking edge network devices — www.bleepingcomputer.com — 16.12.2025 22:13
- APT28 Targets Ukrainian UKR-net Users in Long-Running Credential Phishing Campaign — thehackernews.com — 17.12.2025 17:30
-
APT44 targeted Western critical infrastructure, including energy sector organizations, between 2021 and 2025.
First reported: 16.12.2025 14:274 sources, 5 articlesShow sources
- Amazon Exposes Years-Long GRU Cyber Campaign Targeting Energy and Cloud Infrastructure — thehackernews.com — 16.12.2025 14:27
- Amazon: Russian Hackers Now Favor Misconfigurations in Critical Infrastructure Attacks — www.securityweek.com — 16.12.2025 15:22
- Amazon disrupts Russian GRU hackers attacking edge network devices — www.bleepingcomputer.com — 16.12.2025 22:13
- Russia Hits Critical Orgs Via Misconfigured Edge Devices — www.darkreading.com — 16.12.2025 22:03
- APT28 Targets Ukrainian UKR-net Users in Long-Running Credential Phishing Campaign — thehackernews.com — 17.12.2025 17:30
-
APT44 exploited misconfigured customer network edge devices as initial access vectors.
First reported: 16.12.2025 14:274 sources, 4 articlesShow sources
- Amazon Exposes Years-Long GRU Cyber Campaign Targeting Energy and Cloud Infrastructure — thehackernews.com — 16.12.2025 14:27
- Amazon: Russian Hackers Now Favor Misconfigurations in Critical Infrastructure Attacks — www.securityweek.com — 16.12.2025 15:22
- Amazon disrupts Russian GRU hackers attacking edge network devices — www.bleepingcomputer.com — 16.12.2025 22:13
- Russia Hits Critical Orgs Via Misconfigured Edge Devices — www.darkreading.com — 16.12.2025 22:03
-
APT44 leveraged vulnerabilities in WatchGuard Firebox and XTM (CVE-2022-26318), Atlassian Confluence (CVE-2021-26084, CVE-2023-22518), and Veeam (CVE-2023-27532).
First reported: 16.12.2025 14:274 sources, 4 articlesShow sources
- Amazon Exposes Years-Long GRU Cyber Campaign Targeting Energy and Cloud Infrastructure — thehackernews.com — 16.12.2025 14:27
- Amazon: Russian Hackers Now Favor Misconfigurations in Critical Infrastructure Attacks — www.securityweek.com — 16.12.2025 15:22
- Amazon disrupts Russian GRU hackers attacking edge network devices — www.bleepingcomputer.com — 16.12.2025 22:13
- Russia Hits Critical Orgs Via Misconfigured Edge Devices — www.darkreading.com — 16.12.2025 22:03
-
APT44 targeted enterprise routers, VPN concentrators, network management appliances, and cloud-based project management systems.
First reported: 16.12.2025 14:274 sources, 4 articlesShow sources
- Amazon Exposes Years-Long GRU Cyber Campaign Targeting Energy and Cloud Infrastructure — thehackernews.com — 16.12.2025 14:27
- Amazon: Russian Hackers Now Favor Misconfigurations in Critical Infrastructure Attacks — www.securityweek.com — 16.12.2025 15:22
- Amazon disrupts Russian GRU hackers attacking edge network devices — www.bleepingcomputer.com — 16.12.2025 22:13
- Russia Hits Critical Orgs Via Misconfigured Edge Devices — www.darkreading.com — 16.12.2025 22:03
-
APT44 conducted credential replay attacks against victim organizations' online services.
First reported: 16.12.2025 14:274 sources, 4 articlesShow sources
- Amazon Exposes Years-Long GRU Cyber Campaign Targeting Energy and Cloud Infrastructure — thehackernews.com — 16.12.2025 14:27
- Amazon: Russian Hackers Now Favor Misconfigurations in Critical Infrastructure Attacks — www.securityweek.com — 16.12.2025 15:22
- Amazon disrupts Russian GRU hackers attacking edge network devices — www.bleepingcomputer.com — 16.12.2025 22:13
- Russia Hits Critical Orgs Via Misconfigured Edge Devices — www.darkreading.com — 16.12.2025 22:03
-
APT44's activities were linked to infrastructure overlaps with the Curly COMrades cluster tracked by Bitdefender.
First reported: 16.12.2025 14:274 sources, 4 articlesShow sources
- Amazon Exposes Years-Long GRU Cyber Campaign Targeting Energy and Cloud Infrastructure — thehackernews.com — 16.12.2025 14:27
- Amazon: Russian Hackers Now Favor Misconfigurations in Critical Infrastructure Attacks — www.securityweek.com — 16.12.2025 15:22
- Amazon disrupts Russian GRU hackers attacking edge network devices — www.bleepingcomputer.com — 16.12.2025 22:13
- Russia Hits Critical Orgs Via Misconfigured Edge Devices — www.darkreading.com — 16.12.2025 22:03
-
Amazon identified and notified affected customers and disrupted active threat actor operations targeting its cloud services.
First reported: 16.12.2025 14:274 sources, 4 articlesShow sources
- Amazon Exposes Years-Long GRU Cyber Campaign Targeting Energy and Cloud Infrastructure — thehackernews.com — 16.12.2025 14:27
- Amazon: Russian Hackers Now Favor Misconfigurations in Critical Infrastructure Attacks — www.securityweek.com — 16.12.2025 15:22
- Amazon disrupts Russian GRU hackers attacking edge network devices — www.bleepingcomputer.com — 16.12.2025 22:13
- Russia Hits Critical Orgs Via Misconfigured Edge Devices — www.darkreading.com — 16.12.2025 22:03
-
APT44 has shifted focus from exploiting vulnerabilities to targeting misconfigured network edge devices starting in 2025.
First reported: 16.12.2025 15:223 sources, 3 articlesShow sources
- Amazon: Russian Hackers Now Favor Misconfigurations in Critical Infrastructure Attacks — www.securityweek.com — 16.12.2025 15:22
- Amazon disrupts Russian GRU hackers attacking edge network devices — www.bleepingcomputer.com — 16.12.2025 22:13
- Russia Hits Critical Orgs Via Misconfigured Edge Devices — www.darkreading.com — 16.12.2025 22:03
-
APT44 leveraged native packet-capture capabilities to intercept traffic and collect credentials.
First reported: 16.12.2025 15:223 sources, 3 articlesShow sources
- Amazon: Russian Hackers Now Favor Misconfigurations in Critical Infrastructure Attacks — www.securityweek.com — 16.12.2025 15:22
- Amazon disrupts Russian GRU hackers attacking edge network devices — www.bleepingcomputer.com — 16.12.2025 22:13
- Russia Hits Critical Orgs Via Misconfigured Edge Devices — www.darkreading.com — 16.12.2025 22:03
-
Amazon's monitoring of attacks was facilitated by the fact that targeted network edge devices were hosted on AWS.
First reported: 16.12.2025 15:223 sources, 3 articlesShow sources
- Amazon: Russian Hackers Now Favor Misconfigurations in Critical Infrastructure Attacks — www.securityweek.com — 16.12.2025 15:22
- Amazon disrupts Russian GRU hackers attacking edge network devices — www.bleepingcomputer.com — 16.12.2025 22:13
- Russia Hits Critical Orgs Via Misconfigured Edge Devices — www.darkreading.com — 16.12.2025 22:03
-
Amazon Threat Intelligence team disrupted active operations attributed to GRU hackers targeting cloud infrastructure.
First reported: 16.12.2025 22:032 sources, 2 articlesShow sources
- Amazon disrupts Russian GRU hackers attacking edge network devices — www.bleepingcomputer.com — 16.12.2025 22:13
- Russia Hits Critical Orgs Via Misconfigured Edge Devices — www.darkreading.com — 16.12.2025 22:03
-
GRU hackers targeted Western critical infrastructure, especially the energy sector, starting in 2021.
First reported: 16.12.2025 22:032 sources, 2 articlesShow sources
- Amazon disrupts Russian GRU hackers attacking edge network devices — www.bleepingcomputer.com — 16.12.2025 22:13
- Russia Hits Critical Orgs Via Misconfigured Edge Devices — www.darkreading.com — 16.12.2025 22:03
-
Threat actor shifted from exploiting vulnerabilities to leveraging misconfigured edge devices for initial access.
First reported: 16.12.2025 22:032 sources, 2 articlesShow sources
- Amazon disrupts Russian GRU hackers attacking edge network devices — www.bleepingcomputer.com — 16.12.2025 22:13
- Russia Hits Critical Orgs Via Misconfigured Edge Devices — www.darkreading.com — 16.12.2025 22:03
-
Up to 2024, the campaign exploited vulnerabilities in WatchGuard, Confluence, and Veeam as primary initial access vectors.
First reported: 16.12.2025 22:032 sources, 2 articlesShow sources
- Amazon disrupts Russian GRU hackers attacking edge network devices — www.bleepingcomputer.com — 16.12.2025 22:13
- Russia Hits Critical Orgs Via Misconfigured Edge Devices — www.darkreading.com — 16.12.2025 22:03
-
In 2025, the threat actor relied less on vulnerabilities and more on targeting misconfigured customer network edge devices.
First reported: 16.12.2025 22:032 sources, 2 articlesShow sources
- Amazon disrupts Russian GRU hackers attacking edge network devices — www.bleepingcomputer.com — 16.12.2025 22:13
- Russia Hits Critical Orgs Via Misconfigured Edge Devices — www.darkreading.com — 16.12.2025 22:03
-
Targeted devices included enterprise routers, VPN gateways, network management appliances, collaboration platforms, and cloud-based project management solutions.
First reported: 16.12.2025 22:032 sources, 2 articlesShow sources
- Amazon disrupts Russian GRU hackers attacking edge network devices — www.bleepingcomputer.com — 16.12.2025 22:13
- Russia Hits Critical Orgs Via Misconfigured Edge Devices — www.darkreading.com — 16.12.2025 22:03
-
Threat actor's shift in operational tempo represents a concerning evolution, maintaining focus on misconfigured devices while reducing investment in zero-day and N-day exploitation.
First reported: 16.12.2025 22:032 sources, 2 articlesShow sources
- Amazon disrupts Russian GRU hackers attacking edge network devices — www.bleepingcomputer.com — 16.12.2025 22:13
- Russia Hits Critical Orgs Via Misconfigured Edge Devices — www.darkreading.com — 16.12.2025 22:03
-
Tactical evolution did not reflect any change in the group's operational objectives: stealing credentials and moving laterally on the victim network with minimal exposure and resources.
First reported: 16.12.2025 22:032 sources, 2 articlesShow sources
- Amazon disrupts Russian GRU hackers attacking edge network devices — www.bleepingcomputer.com — 16.12.2025 22:13
- Russia Hits Critical Orgs Via Misconfigured Edge Devices — www.darkreading.com — 16.12.2025 22:03
-
Based on targeting patterns and overlaps in infrastructure, Amazon assesses with high confidence that the observed attacks were carried out by hackers working for the Russian GRU.
First reported: 16.12.2025 22:033 sources, 3 articlesShow sources
- Amazon disrupts Russian GRU hackers attacking edge network devices — www.bleepingcomputer.com — 16.12.2025 22:13
- Russia Hits Critical Orgs Via Misconfigured Edge Devices — www.darkreading.com — 16.12.2025 22:03
- APT28 Targets Ukrainian UKR-net Users in Long-Running Credential Phishing Campaign — thehackernews.com — 17.12.2025 17:30
-
Amazon believes that the Curly COMRades hackers may be tasked with post-compromise activity in a broader GRU campaign involving multiple specialized subclusters.
First reported: 16.12.2025 22:032 sources, 2 articlesShow sources
- Amazon disrupts Russian GRU hackers attacking edge network devices — www.bleepingcomputer.com — 16.12.2025 22:13
- Russia Hits Critical Orgs Via Misconfigured Edge Devices — www.darkreading.com — 16.12.2025 22:03
-
Evidence points to passive packet capturing and traffic interception for credential harvesting.
First reported: 16.12.2025 22:032 sources, 2 articlesShow sources
- Amazon disrupts Russian GRU hackers attacking edge network devices — www.bleepingcomputer.com — 16.12.2025 22:13
- Russia Hits Critical Orgs Via Misconfigured Edge Devices — www.darkreading.com — 16.12.2025 22:03
-
Compromised devices were customer-managed network appliances hosted on AWS EC2 instances, with no flaws in the AWS service itself.
First reported: 16.12.2025 22:032 sources, 2 articlesShow sources
- Amazon disrupts Russian GRU hackers attacking edge network devices — www.bleepingcomputer.com — 16.12.2025 22:13
- Russia Hits Critical Orgs Via Misconfigured Edge Devices — www.darkreading.com — 16.12.2025 22:03
-
Amazon took immediate action to protect compromised EC2 instances, notified affected customers, and shared intelligence with impacted vendors and industry partners.
First reported: 16.12.2025 22:032 sources, 2 articlesShow sources
- Amazon disrupts Russian GRU hackers attacking edge network devices — www.bleepingcomputer.com — 16.12.2025 22:13
- Russia Hits Critical Orgs Via Misconfigured Edge Devices — www.darkreading.com — 16.12.2025 22:03
-
Amazon disrupted active threat actor operations and reduced the attack surface available to this threat activity subcluster.
First reported: 16.12.2025 22:032 sources, 2 articlesShow sources
- Amazon disrupts Russian GRU hackers attacking edge network devices — www.bleepingcomputer.com — 16.12.2025 22:13
- Russia Hits Critical Orgs Via Misconfigured Edge Devices — www.darkreading.com — 16.12.2025 22:03
-
Amazon shared offending IP addresses but warned against blocking them without first conducting a contextual investigation.
First reported: 16.12.2025 22:032 sources, 2 articlesShow sources
- Amazon disrupts Russian GRU hackers attacking edge network devices — www.bleepingcomputer.com — 16.12.2025 22:13
- Russia Hits Critical Orgs Via Misconfigured Edge Devices — www.darkreading.com — 16.12.2025 22:03
-
Amazon recommended auditing network devices, watching for credential replay activity, and monitoring access to administrative portals.
First reported: 16.12.2025 22:032 sources, 2 articlesShow sources
- Amazon disrupts Russian GRU hackers attacking edge network devices — www.bleepingcomputer.com — 16.12.2025 22:13
- Russia Hits Critical Orgs Via Misconfigured Edge Devices — www.darkreading.com — 16.12.2025 22:03
-
In AWS environments, it is recommended to isolate management interfaces, restrict security groups, and enable CloudTrail, GuardDuty, and VPC Flow Logs.
First reported: 16.12.2025 22:032 sources, 2 articlesShow sources
- Amazon disrupts Russian GRU hackers attacking edge network devices — www.bleepingcomputer.com — 16.12.2025 22:13
- Russia Hits Critical Orgs Via Misconfigured Edge Devices — www.darkreading.com — 16.12.2025 22:03
-
The campaign targeted critical organizations in North America, Europe, and the Middle East, with a notable focus on the energy sector.
First reported: 16.12.2025 22:031 source, 1 articleShow sources
- Russia Hits Critical Orgs Via Misconfigured Edge Devices — www.darkreading.com — 16.12.2025 22:03
-
Attackers targeted enterprise routers, routing infrastructure, VPN concentrators, network management appliances, collaboration platforms, and cloud-based project management systems.
First reported: 16.12.2025 22:031 source, 1 articleShow sources
- Russia Hits Critical Orgs Via Misconfigured Edge Devices — www.darkreading.com — 16.12.2025 22:03
-
The shift toward targeting misconfigured network edge devices began gradually between 2021 and 2025.
First reported: 16.12.2025 22:031 source, 1 articleShow sources
- Russia Hits Critical Orgs Via Misconfigured Edge Devices — www.darkreading.com — 16.12.2025 22:03
-
In 2021, the threat cluster exploited WatchGuard flaw CVE-2022-26318.
First reported: 16.12.2025 22:031 source, 1 articleShow sources
- Russia Hits Critical Orgs Via Misconfigured Edge Devices — www.darkreading.com — 16.12.2025 22:03
-
Between 2022 and 2023, threat actors targeted Confluence vulnerabilities CVE-2021-26084 and CVE-2023-22518.
First reported: 16.12.2025 22:031 source, 1 articleShow sources
- Russia Hits Critical Orgs Via Misconfigured Edge Devices — www.darkreading.com — 16.12.2025 22:03
-
In 2024, attackers targeted Veeam flaw CVE-2023-27532.
First reported: 16.12.2025 22:031 source, 1 articleShow sources
- Russia Hits Critical Orgs Via Misconfigured Edge Devices — www.darkreading.com — 16.12.2025 22:03
-
The primary credential extraction mechanism appeared to be packet capture and traffic analysis.
First reported: 16.12.2025 22:031 source, 1 articleShow sources
- Russia Hits Critical Orgs Via Misconfigured Edge Devices — www.darkreading.com — 16.12.2025 22:03
-
Amazon identified and notified customers with compromised network appliances, enabled remediation of compromised EC2 resources, shared intelligence with partners and affected vendors, and reported observations to network appliance vendors.
First reported: 16.12.2025 22:031 source, 1 articleShow sources
- Russia Hits Critical Orgs Via Misconfigured Edge Devices — www.darkreading.com — 16.12.2025 22:03
-
APT28, also known as BlueDelta, Fancy Bear, Forest Blizzard, FROZENLAKE, Iron Twilight, ITG05, Pawn Storm, Sednit, Sofacy, and TA422, is affiliated with Russia's Main Directorate of the General Staff of the Russian Federation's Armed Forces (GRU).
First reported: 17.12.2025 17:304 sources, 6 articlesShow sources
- APT28 Targets Ukrainian UKR-net Users in Long-Running Credential Phishing Campaign — thehackernews.com — 17.12.2025 17:30
- Notorious Russian APT Nabs Credentials From Global Targets — www.darkreading.com — 09.01.2026 09:00
- Russian APT28 Runs Credential-Stealing Campaign Targeting Energy and Policy Organizations — thehackernews.com — 09.01.2026 17:28
- Russia’s APT28 Targeting Energy Research, Defense Collaboration Entities — www.securityweek.com — 12.01.2026 14:23
- Russian hackers exploit recently patched Microsoft Office bug in attacks — www.bleepingcomputer.com — 02.02.2026 23:00
- APT28 Uses Microsoft Office CVE-2026-21509 in Espionage-Focused Malware Attacks — thehackernews.com — 03.02.2026 11:12
-
APT28 has been conducting a sustained credential-harvesting campaign targeting users of UKR[.]net, a webmail and news service popular in Ukraine, between June 2024 and April 2025.
First reported: 17.12.2025 17:304 sources, 8 articlesShow sources
- APT28 Targets Ukrainian UKR-net Users in Long-Running Credential Phishing Campaign — thehackernews.com — 17.12.2025 17:30
- Notorious Russian APT Nabs Credentials From Global Targets — www.darkreading.com — 09.01.2026 09:00
- Russian APT28 Runs Credential-Stealing Campaign Targeting Energy and Policy Organizations — thehackernews.com — 09.01.2026 17:28
- Russia’s APT28 Targeting Energy Research, Defense Collaboration Entities — www.securityweek.com — 12.01.2026 14:23
- Russian hackers exploit recently patched Microsoft Office bug in attacks — www.bleepingcomputer.com — 02.02.2026 23:00
- APT28 Uses Microsoft Office CVE-2026-21509 in Espionage-Focused Malware Attacks — thehackernews.com — 03.02.2026 11:12
- APT28 Targeted European Entities Using Webhook-Based Macro Malware — thehackernews.com — 23.02.2026 21:41
- APT28-Linked Campaign Deploys BadPaw Loader and MeowMeow Backdoor in Ukraine — thehackernews.com — 05.03.2026 12:10
-
The campaign involves deploying UKR[.]net-themed login pages on legitimate services like Mocky to entice recipients into entering their credentials and two-factor authentication (2FA) codes.
First reported: 17.12.2025 17:304 sources, 8 articlesShow sources
- APT28 Targets Ukrainian UKR-net Users in Long-Running Credential Phishing Campaign — thehackernews.com — 17.12.2025 17:30
- Notorious Russian APT Nabs Credentials From Global Targets — www.darkreading.com — 09.01.2026 09:00
- Russian APT28 Runs Credential-Stealing Campaign Targeting Energy and Policy Organizations — thehackernews.com — 09.01.2026 17:28
- Russia’s APT28 Targeting Energy Research, Defense Collaboration Entities — www.securityweek.com — 12.01.2026 14:23
- Russian hackers exploit recently patched Microsoft Office bug in attacks — www.bleepingcomputer.com — 02.02.2026 23:00
- APT28 Uses Microsoft Office CVE-2026-21509 in Espionage-Focused Malware Attacks — thehackernews.com — 03.02.2026 11:12
- APT28 Targeted European Entities Using Webhook-Based Macro Malware — thehackernews.com — 23.02.2026 21:41
- APT28-Linked Campaign Deploys BadPaw Loader and MeowMeow Backdoor in Ukraine — thehackernews.com — 05.03.2026 12:10
-
Links to these pages are embedded within PDF documents distributed via phishing emails, often shortened using services like tiny[.]cc or tinyurl[.]com.
First reported: 17.12.2025 17:304 sources, 8 articlesShow sources
- APT28 Targets Ukrainian UKR-net Users in Long-Running Credential Phishing Campaign — thehackernews.com — 17.12.2025 17:30
- Notorious Russian APT Nabs Credentials From Global Targets — www.darkreading.com — 09.01.2026 09:00
- Russian APT28 Runs Credential-Stealing Campaign Targeting Energy and Policy Organizations — thehackernews.com — 09.01.2026 17:28
- Russia’s APT28 Targeting Energy Research, Defense Collaboration Entities — www.securityweek.com — 12.01.2026 14:23
- Russian hackers exploit recently patched Microsoft Office bug in attacks — www.bleepingcomputer.com — 02.02.2026 23:00
- APT28 Uses Microsoft Office CVE-2026-21509 in Espionage-Focused Malware Attacks — thehackernews.com — 03.02.2026 11:12
- APT28 Targeted European Entities Using Webhook-Based Macro Malware — thehackernews.com — 23.02.2026 21:41
- APT28-Linked Campaign Deploys BadPaw Loader and MeowMeow Backdoor in Ukraine — thehackernews.com — 05.03.2026 12:10
-
In some cases, APT28 uses subdomains created on platforms like Blogger (*.blogspot[.]com) to launch a two-tier redirection chain leading to the credential harvesting page.
First reported: 17.12.2025 17:304 sources, 8 articlesShow sources
- APT28 Targets Ukrainian UKR-net Users in Long-Running Credential Phishing Campaign — thehackernews.com — 17.12.2025 17:30
- Notorious Russian APT Nabs Credentials From Global Targets — www.darkreading.com — 09.01.2026 09:00
- Russian APT28 Runs Credential-Stealing Campaign Targeting Energy and Policy Organizations — thehackernews.com — 09.01.2026 17:28
- Russia’s APT28 Targeting Energy Research, Defense Collaboration Entities — www.securityweek.com — 12.01.2026 14:23
- Russian hackers exploit recently patched Microsoft Office bug in attacks — www.bleepingcomputer.com — 02.02.2026 23:00
- APT28 Uses Microsoft Office CVE-2026-21509 in Espionage-Focused Malware Attacks — thehackernews.com — 03.02.2026 11:12
- APT28 Targeted European Entities Using Webhook-Based Macro Malware — thehackernews.com — 23.02.2026 21:41
- APT28-Linked Campaign Deploys BadPaw Loader and MeowMeow Backdoor in Ukraine — thehackernews.com — 05.03.2026 12:10
-
APT28 has transitioned from using compromised routers to proxy tunneling services such as ngrok and Serveo to capture and relay stolen credentials and 2FA codes.
First reported: 17.12.2025 17:303 sources, 7 articlesShow sources
- APT28 Targets Ukrainian UKR-net Users in Long-Running Credential Phishing Campaign — thehackernews.com — 17.12.2025 17:30
- Russian APT28 Runs Credential-Stealing Campaign Targeting Energy and Policy Organizations — thehackernews.com — 09.01.2026 17:28
- Russia’s APT28 Targeting Energy Research, Defense Collaboration Entities — www.securityweek.com — 12.01.2026 14:23
- Russian hackers exploit recently patched Microsoft Office bug in attacks — www.bleepingcomputer.com — 02.02.2026 23:00
- APT28 Uses Microsoft Office CVE-2026-21509 in Espionage-Focused Malware Attacks — thehackernews.com — 03.02.2026 11:12
- APT28 Targeted European Entities Using Webhook-Based Macro Malware — thehackernews.com — 23.02.2026 21:41
- APT28-Linked Campaign Deploys BadPaw Loader and MeowMeow Backdoor in Ukraine — thehackernews.com — 05.03.2026 12:10
-
The campaign is part of a broader set of phishing and credential theft operations targeting government institutions, defense contractors, weapons suppliers, logistics firms, and policy think tanks in pursuit of Russia's strategic objectives.
First reported: 17.12.2025 17:303 sources, 7 articlesShow sources
- APT28 Targets Ukrainian UKR-net Users in Long-Running Credential Phishing Campaign — thehackernews.com — 17.12.2025 17:30
- Notorious Russian APT Nabs Credentials From Global Targets — www.darkreading.com — 09.01.2026 09:00
- Russian APT28 Runs Credential-Stealing Campaign Targeting Energy and Policy Organizations — thehackernews.com — 09.01.2026 17:28
- Russian hackers exploit recently patched Microsoft Office bug in attacks — www.bleepingcomputer.com — 02.02.2026 23:00
- APT28 Uses Microsoft Office CVE-2026-21509 in Espionage-Focused Malware Attacks — thehackernews.com — 03.02.2026 11:12
- APT28 Targeted European Entities Using Webhook-Based Macro Malware — thehackernews.com — 23.02.2026 21:41
- APT28-Linked Campaign Deploys BadPaw Loader and MeowMeow Backdoor in Ukraine — thehackernews.com — 05.03.2026 12:10
-
APT28 targeted Turkish renewable energy scientists with a climate change policy document from a real Middle Eastern think tank.
First reported: 09.01.2026 09:004 sources, 7 articlesShow sources
- Notorious Russian APT Nabs Credentials From Global Targets — www.darkreading.com — 09.01.2026 09:00
- Russian APT28 Runs Credential-Stealing Campaign Targeting Energy and Policy Organizations — thehackernews.com — 09.01.2026 17:28
- Russia’s APT28 Targeting Energy Research, Defense Collaboration Entities — www.securityweek.com — 12.01.2026 14:23
- Russian hackers exploit recently patched Microsoft Office bug in attacks — www.bleepingcomputer.com — 02.02.2026 23:00
- APT28 Uses Microsoft Office CVE-2026-21509 in Espionage-Focused Malware Attacks — thehackernews.com — 03.02.2026 11:12
- APT28 Targeted European Entities Using Webhook-Based Macro Malware — thehackernews.com — 23.02.2026 21:41
- APT28-Linked Campaign Deploys BadPaw Loader and MeowMeow Backdoor in Ukraine — thehackernews.com — 05.03.2026 12:10
-
APT28 used phishing emails themed to match their intended targets and written in the targets' native tongues.
First reported: 09.01.2026 09:004 sources, 7 articlesShow sources
- Notorious Russian APT Nabs Credentials From Global Targets — www.darkreading.com — 09.01.2026 09:00
- Russian APT28 Runs Credential-Stealing Campaign Targeting Energy and Policy Organizations — thehackernews.com — 09.01.2026 17:28
- Russia’s APT28 Targeting Energy Research, Defense Collaboration Entities — www.securityweek.com — 12.01.2026 14:23
- Russian hackers exploit recently patched Microsoft Office bug in attacks — www.bleepingcomputer.com — 02.02.2026 23:00
- APT28 Uses Microsoft Office CVE-2026-21509 in Espionage-Focused Malware Attacks — thehackernews.com — 03.02.2026 11:12
- APT28 Targeted European Entities Using Webhook-Based Macro Malware — thehackernews.com — 23.02.2026 21:41
- APT28-Linked Campaign Deploys BadPaw Loader and MeowMeow Backdoor in Ukraine — thehackernews.com — 05.03.2026 12:10
-
APT28 redirected victims to a login page mimicking a legitimate online service after they followed a link in a phishing email.
First reported: 09.01.2026 09:004 sources, 7 articlesShow sources
- Notorious Russian APT Nabs Credentials From Global Targets — www.darkreading.com — 09.01.2026 09:00
- Russian APT28 Runs Credential-Stealing Campaign Targeting Energy and Policy Organizations — thehackernews.com — 09.01.2026 17:28
- Russia’s APT28 Targeting Energy Research, Defense Collaboration Entities — www.securityweek.com — 12.01.2026 14:23
- Russian hackers exploit recently patched Microsoft Office bug in attacks — www.bleepingcomputer.com — 02.02.2026 23:00
- APT28 Uses Microsoft Office CVE-2026-21509 in Espionage-Focused Malware Attacks — thehackernews.com — 03.02.2026 11:12
- APT28 Targeted European Entities Using Webhook-Based Macro Malware — thehackernews.com — 23.02.2026 21:41
- APT28-Linked Campaign Deploys BadPaw Loader and MeowMeow Backdoor in Ukraine — thehackernews.com — 05.03.2026 12:10
-
APT28 used regular hosted services rather than custom tools and infrastructure for their attacks.
First reported: 09.01.2026 09:004 sources, 7 articlesShow sources
- Notorious Russian APT Nabs Credentials From Global Targets — www.darkreading.com — 09.01.2026 09:00
- Russian APT28 Runs Credential-Stealing Campaign Targeting Energy and Policy Organizations — thehackernews.com — 09.01.2026 17:28
- Russia’s APT28 Targeting Energy Research, Defense Collaboration Entities — www.securityweek.com — 12.01.2026 14:23
- Russian hackers exploit recently patched Microsoft Office bug in attacks — www.bleepingcomputer.com — 02.02.2026 23:00
- APT28 Uses Microsoft Office CVE-2026-21509 in Espionage-Focused Malware Attacks — thehackernews.com — 03.02.2026 11:12
- APT28 Targeted European Entities Using Webhook-Based Macro Malware — thehackernews.com — 23.02.2026 21:41
- APT28-Linked Campaign Deploys BadPaw Loader and MeowMeow Backdoor in Ukraine — thehackernews.com — 05.03.2026 12:10
-
APT28's targets included an IT integrator based in Uzbekistan, a European think tank, a military organization in North Macedonia, and scientists and researchers associated with a Turkish energy and nuclear research organization.
First reported: 09.01.2026 09:004 sources, 7 articlesShow sources
- Notorious Russian APT Nabs Credentials From Global Targets — www.darkreading.com — 09.01.2026 09:00
- Russian APT28 Runs Credential-Stealing Campaign Targeting Energy and Policy Organizations — thehackernews.com — 09.01.2026 17:28
- Russia’s APT28 Targeting Energy Research, Defense Collaboration Entities — www.securityweek.com — 12.01.2026 14:23
- Russian hackers exploit recently patched Microsoft Office bug in attacks — www.bleepingcomputer.com — 02.02.2026 23:00
- APT28 Uses Microsoft Office CVE-2026-21509 in Espionage-Focused Malware Attacks — thehackernews.com — 03.02.2026 11:12
- APT28 Targeted European Entities Using Webhook-Based Macro Malware — thehackernews.com — 23.02.2026 21:41
- APT28-Linked Campaign Deploys BadPaw Loader and MeowMeow Backdoor in Ukraine — thehackernews.com — 05.03.2026 12:10
-
APT28's campaign was highly selective and consistent with GRU collection priorities, aligning with geopolitical, military, or strategic intelligence objectives.
First reported: 09.01.2026 09:004 sources, 7 articlesShow sources
- Notorious Russian APT Nabs Credentials From Global Targets — www.darkreading.com — 09.01.2026 09:00
- Russian APT28 Runs Credential-Stealing Campaign Targeting Energy and Policy Organizations — thehackernews.com — 09.01.2026 17:28
- Russia’s APT28 Targeting Energy Research, Defense Collaboration Entities — www.securityweek.com — 12.01.2026 14:23
- Russian hackers exploit recently patched Microsoft Office bug in attacks — www.bleepingcomputer.com — 02.02.2026 23:00
- APT28 Uses Microsoft Office CVE-2026-21509 in Espionage-Focused Malware Attacks — thehackernews.com — 03.02.2026 11:12
- APT28 Targeted European Entities Using Webhook-Based Macro Malware — thehackernews.com — 23.02.2026 21:41
- APT28-Linked Campaign Deploys BadPaw Loader and MeowMeow Backdoor in Ukraine — thehackernews.com — 05.03.2026 12:10
-
APT28 targeted individuals associated with a Turkish energy and nuclear research agency, a European think tank, and organizations in North Macedonia and Uzbekistan.
First reported: 09.01.2026 17:283 sources, 6 articlesShow sources
- Russian APT28 Runs Credential-Stealing Campaign Targeting Energy and Policy Organizations — thehackernews.com — 09.01.2026 17:28
- Russia’s APT28 Targeting Energy Research, Defense Collaboration Entities — www.securityweek.com — 12.01.2026 14:23
- Russian hackers exploit recently patched Microsoft Office bug in attacks — www.bleepingcomputer.com — 02.02.2026 23:00
- APT28 Uses Microsoft Office CVE-2026-21509 in Espionage-Focused Malware Attacks — thehackernews.com — 03.02.2026 11:12
- APT28 Targeted European Entities Using Webhook-Based Macro Malware — thehackernews.com — 23.02.2026 21:41
- APT28-Linked Campaign Deploys BadPaw Loader and MeowMeow Backdoor in Ukraine — thehackernews.com — 05.03.2026 12:10
-
APT28 used fake login pages styled to resemble popular services like Microsoft Outlook Web Access (OWA), Google, and Sophos VPN portals.
First reported: 09.01.2026 17:283 sources, 6 articlesShow sources
- Russian APT28 Runs Credential-Stealing Campaign Targeting Energy and Policy Organizations — thehackernews.com — 09.01.2026 17:28
- Russia’s APT28 Targeting Energy Research, Defense Collaboration Entities — www.securityweek.com — 12.01.2026 14:23
- Russian hackers exploit recently patched Microsoft Office bug in attacks — www.bleepingcomputer.com — 02.02.2026 23:00
- APT28 Uses Microsoft Office CVE-2026-21509 in Espionage-Focused Malware Attacks — thehackernews.com — 03.02.2026 11:12
- APT28 Targeted European Entities Using Webhook-Based Macro Malware — thehackernews.com — 23.02.2026 21:41
- APT28-Linked Campaign Deploys BadPaw Loader and MeowMeow Backdoor in Ukraine — thehackernews.com — 05.03.2026 12:10
-
The phishing campaigns redirected users to legitimate sites after credentials were entered, avoiding suspicion.
First reported: 09.01.2026 17:283 sources, 6 articlesShow sources
- Russian APT28 Runs Credential-Stealing Campaign Targeting Energy and Policy Organizations — thehackernews.com — 09.01.2026 17:28
- Russia’s APT28 Targeting Energy Research, Defense Collaboration Entities — www.securityweek.com — 12.01.2026 14:23
- Russian hackers exploit recently patched Microsoft Office bug in attacks — www.bleepingcomputer.com — 02.02.2026 23:00
- APT28 Uses Microsoft Office CVE-2026-21509 in Espionage-Focused Malware Attacks — thehackernews.com — 03.02.2026 11:12
- APT28 Targeted European Entities Using Webhook-Based Macro Malware — thehackernews.com — 23.02.2026 21:41
- APT28-Linked Campaign Deploys BadPaw Loader and MeowMeow Backdoor in Ukraine — thehackernews.com — 05.03.2026 12:10
-
APT28 used services like Webhook.site, InfinityFree, Byet Internet Services, and ngrok to host phishing pages and exfiltrate data.
First reported: 09.01.2026 17:283 sources, 6 articlesShow sources
- Russian APT28 Runs Credential-Stealing Campaign Targeting Energy and Policy Organizations — thehackernews.com — 09.01.2026 17:28
- Russia’s APT28 Targeting Energy Research, Defense Collaboration Entities — www.securityweek.com — 12.01.2026 14:23
- Russian hackers exploit recently patched Microsoft Office bug in attacks — www.bleepingcomputer.com — 02.02.2026 23:00
- APT28 Uses Microsoft Office CVE-2026-21509 in Espionage-Focused Malware Attacks — thehackernews.com — 03.02.2026 11:12
- APT28 Targeted European Entities Using Webhook-Based Macro Malware — thehackernews.com — 23.02.2026 21:41
- APT28-Linked Campaign Deploys BadPaw Loader and MeowMeow Backdoor in Ukraine — thehackernews.com — 05.03.2026 12:10
-
APT28 used legitimate PDF lure documents, including a publication from the Gulf Research Center and a policy briefing from climate change think tank ECCO.
First reported: 09.01.2026 17:283 sources, 6 articlesShow sources
- Russian APT28 Runs Credential-Stealing Campaign Targeting Energy and Policy Organizations — thehackernews.com — 09.01.2026 17:28
- Russia’s APT28 Targeting Energy Research, Defense Collaboration Entities — www.securityweek.com — 12.01.2026 14:23
- Russian hackers exploit recently patched Microsoft Office bug in attacks — www.bleepingcomputer.com — 02.02.2026 23:00
- APT28 Uses Microsoft Office CVE-2026-21509 in Espionage-Focused Malware Attacks — thehackernews.com — 03.02.2026 11:12
- APT28 Targeted European Entities Using Webhook-Based Macro Malware — thehackernews.com — 23.02.2026 21:41
- APT28-Linked Campaign Deploys BadPaw Loader and MeowMeow Backdoor in Ukraine — thehackernews.com — 05.03.2026 12:10
-
APT28 conducted a June 2025 campaign targeting an E.U. think tank with a Sophos VPN password reset page.
First reported: 09.01.2026 17:283 sources, 6 articlesShow sources
- Russian APT28 Runs Credential-Stealing Campaign Targeting Energy and Policy Organizations — thehackernews.com — 09.01.2026 17:28
- Russia’s APT28 Targeting Energy Research, Defense Collaboration Entities — www.securityweek.com — 12.01.2026 14:23
- Russian hackers exploit recently patched Microsoft Office bug in attacks — www.bleepingcomputer.com — 02.02.2026 23:00
- APT28 Uses Microsoft Office CVE-2026-21509 in Espionage-Focused Malware Attacks — thehackernews.com — 03.02.2026 11:12
- APT28 Targeted European Entities Using Webhook-Based Macro Malware — thehackernews.com — 23.02.2026 21:41
- APT28-Linked Campaign Deploys BadPaw Loader and MeowMeow Backdoor in Ukraine — thehackernews.com — 05.03.2026 12:10
-
APT28 conducted a September 2025 campaign targeting a military organization in North Macedonia and an IT integrator in Uzbekistan with fake password expiration warnings.
First reported: 09.01.2026 17:283 sources, 5 articlesShow sources
- Russian APT28 Runs Credential-Stealing Campaign Targeting Energy and Policy Organizations — thehackernews.com — 09.01.2026 17:28
- Russia’s APT28 Targeting Energy Research, Defense Collaboration Entities — www.securityweek.com — 12.01.2026 14:23
- Russian hackers exploit recently patched Microsoft Office bug in attacks — www.bleepingcomputer.com — 02.02.2026 23:00
- APT28 Uses Microsoft Office CVE-2026-21509 in Espionage-Focused Malware Attacks — thehackernews.com — 03.02.2026 11:12
- APT28-Linked Campaign Deploys BadPaw Loader and MeowMeow Backdoor in Ukraine — thehackernews.com — 05.03.2026 12:10
-
APT28 conducted an April 2025 campaign using a fake Google password reset page hosted on Byet Internet Services to gather credentials.
First reported: 09.01.2026 17:283 sources, 5 articlesShow sources
- Russian APT28 Runs Credential-Stealing Campaign Targeting Energy and Policy Organizations — thehackernews.com — 09.01.2026 17:28
- Russia’s APT28 Targeting Energy Research, Defense Collaboration Entities — www.securityweek.com — 12.01.2026 14:23
- Russian hackers exploit recently patched Microsoft Office bug in attacks — www.bleepingcomputer.com — 02.02.2026 23:00
- APT28 Uses Microsoft Office CVE-2026-21509 in Espionage-Focused Malware Attacks — thehackernews.com — 03.02.2026 11:12
- APT28-Linked Campaign Deploys BadPaw Loader and MeowMeow Backdoor in Ukraine — thehackernews.com — 05.03.2026 12:10
-
APT28 has been targeting organizations associated with energy research, defense collaboration, and government communication in a new credential-harvesting campaign.
First reported: 12.01.2026 14:233 sources, 4 articlesShow sources
- Russia’s APT28 Targeting Energy Research, Defense Collaboration Entities — www.securityweek.com — 12.01.2026 14:23
- Russian hackers exploit recently patched Microsoft Office bug in attacks — www.bleepingcomputer.com — 02.02.2026 23:00
- APT28 Uses Microsoft Office CVE-2026-21509 in Espionage-Focused Malware Attacks — thehackernews.com — 03.02.2026 11:12
- APT28-Linked Campaign Deploys BadPaw Loader and MeowMeow Backdoor in Ukraine — thehackernews.com — 05.03.2026 12:10
-
APT28 used phishing pages impersonating Microsoft Outlook Web Access (OWA), Google, and Sophos VPN portals.
First reported: 12.01.2026 14:233 sources, 4 articlesShow sources
- Russia’s APT28 Targeting Energy Research, Defense Collaboration Entities — www.securityweek.com — 12.01.2026 14:23
- Russian hackers exploit recently patched Microsoft Office bug in attacks — www.bleepingcomputer.com — 02.02.2026 23:00
- APT28 Uses Microsoft Office CVE-2026-21509 in Espionage-Focused Malware Attacks — thehackernews.com — 03.02.2026 11:12
- APT28-Linked Campaign Deploys BadPaw Loader and MeowMeow Backdoor in Ukraine — thehackernews.com — 05.03.2026 12:10
-
Victims were redirected to legitimate domains after entering their credentials.
First reported: 12.01.2026 14:233 sources, 4 articlesShow sources
- Russia’s APT28 Targeting Energy Research, Defense Collaboration Entities — www.securityweek.com — 12.01.2026 14:23
- Russian hackers exploit recently patched Microsoft Office bug in attacks — www.bleepingcomputer.com — 02.02.2026 23:00
- APT28 Uses Microsoft Office CVE-2026-21509 in Espionage-Focused Malware Attacks — thehackernews.com — 03.02.2026 11:12
- APT28-Linked Campaign Deploys BadPaw Loader and MeowMeow Backdoor in Ukraine — thehackernews.com — 05.03.2026 12:10
-
APT28 relied heavily on free hosting and tunneling services such as Webhook.site, InfinityFree, Byet Internet Services, and Ngrok to host phishing content, capture user data, and manage redirections.
First reported: 12.01.2026 14:233 sources, 4 articlesShow sources
- Russia’s APT28 Targeting Energy Research, Defense Collaboration Entities — www.securityweek.com — 12.01.2026 14:23
- Russian hackers exploit recently patched Microsoft Office bug in attacks — www.bleepingcomputer.com — 02.02.2026 23:00
- APT28 Uses Microsoft Office CVE-2026-21509 in Espionage-Focused Malware Attacks — thehackernews.com — 03.02.2026 11:12
- APT28-Linked Campaign Deploys BadPaw Loader and MeowMeow Backdoor in Ukraine — thehackernews.com — 05.03.2026 12:10
-
In February 2025, APT28 deployed a Microsoft OWA phishing page and used the ShortURL link-shortening service for the first-stage redirection.
First reported: 12.01.2026 14:233 sources, 4 articlesShow sources
- Russia’s APT28 Targeting Energy Research, Defense Collaboration Entities — www.securityweek.com — 12.01.2026 14:23
- Russian hackers exploit recently patched Microsoft Office bug in attacks — www.bleepingcomputer.com — 02.02.2026 23:00
- APT28 Uses Microsoft Office CVE-2026-21509 in Espionage-Focused Malware Attacks — thehackernews.com — 03.02.2026 11:12
- APT28-Linked Campaign Deploys BadPaw Loader and MeowMeow Backdoor in Ukraine — thehackernews.com — 05.03.2026 12:10
-
APT28 employed a webhook relying on HTML to load a PDF lure document in the browser for two seconds before redirecting the victim to a second webhook hosting the spoofed OWA login page.
First reported: 12.01.2026 14:233 sources, 4 articlesShow sources
- Russia’s APT28 Targeting Energy Research, Defense Collaboration Entities — www.securityweek.com — 12.01.2026 14:23
- Russian hackers exploit recently patched Microsoft Office bug in attacks — www.bleepingcomputer.com — 02.02.2026 23:00
- APT28 Uses Microsoft Office CVE-2026-21509 in Espionage-Focused Malware Attacks — thehackernews.com — 03.02.2026 11:12
- APT28-Linked Campaign Deploys BadPaw Loader and MeowMeow Backdoor in Ukraine — thehackernews.com — 05.03.2026 12:10
-
In July, APT28 deployed a spoofed OWA login portal containing Turkish-language text and targeting Turkish scientists and researchers.
First reported: 12.01.2026 14:233 sources, 4 articlesShow sources
- Russia’s APT28 Targeting Energy Research, Defense Collaboration Entities — www.securityweek.com — 12.01.2026 14:23
- Russian hackers exploit recently patched Microsoft Office bug in attacks — www.bleepingcomputer.com — 02.02.2026 23:00
- APT28 Uses Microsoft Office CVE-2026-21509 in Espionage-Focused Malware Attacks — thehackernews.com — 03.02.2026 11:12
- APT28-Linked Campaign Deploys BadPaw Loader and MeowMeow Backdoor in Ukraine — thehackernews.com — 05.03.2026 12:10
-
In June, APT28 deployed a spoofed Sophos VPN password reset page hosted on InfinityFree infrastructure.
First reported: 12.01.2026 14:233 sources, 4 articlesShow sources
- Russia’s APT28 Targeting Energy Research, Defense Collaboration Entities — www.securityweek.com — 12.01.2026 14:23
- Russian hackers exploit recently patched Microsoft Office bug in attacks — www.bleepingcomputer.com — 02.02.2026 23:00
- APT28 Uses Microsoft Office CVE-2026-21509 in Espionage-Focused Malware Attacks — thehackernews.com — 03.02.2026 11:12
- APT28-Linked Campaign Deploys BadPaw Loader and MeowMeow Backdoor in Ukraine — thehackernews.com — 05.03.2026 12:10
-
In September, APT28 hosted two spoofed OWA expired password pages on an InfinityFree domain.
First reported: 12.01.2026 14:233 sources, 4 articlesShow sources
- Russia’s APT28 Targeting Energy Research, Defense Collaboration Entities — www.securityweek.com — 12.01.2026 14:23
- Russian hackers exploit recently patched Microsoft Office bug in attacks — www.bleepingcomputer.com — 02.02.2026 23:00
- APT28 Uses Microsoft Office CVE-2026-21509 in Espionage-Focused Malware Attacks — thehackernews.com — 03.02.2026 11:12
- APT28-Linked Campaign Deploys BadPaw Loader and MeowMeow Backdoor in Ukraine — thehackernews.com — 05.03.2026 12:10
-
In April, Recorded Future discovered a spoofed Google password reset page in Portuguese, hosted on a free apex domain from Byet Internet Services.
First reported: 12.01.2026 14:233 sources, 4 articlesShow sources
- Russia’s APT28 Targeting Energy Research, Defense Collaboration Entities — www.securityweek.com — 12.01.2026 14:23
- Russian hackers exploit recently patched Microsoft Office bug in attacks — www.bleepingcomputer.com — 02.02.2026 23:00
- APT28 Uses Microsoft Office CVE-2026-21509 in Espionage-Focused Malware Attacks — thehackernews.com — 03.02.2026 11:12
- APT28-Linked Campaign Deploys BadPaw Loader and MeowMeow Backdoor in Ukraine — thehackernews.com — 05.03.2026 12:10
-
APT28 abused Ngrok's free service to connect servers behind a firewall to a proxy server and expose that server to the internet without changing firewall rules.
First reported: 12.01.2026 14:233 sources, 5 articlesShow sources
- Russia’s APT28 Targeting Energy Research, Defense Collaboration Entities — www.securityweek.com — 12.01.2026 14:23
- Russian hackers exploit recently patched Microsoft Office bug in attacks — www.bleepingcomputer.com — 02.02.2026 23:00
- APT28 Uses Microsoft Office CVE-2026-21509 in Espionage-Focused Malware Attacks — thehackernews.com — 03.02.2026 11:12
- APT28 Targeted European Entities Using Webhook-Based Macro Malware — thehackernews.com — 23.02.2026 21:41
- APT28-Linked Campaign Deploys BadPaw Loader and MeowMeow Backdoor in Ukraine — thehackernews.com — 05.03.2026 12:10
-
APT28's ability to adapt its infrastructure and rebrand credential-harvesting pages suggests it will continue to abuse free hosting, tunneling, and link-shortening services to reduce operational costs and obscure attribution.
First reported: 12.01.2026 14:233 sources, 5 articlesShow sources
- Russia’s APT28 Targeting Energy Research, Defense Collaboration Entities — www.securityweek.com — 12.01.2026 14:23
- Russian hackers exploit recently patched Microsoft Office bug in attacks — www.bleepingcomputer.com — 02.02.2026 23:00
- APT28 Uses Microsoft Office CVE-2026-21509 in Espionage-Focused Malware Attacks — thehackernews.com — 03.02.2026 11:12
- APT28 Targeted European Entities Using Webhook-Based Macro Malware — thehackernews.com — 23.02.2026 21:41
- APT28-Linked Campaign Deploys BadPaw Loader and MeowMeow Backdoor in Ukraine — thehackernews.com — 05.03.2026 12:10
-
APT28, also known as Fancy Bear and Sofacy, exploited CVE-2026-21509, a recently patched vulnerability in multiple versions of Microsoft Office.
First reported: 02.02.2026 23:002 sources, 5 articlesShow sources
- Russian hackers exploit recently patched Microsoft Office bug in attacks — www.bleepingcomputer.com — 02.02.2026 23:00
- APT28 Uses Microsoft Office CVE-2026-21509 in Espionage-Focused Malware Attacks — thehackernews.com — 03.02.2026 11:12
- APT28 Tied to CVE-2026-21513 MSHTML 0-Day Exploited Before Feb 2026 Patch Tuesday — thehackernews.com — 02.03.2026 12:36
- APT28-Linked Campaign Deploys BadPaw Loader and MeowMeow Backdoor in Ukraine — thehackernews.com — 05.03.2026 12:10
- APT28 hackers deploy customized variant of Covenant open-source tool — www.bleepingcomputer.com — 10.03.2026 12:00
-
The attacks involved malicious DOC files themed around EU COREPER consultations in Ukraine and impersonated the Ukrainian Hydrometeorological Center.
First reported: 02.02.2026 23:002 sources, 5 articlesShow sources
- Russian hackers exploit recently patched Microsoft Office bug in attacks — www.bleepingcomputer.com — 02.02.2026 23:00
- APT28 Uses Microsoft Office CVE-2026-21509 in Espionage-Focused Malware Attacks — thehackernews.com — 03.02.2026 11:12
- APT28 Tied to CVE-2026-21513 MSHTML 0-Day Exploited Before Feb 2026 Patch Tuesday — thehackernews.com — 02.03.2026 12:36
- APT28-Linked Campaign Deploys BadPaw Loader and MeowMeow Backdoor in Ukraine — thehackernews.com — 05.03.2026 12:10
- APT28 hackers deploy customized variant of Covenant open-source tool — www.bleepingcomputer.com — 10.03.2026 12:00
-
The malicious document triggers a WebDAV-based download chain that installs malware via COM hijacking, a malicious DLL (EhStoreShell.dll), shellcode hidden in an image file (SplashScreen.png), and a scheduled task (OneDriveHealth).
First reported: 02.02.2026 23:002 sources, 5 articlesShow sources
- Russian hackers exploit recently patched Microsoft Office bug in attacks — www.bleepingcomputer.com — 02.02.2026 23:00
- APT28 Uses Microsoft Office CVE-2026-21509 in Espionage-Focused Malware Attacks — thehackernews.com — 03.02.2026 11:12
- APT28 Tied to CVE-2026-21513 MSHTML 0-Day Exploited Before Feb 2026 Patch Tuesday — thehackernews.com — 02.03.2026 12:36
- APT28-Linked Campaign Deploys BadPaw Loader and MeowMeow Backdoor in Ukraine — thehackernews.com — 05.03.2026 12:10
- APT28 hackers deploy customized variant of Covenant open-source tool — www.bleepingcomputer.com — 10.03.2026 12:00
-
The scheduled task execution leads to the termination and restart of the explorer.exe process, ensuring the loading of the EhStoreShell.dll file.
First reported: 02.02.2026 23:002 sources, 5 articlesShow sources
- Russian hackers exploit recently patched Microsoft Office bug in attacks — www.bleepingcomputer.com — 02.02.2026 23:00
- APT28 Uses Microsoft Office CVE-2026-21509 in Espionage-Focused Malware Attacks — thehackernews.com — 03.02.2026 11:12
- APT28 Tied to CVE-2026-21513 MSHTML 0-Day Exploited Before Feb 2026 Patch Tuesday — thehackernews.com — 02.03.2026 12:36
- APT28-Linked Campaign Deploys BadPaw Loader and MeowMeow Backdoor in Ukraine — thehackernews.com — 05.03.2026 12:10
- APT28 hackers deploy customized variant of Covenant open-source tool — www.bleepingcomputer.com — 10.03.2026 12:00
-
This DLL executes shellcode from the image file, which launches the COVENANT software (framework) on the computer.
First reported: 02.02.2026 23:002 sources, 5 articlesShow sources
- Russian hackers exploit recently patched Microsoft Office bug in attacks — www.bleepingcomputer.com — 02.02.2026 23:00
- APT28 Uses Microsoft Office CVE-2026-21509 in Espionage-Focused Malware Attacks — thehackernews.com — 03.02.2026 11:12
- APT28 Tied to CVE-2026-21513 MSHTML 0-Day Exploited Before Feb 2026 Patch Tuesday — thehackernews.com — 02.03.2026 12:36
- APT28-Linked Campaign Deploys BadPaw Loader and MeowMeow Backdoor in Ukraine — thehackernews.com — 05.03.2026 12:10
- APT28 hackers deploy customized variant of Covenant open-source tool — www.bleepingcomputer.com — 10.03.2026 12:00
-
COVENANT uses the Filen (filen.io) cloud storage service for command-and-control (C2) operations.
First reported: 02.02.2026 23:002 sources, 5 articlesShow sources
- Russian hackers exploit recently patched Microsoft Office bug in attacks — www.bleepingcomputer.com — 02.02.2026 23:00
- APT28 Uses Microsoft Office CVE-2026-21509 in Espionage-Focused Malware Attacks — thehackernews.com — 03.02.2026 11:12
- APT28 Tied to CVE-2026-21513 MSHTML 0-Day Exploited Before Feb 2026 Patch Tuesday — thehackernews.com — 02.03.2026 12:36
- APT28-Linked Campaign Deploys BadPaw Loader and MeowMeow Backdoor in Ukraine — thehackernews.com — 05.03.2026 12:10
- APT28 hackers deploy customized variant of Covenant open-source tool — www.bleepingcomputer.com — 10.03.2026 12:00
-
APT28 used three more documents in attacks against various EU-based organizations, indicating that the campaign extends beyond Ukraine.
First reported: 02.02.2026 23:002 sources, 5 articlesShow sources
- Russian hackers exploit recently patched Microsoft Office bug in attacks — www.bleepingcomputer.com — 02.02.2026 23:00
- APT28 Uses Microsoft Office CVE-2026-21509 in Espionage-Focused Malware Attacks — thehackernews.com — 03.02.2026 11:12
- APT28 Tied to CVE-2026-21513 MSHTML 0-Day Exploited Before Feb 2026 Patch Tuesday — thehackernews.com — 02.03.2026 12:36
- APT28-Linked Campaign Deploys BadPaw Loader and MeowMeow Backdoor in Ukraine — thehackernews.com — 05.03.2026 12:10
- APT28 hackers deploy customized variant of Covenant open-source tool — www.bleepingcomputer.com — 10.03.2026 12:00
-
Organizations are recommended to apply the latest security update on Microsoft Office 2016, 2019, LTSC 2021, LTSC 2024, and Microsoft 365 Apps.
First reported: 02.02.2026 23:002 sources, 5 articlesShow sources
- Russian hackers exploit recently patched Microsoft Office bug in attacks — www.bleepingcomputer.com — 02.02.2026 23:00
- APT28 Uses Microsoft Office CVE-2026-21509 in Espionage-Focused Malware Attacks — thehackernews.com — 03.02.2026 11:12
- APT28 Tied to CVE-2026-21513 MSHTML 0-Day Exploited Before Feb 2026 Patch Tuesday — thehackernews.com — 02.03.2026 12:36
- APT28-Linked Campaign Deploys BadPaw Loader and MeowMeow Backdoor in Ukraine — thehackernews.com — 05.03.2026 12:10
- APT28 hackers deploy customized variant of Covenant open-source tool — www.bleepingcomputer.com — 10.03.2026 12:00
-
For Office 2021 and later, ensure users restart applications to allow the updates to be applied.
First reported: 02.02.2026 23:002 sources, 5 articlesShow sources
- Russian hackers exploit recently patched Microsoft Office bug in attacks — www.bleepingcomputer.com — 02.02.2026 23:00
- APT28 Uses Microsoft Office CVE-2026-21509 in Espionage-Focused Malware Attacks — thehackernews.com — 03.02.2026 11:12
- APT28 Tied to CVE-2026-21513 MSHTML 0-Day Exploited Before Feb 2026 Patch Tuesday — thehackernews.com — 02.03.2026 12:36
- APT28-Linked Campaign Deploys BadPaw Loader and MeowMeow Backdoor in Ukraine — thehackernews.com — 05.03.2026 12:10
- APT28 hackers deploy customized variant of Covenant open-source tool — www.bleepingcomputer.com — 10.03.2026 12:00
-
If immediate patching is impossible, it is recommended to implement the registry-based mitigation instructions.
First reported: 02.02.2026 23:002 sources, 5 articlesShow sources
- Russian hackers exploit recently patched Microsoft Office bug in attacks — www.bleepingcomputer.com — 02.02.2026 23:00
- APT28 Uses Microsoft Office CVE-2026-21509 in Espionage-Focused Malware Attacks — thehackernews.com — 03.02.2026 11:12
- APT28 Tied to CVE-2026-21513 MSHTML 0-Day Exploited Before Feb 2026 Patch Tuesday — thehackernews.com — 02.03.2026 12:36
- APT28-Linked Campaign Deploys BadPaw Loader and MeowMeow Backdoor in Ukraine — thehackernews.com — 05.03.2026 12:10
- APT28 hackers deploy customized variant of Covenant open-source tool — www.bleepingcomputer.com — 10.03.2026 12:00
-
Microsoft Defender’s Protected View adds an extra layer of defense by blocking malicious Office files originating from the Internet unless explicitly trusted.
First reported: 02.02.2026 23:002 sources, 5 articlesShow sources
- Russian hackers exploit recently patched Microsoft Office bug in attacks — www.bleepingcomputer.com — 02.02.2026 23:00
- APT28 Uses Microsoft Office CVE-2026-21509 in Espionage-Focused Malware Attacks — thehackernews.com — 03.02.2026 11:12
- APT28 Tied to CVE-2026-21513 MSHTML 0-Day Exploited Before Feb 2026 Patch Tuesday — thehackernews.com — 02.03.2026 12:36
- APT28-Linked Campaign Deploys BadPaw Loader and MeowMeow Backdoor in Ukraine — thehackernews.com — 05.03.2026 12:10
- APT28 hackers deploy customized variant of Covenant open-source tool — www.bleepingcomputer.com — 10.03.2026 12:00
-
APT28 exploited CVE-2026-21509, a security feature bypass in Microsoft Office, to deliver malware via malicious RTF files.
First reported: 03.02.2026 11:122 sources, 4 articlesShow sources
- APT28 Uses Microsoft Office CVE-2026-21509 in Espionage-Focused Malware Attacks — thehackernews.com — 03.02.2026 11:12
- APT28 Tied to CVE-2026-21513 MSHTML 0-Day Exploited Before Feb 2026 Patch Tuesday — thehackernews.com — 02.03.2026 12:36
- APT28-Linked Campaign Deploys BadPaw Loader and MeowMeow Backdoor in Ukraine — thehackernews.com — 05.03.2026 12:10
- APT28 hackers deploy customized variant of Covenant open-source tool — www.bleepingcomputer.com — 10.03.2026 12:00
-
The campaign, codenamed Operation Neusploit, targeted users in Ukraine, Slovakia, and Romania with localized social engineering lures.
First reported: 03.02.2026 11:122 sources, 4 articlesShow sources
- APT28 Uses Microsoft Office CVE-2026-21509 in Espionage-Focused Malware Attacks — thehackernews.com — 03.02.2026 11:12
- APT28 Tied to CVE-2026-21513 MSHTML 0-Day Exploited Before Feb 2026 Patch Tuesday — thehackernews.com — 02.03.2026 12:36
- APT28-Linked Campaign Deploys BadPaw Loader and MeowMeow Backdoor in Ukraine — thehackernews.com — 05.03.2026 12:10
- APT28 hackers deploy customized variant of Covenant open-source tool — www.bleepingcomputer.com — 10.03.2026 12:00
-
APT28 used server-side evasion techniques, responding with malicious payloads only when requests originated from targeted geographic regions and included the correct User-Agent HTTP header.
First reported: 03.02.2026 11:122 sources, 4 articlesShow sources
- APT28 Uses Microsoft Office CVE-2026-21509 in Espionage-Focused Malware Attacks — thehackernews.com — 03.02.2026 11:12
- APT28 Tied to CVE-2026-21513 MSHTML 0-Day Exploited Before Feb 2026 Patch Tuesday — thehackernews.com — 02.03.2026 12:36
- APT28-Linked Campaign Deploys BadPaw Loader and MeowMeow Backdoor in Ukraine — thehackernews.com — 05.03.2026 12:10
- APT28 hackers deploy customized variant of Covenant open-source tool — www.bleepingcomputer.com — 10.03.2026 12:00
-
The attack chains involved delivering two different versions of a dropper: one for MiniDoor, an Outlook email stealer, and another for PixyNetLoader, which deploys the COVENANT Grunt implant.
First reported: 03.02.2026 11:122 sources, 4 articlesShow sources
- APT28 Uses Microsoft Office CVE-2026-21509 in Espionage-Focused Malware Attacks — thehackernews.com — 03.02.2026 11:12
- APT28 Tied to CVE-2026-21513 MSHTML 0-Day Exploited Before Feb 2026 Patch Tuesday — thehackernews.com — 02.03.2026 12:36
- APT28-Linked Campaign Deploys BadPaw Loader and MeowMeow Backdoor in Ukraine — thehackernews.com — 05.03.2026 12:10
- APT28 hackers deploy customized variant of Covenant open-source tool — www.bleepingcomputer.com — 10.03.2026 12:00
-
MiniDoor steals emails from various folders (Inbox, Junk, and Drafts) and forwards them to hard-coded threat actor email addresses: ahmeclaw2002@outlook[.]com and ahmeclaw@proton[.]me.
First reported: 03.02.2026 11:122 sources, 4 articlesShow sources
- APT28 Uses Microsoft Office CVE-2026-21509 in Espionage-Focused Malware Attacks — thehackernews.com — 03.02.2026 11:12
- APT28 Tied to CVE-2026-21513 MSHTML 0-Day Exploited Before Feb 2026 Patch Tuesday — thehackernews.com — 02.03.2026 12:36
- APT28-Linked Campaign Deploys BadPaw Loader and MeowMeow Backdoor in Ukraine — thehackernews.com — 05.03.2026 12:10
- APT28 hackers deploy customized variant of Covenant open-source tool — www.bleepingcomputer.com — 10.03.2026 12:00
-
PixyNetLoader initiates an attack chain involving COM object hijacking, DLL proxying, and steganography to hide shellcode within a PNG image.
First reported: 03.02.2026 11:122 sources, 4 articlesShow sources
- APT28 Uses Microsoft Office CVE-2026-21509 in Espionage-Focused Malware Attacks — thehackernews.com — 03.02.2026 11:12
- APT28 Tied to CVE-2026-21513 MSHTML 0-Day Exploited Before Feb 2026 Patch Tuesday — thehackernews.com — 02.03.2026 12:36
- APT28-Linked Campaign Deploys BadPaw Loader and MeowMeow Backdoor in Ukraine — thehackernews.com — 05.03.2026 12:10
- APT28 hackers deploy customized variant of Covenant open-source tool — www.bleepingcomputer.com — 10.03.2026 12:00
-
The shellcode extracted from the PNG image loads a .NET assembly associated with the COVENANT command-and-control (C2) framework.
First reported: 03.02.2026 11:122 sources, 4 articlesShow sources
- APT28 Uses Microsoft Office CVE-2026-21509 in Espionage-Focused Malware Attacks — thehackernews.com — 03.02.2026 11:12
- APT28 Tied to CVE-2026-21513 MSHTML 0-Day Exploited Before Feb 2026 Patch Tuesday — thehackernews.com — 02.03.2026 12:36
- APT28-Linked Campaign Deploys BadPaw Loader and MeowMeow Backdoor in Ukraine — thehackernews.com — 05.03.2026 12:10
- APT28 hackers deploy customized variant of Covenant open-source tool — www.bleepingcomputer.com — 10.03.2026 12:00
-
The PixyNetLoader infection chain shares notable overlap with Operation Phantom Net Voxel, using similar techniques such as COM hijacking and DLL proxying.
First reported: 03.02.2026 11:122 sources, 4 articlesShow sources
- APT28 Uses Microsoft Office CVE-2026-21509 in Espionage-Focused Malware Attacks — thehackernews.com — 03.02.2026 11:12
- APT28 Tied to CVE-2026-21513 MSHTML 0-Day Exploited Before Feb 2026 Patch Tuesday — thehackernews.com — 02.03.2026 12:36
- APT28-Linked Campaign Deploys BadPaw Loader and MeowMeow Backdoor in Ukraine — thehackernews.com — 05.03.2026 12:10
- APT28 hackers deploy customized variant of Covenant open-source tool — www.bleepingcomputer.com — 10.03.2026 12:00
-
CERT-UA reported that APT28 targeted more than 60 email addresses associated with central executive authorities in Ukraine using Word documents exploiting CVE-2026-21509.
First reported: 03.02.2026 11:122 sources, 4 articlesShow sources
- APT28 Uses Microsoft Office CVE-2026-21509 in Espionage-Focused Malware Attacks — thehackernews.com — 03.02.2026 11:12
- APT28 Tied to CVE-2026-21513 MSHTML 0-Day Exploited Before Feb 2026 Patch Tuesday — thehackernews.com — 02.03.2026 12:36
- APT28-Linked Campaign Deploys BadPaw Loader and MeowMeow Backdoor in Ukraine — thehackernews.com — 05.03.2026 12:10
- APT28 hackers deploy customized variant of Covenant open-source tool — www.bleepingcomputer.com — 10.03.2026 12:00
-
The malicious documents triggered a WebDAV-based download chain that installed malware via COM hijacking, a malicious DLL (EhStoreShell.dll), shellcode hidden in an image file (SplashScreen.png), and a scheduled task (OneDriveHealth).
First reported: 03.02.2026 11:122 sources, 4 articlesShow sources
- APT28 Uses Microsoft Office CVE-2026-21509 in Espionage-Focused Malware Attacks — thehackernews.com — 03.02.2026 11:12
- APT28 Tied to CVE-2026-21513 MSHTML 0-Day Exploited Before Feb 2026 Patch Tuesday — thehackernews.com — 02.03.2026 12:36
- APT28-Linked Campaign Deploys BadPaw Loader and MeowMeow Backdoor in Ukraine — thehackernews.com — 05.03.2026 12:10
- APT28 hackers deploy customized variant of Covenant open-source tool — www.bleepingcomputer.com — 10.03.2026 12:00
-
APT28 exploited CVE-2026-21513, a high-severity security feature bypass in the MSHTML Framework, as a zero-day before it was patched in February 2026.
First reported: 02.03.2026 12:362 sources, 3 articlesShow sources
- APT28 Tied to CVE-2026-21513 MSHTML 0-Day Exploited Before Feb 2026 Patch Tuesday — thehackernews.com — 02.03.2026 12:36
- APT28-Linked Campaign Deploys BadPaw Loader and MeowMeow Backdoor in Ukraine — thehackernews.com — 05.03.2026 12:10
- APT28 hackers deploy customized variant of Covenant open-source tool — www.bleepingcomputer.com — 10.03.2026 12:00
-
The vulnerability allows an attacker to bypass security features by manipulating browser and Windows Shell handling, leading to potential code execution.
First reported: 02.03.2026 12:362 sources, 3 articlesShow sources
- APT28 Tied to CVE-2026-21513 MSHTML 0-Day Exploited Before Feb 2026 Patch Tuesday — thehackernews.com — 02.03.2026 12:36
- APT28-Linked Campaign Deploys BadPaw Loader and MeowMeow Backdoor in Ukraine — thehackernews.com — 05.03.2026 12:10
- APT28 hackers deploy customized variant of Covenant open-source tool — www.bleepingcomputer.com — 10.03.2026 12:00
-
APT28 used a malicious Windows Shortcut (LNK) file that embeds an HTML file to exploit CVE-2026-21513, initiating communication with the domain wellnesscaremed[.]com.
First reported: 02.03.2026 12:362 sources, 3 articlesShow sources
- APT28 Tied to CVE-2026-21513 MSHTML 0-Day Exploited Before Feb 2026 Patch Tuesday — thehackernews.com — 02.03.2026 12:36
- APT28-Linked Campaign Deploys BadPaw Loader and MeowMeow Backdoor in Ukraine — thehackernews.com — 05.03.2026 12:10
- APT28 hackers deploy customized variant of Covenant open-source tool — www.bleepingcomputer.com — 10.03.2026 12:00
-
The exploit leverages nested iframes and multiple DOM contexts to manipulate trust boundaries, bypassing Mark-of-the-Web (MotW) and Internet Explorer Enhanced Security Configuration (IE ESC).
First reported: 02.03.2026 12:362 sources, 3 articlesShow sources
- APT28 Tied to CVE-2026-21513 MSHTML 0-Day Exploited Before Feb 2026 Patch Tuesday — thehackernews.com — 02.03.2026 12:36
- APT28-Linked Campaign Deploys BadPaw Loader and MeowMeow Backdoor in Ukraine — thehackernews.com — 05.03.2026 12:10
- APT28 hackers deploy customized variant of Covenant open-source tool — www.bleepingcomputer.com — 10.03.2026 12:00
-
The technique allows execution of malicious code outside the browser sandbox via ShellExecuteExW.
First reported: 02.03.2026 12:362 sources, 3 articlesShow sources
- APT28 Tied to CVE-2026-21513 MSHTML 0-Day Exploited Before Feb 2026 Patch Tuesday — thehackernews.com — 02.03.2026 12:36
- APT28-Linked Campaign Deploys BadPaw Loader and MeowMeow Backdoor in Ukraine — thehackernews.com — 05.03.2026 12:10
- APT28 hackers deploy customized variant of Covenant open-source tool — www.bleepingcomputer.com — 10.03.2026 12:00
-
The vulnerable code path can be triggered through any component embedding MSHTML, suggesting additional delivery mechanisms beyond LNK-based phishing should be expected.
First reported: 02.03.2026 12:362 sources, 3 articlesShow sources
- APT28 Tied to CVE-2026-21513 MSHTML 0-Day Exploited Before Feb 2026 Patch Tuesday — thehackernews.com — 02.03.2026 12:36
- APT28-Linked Campaign Deploys BadPaw Loader and MeowMeow Backdoor in Ukraine — thehackernews.com — 05.03.2026 12:10
- APT28 hackers deploy customized variant of Covenant open-source tool — www.bleepingcomputer.com — 10.03.2026 12:00
-
APT28, also known as Fancy Bear, Forest Blizzard, Strontium, and Sednit, has been using a custom variant of the open-source Covenant post-exploitation framework for long-term espionage operations.
First reported: 10.03.2026 12:001 source, 1 articleShow sources
- APT28 hackers deploy customized variant of Covenant open-source tool — www.bleepingcomputer.com — 10.03.2026 12:00
-
Since April 2024, APT28 has used two implants named BeardShell and Covenant in their attacks.
First reported: 10.03.2026 12:002 sources, 2 articlesShow sources
- APT28 hackers deploy customized variant of Covenant open-source tool — www.bleepingcomputer.com — 10.03.2026 12:00
- APT28 Uses BEARDSHELL and COVENANT Malware to Spy on Ukrainian Military — thehackernews.com — 10.03.2026 12:55
-
BeardShell leverages the legitimate cloud storage service Icedrive for command-and-control (C2) communication and can execute PowerShell commands in a .NET runtime environment.
First reported: 10.03.2026 12:002 sources, 2 articlesShow sources
- APT28 hackers deploy customized variant of Covenant open-source tool — www.bleepingcomputer.com — 10.03.2026 12:00
- APT28 Uses BEARDSHELL and COVENANT Malware to Spy on Ukrainian Military — thehackernews.com — 10.03.2026 12:55
-
BeardShell uses a unique obfuscation technique previously seen in Xtunnel, a network-pivoting tool that APT28 used in the 2010s.
First reported: 10.03.2026 12:002 sources, 2 articlesShow sources
- APT28 hackers deploy customized variant of Covenant open-source tool — www.bleepingcomputer.com — 10.03.2026 12:00
- APT28 Uses BEARDSHELL and COVENANT Malware to Spy on Ukrainian Military — thehackernews.com — 10.03.2026 12:55
-
APT28 has modified the Covenant framework with deterministic implant identifiers tied to host characteristics, modified execution flow to evade behavioral detection, and new cloud-based communication protocols.
First reported: 10.03.2026 12:002 sources, 2 articlesShow sources
- APT28 hackers deploy customized variant of Covenant open-source tool — www.bleepingcomputer.com — 10.03.2026 12:00
- APT28 Uses BEARDSHELL and COVENANT Malware to Spy on Ukrainian Military — thehackernews.com — 10.03.2026 12:55
-
Since July 2025, APT28 has used the Filen cloud provider with Covenant, previously using Koofr and pCloud services.
First reported: 10.03.2026 12:002 sources, 2 articlesShow sources
- APT28 hackers deploy customized variant of Covenant open-source tool — www.bleepingcomputer.com — 10.03.2026 12:00
- APT28 Uses BEARDSHELL and COVENANT Malware to Spy on Ukrainian Military — thehackernews.com — 10.03.2026 12:55
-
Covenant is used as the primary implant, and BeardShell serves as the fallback tool.
First reported: 10.03.2026 12:002 sources, 2 articlesShow sources
- APT28 hackers deploy customized variant of Covenant open-source tool — www.bleepingcomputer.com — 10.03.2026 12:00
- APT28 Uses BEARDSHELL and COVENANT Malware to Spy on Ukrainian Military — thehackernews.com — 10.03.2026 12:55
-
ESET believes that APT28's advanced malware development team returned to activity in 2024, giving the threat group new long-term espionage capabilities.
First reported: 10.03.2026 12:002 sources, 2 articlesShow sources
- APT28 hackers deploy customized variant of Covenant open-source tool — www.bleepingcomputer.com — 10.03.2026 12:00
- APT28 Uses BEARDSHELL and COVENANT Malware to Spy on Ukrainian Military — thehackernews.com — 10.03.2026 12:55
-
The technical similarities with 2010-era malware indicate continuity in the threat group's development team.
First reported: 10.03.2026 12:002 sources, 2 articlesShow sources
- APT28 hackers deploy customized variant of Covenant open-source tool — www.bleepingcomputer.com — 10.03.2026 12:00
- APT28 Uses BEARDSHELL and COVENANT Malware to Spy on Ukrainian Military — thehackernews.com — 10.03.2026 12:55
-
APT28, also known as Blue Athena, BlueDelta, Fancy Bear, Fighting Ursa, Forest Blizzard, FROZENLAKE, Iron Twilight, ITG05, Pawn Storm, Sednit, Sofacy, and TA422, is affiliated with Unit 26165 of the Russian Federation's military intelligence agency GRU.
First reported: 10.03.2026 12:551 source, 1 articleShow sources
- APT28 Uses BEARDSHELL and COVENANT Malware to Spy on Ukrainian Military — thehackernews.com — 10.03.2026 12:55
-
APT28 has been using a malware family called SLIMAGENT, capable of logging keystrokes, capturing screenshots, and collecting clipboard data.
First reported: 10.03.2026 12:551 source, 1 articleShow sources
- APT28 Uses BEARDSHELL and COVENANT Malware to Spy on Ukrainian Military — thehackernews.com — 10.03.2026 12:55
-
SLIMAGENT has roots in XAgent, another implant used by APT28 in the 2010s to facilitate remote control and data exfiltration.
First reported: 10.03.2026 12:551 source, 1 articleShow sources
- APT28 Uses BEARDSHELL and COVENANT Malware to Spy on Ukrainian Military — thehackernews.com — 10.03.2026 12:55
-
SLIMAGENT emits espionage logs in HTML format, with the application name, logged keystrokes, and window name in blue, red, and green, respectively.
First reported: 10.03.2026 12:551 source, 1 articleShow sources
- APT28 Uses BEARDSHELL and COVENANT Malware to Spy on Ukrainian Military — thehackernews.com — 10.03.2026 12:55
-
BEARDSHELL uses a distinctive obfuscation technique called opaque predicate, also found in XTunnel, a network traversal and pivoting tool used by APT28.
First reported: 10.03.2026 12:551 source, 1 articleShow sources
- APT28 Uses BEARDSHELL and COVENANT Malware to Spy on Ukrainian Military — thehackernews.com — 10.03.2026 12:55
-
APT28's COVENANT variant has been using Filen cloud storage service for C2 since July 2025, previously using pCloud in 2023 and Koofr in 2024-2025.
First reported: 10.03.2026 12:551 source, 1 articleShow sources
- APT28 Uses BEARDSHELL and COVENANT Malware to Spy on Ukrainian Military — thehackernews.com — 10.03.2026 12:55
-
APT28 deployed Graphite, a backdoor that used OneDrive for C2, and PowerShell Empire in attacks targeting high-ranking government officials and individuals in the defense sector in Western Asia in 2021.
First reported: 10.03.2026 12:551 source, 1 articleShow sources
- APT28 Uses BEARDSHELL and COVENANT Malware to Spy on Ukrainian Military — thehackernews.com — 10.03.2026 12:55
Similar Happenings
Malicious Go Crypto Module Exploits Namespace Confusion to Deploy Rekoobe Backdoor
A malicious Go module named github[.]com/xinfeisoft/crypto impersonates the legitimate "golang.org/x/crypto" codebase to steal passwords and deploy the Rekoobe Linux backdoor. The module exploits namespace confusion to inject malicious code that exfiltrates secrets entered via terminal password prompts and executes a shell script that creates persistent access via SSH and loosens firewall restrictions. The campaign targets high-value boundaries like ReadPassword() and uses GitHub Raw as a rotating pointer for infrastructure rotation. The package remains listed on pkg.go.dev but has been blocked by the Go security team. The Rekoobe backdoor, known since 2015, is capable of receiving commands to download more payloads, steal files, and execute a reverse shell. It has been used by Chinese nation-state groups like APT31.
UNC2814 Campaign Targeting Telecom and Government Networks
A suspected Chinese threat actor, tracked as UNC2814, has conducted a global espionage campaign since at least 2017, targeting telecom and government networks. The campaign has impacted 53 organizations in 42 countries, with suspected infections in at least 20 more. The actor deployed a new C-based backdoor named GRIDTIDE, which abuses the Google Sheets API for command-and-control (C2) operations. The initial access vector is unknown, but previous exploits involved flaws in web servers and edge systems. GRIDTIDE performs host reconnaissance and supports commands for executing bash commands, uploading, and downloading files. Google, Mandiant, and partners disrupted the campaign by terminating associated Google Cloud projects and disabling known infrastructure. Organizations impacted by GRIDTIDE were notified, and support was offered to clean the infections. Google expects UNC2814 to resume activity using new infrastructure in the near future.
Infostealer Malware Targets OpenClaw Configuration Files
Infostealer malware has been observed stealing OpenClaw configuration files containing API keys, authentication tokens, and other sensitive secrets. This marks the first known instance of such attacks targeting the popular AI assistant framework. The stolen data includes configuration details, authentication tokens, and persistent memory files, which could enable full compromise of the victim's digital identity. The malware, identified as a variant of the Vidar infostealer, executed a broad file-stealing routine that scanned for sensitive keywords. Researchers predict increased targeting of OpenClaw as it becomes more integrated into professional workflows. Additionally, security issues with OpenClaw have prompted the maintainers to partner with VirusTotal to scan for malicious skills uploaded to ClawHub, establish a threat model, and add the ability to audit for potential misconfigurations.
Vulnerabilities in Cloud-Based Password Managers Enable Full Vault Compromise
Researchers from ETH Zurich and USI discovered 27 vulnerabilities in Bitwarden, LastPass, Dashlane, and 1Password that could allow attackers to view and modify stored passwords. The flaws challenge the 'zero-knowledge encryption' claims of these services, with attacks ranging from integrity violations to complete vault compromise. The vulnerabilities were disclosed to the vendors, and remediation is underway. The researchers developed attack scenarios exploiting key escrow, vault encryption, sharing, and backwards compatibility features. Bitwarden was found to have a critical flaw in its organization onboarding process, allowing malicious auto-enrolment attacks. 1Password's use of a high-entropy cryptographic key provides it with a security advantage. Dashlane patched a downgrade attack vulnerability in November 2025. Bitwarden is addressing seven issues and accepting three as intentional design decisions. LastPass is working to enhance integrity guarantees.
Lotus Blossom Hacking Group Exploits Notepad++ Hosting Breach to Deploy Chrysalis Backdoor
The China-linked Lotus Blossom hacking group exploited a hosting provider breach to deliver a previously undocumented backdoor, Chrysalis, to Notepad++ users. The attack, which occurred between June and December 2025, involved hijacking update traffic and exploiting insufficient update verification controls in older versions of the software. The group used a multi-layered shellcode loader and integrated undocumented system calls to enhance stealth and resilience. The breach was discovered and mitigated in December 2025, with Notepad++ migrating to a new hosting provider and rotating all credentials. The Chrysalis backdoor is a feature-rich implant capable of gathering system information, executing commands, and maintaining persistence. It communicates with a command-and-control (C2) server to receive additional instructions. The C2 server is currently offline, but the malware's capabilities suggest ongoing development and adaptation by the threat actor.