Amazon Disrupts GRU-Affiliated APT44 Campaign Targeting Critical Infrastructure
Summary
Hide ▲
Show ▼
Amazon has disrupted a years-long Russian state-sponsored campaign targeting Western critical infrastructure, including energy sector organizations and cloud-hosted network infrastructure. The campaign, attributed to the GRU-affiliated APT44 group, initially leveraged vulnerabilities in WatchGuard Firebox and XTM, Atlassian Confluence, and Veeam to gain initial access. However, starting in 2025, APT44 shifted its tactics to target misconfigured network edge devices, reducing their exposure and resource expenditure. The group targeted enterprise routers, VPN concentrators, network management appliances, and cloud-based project management systems to harvest credentials and establish persistent access. Amazon's intervention led to the disruption of the campaign, highlighting the ongoing threat posed by state-sponsored cyber actors. APT44, also known as FROZENBARENTS, Sandworm, Seashell Blizzard, and Voodoo Bear, has been active since at least 2021. The group exploited vulnerabilities in WatchGuard Firebox and XTM (CVE-2022-26318), Atlassian Confluence (CVE-2021-26084, CVE-2023-22518), and Veeam (CVE-2023-27532) to compromise network edge devices. The campaign involved credential replay attacks and targeted energy, technology/cloud services, and telecom service providers across North America, Western and Eastern Europe, and the Middle East. Amazon's threat intelligence team identified and notified affected customers, disrupting active threat actor operations. Additionally, APT28, another GRU-affiliated group, has been conducting a sustained credential-harvesting campaign targeting users of UKR[.]net, a webmail and news service popular in Ukraine. The campaign, observed between June 2024 and April 2025, involves deploying UKR[.]net-themed login pages on legitimate services like Mocky to entice recipients into entering their credentials and 2FA codes. Links to these pages are embedded within PDF documents distributed via phishing emails, often shortened using services like tiny[.]cc or tinyurl[.]com. In some cases, APT28 uses subdomains created on platforms like Blogger (*.blogspot[.]com) to launch a two-tier redirection chain leading to the credential harvesting page. The campaign is part of a broader set of phishing and credential theft operations targeting various institutions in pursuit of Russia's strategic objectives. APT28's recent campaign targeted Turkish renewable energy scientists with a climate change policy document from a real Middle Eastern think tank. The group used phishing emails themed to match their intended targets and written in the targets' native tongues. Victims were redirected to a login page mimicking a legitimate online service after following a link in a phishing email. APT28 used regular hosted services rather than custom tools and infrastructure for their attacks. The targets included an IT integrator based in Uzbekistan, a European think tank, a military organization in North Macedonia, and scientists and researchers associated with a Turkish energy and nuclear research organization. The campaign was highly selective and consistent with GRU collection priorities, aligning with geopolitical, military, or strategic intelligence objectives. APT28 has been targeting organizations associated with energy research, defense collaboration, and government communication in a new credential-harvesting campaign. The group used phishing pages impersonating Microsoft Outlook Web Access (OWA), Google, and Sophos VPN portals. Victims were redirected to legitimate domains after entering their credentials. APT28 relied heavily on free hosting and tunneling services such as Webhook.site, InfinityFree, Byet Internet Services, and Ngrok to host phishing content, capture user data, and manage redirections. In February 2025, APT28 deployed a Microsoft OWA phishing page and used the ShortURL link-shortening service for the first-stage redirection. The group employed a webhook relying on HTML to load a PDF lure document in the browser for two seconds before redirecting the victim to a second webhook hosting the spoofed OWA login page. In July, APT28 deployed a spoofed OWA login portal containing Turkish-language text and targeting Turkish scientists and researchers. In June, APT28 deployed a spoofed Sophos VPN password reset page hosted on InfinityFree infrastructure. In September, APT28 hosted two spoofed OWA expired password pages on an InfinityFree domain. In April, Recorded Future discovered a spoofed Google password reset page in Portuguese, hosted on a free apex domain from Byet Internet Services. APT28 abused Ngrok's free service to connect servers behind a firewall to a proxy server and expose that server to the internet without changing firewall rules. APT28's ability to adapt its infrastructure and rebrand credential-harvesting pages suggests it will continue to abuse free hosting, tunneling, and link-shortening services to reduce operational costs and obscure attribution.
Timeline
-
09.01.2026 09:00 1 articles · 4d ago
APT28 targets organizations in Balkans, Middle East, and Central Asia
APT28 conducted a credential-harvesting campaign targeting specific organizations in the Balkans, the Middle East, and Central Asia. The campaign involved phishing emails themed to match the intended targets and written in their native tongues. Victims were redirected to login pages mimicking legitimate online services after following links in the phishing emails. APT28 used regular hosted services rather than custom tools and infrastructure for their attacks. The targets included an IT integrator based in Uzbekistan, a European think tank, a military organization in North Macedonia, and scientists and researchers associated with a Turkish energy and nuclear research organization. The campaign was highly selective and consistent with GRU collection priorities, aligning with geopolitical, military, or strategic intelligence objectives.
Show sources
- Notorious Russian APT Nabs Credentials From Global Targets — www.darkreading.com — 09.01.2026 09:00
-
17.12.2025 17:30 4 articles · 26d ago
APT28 conducts sustained credential-harvesting campaign targeting UKR[.]net users
APT28 targeted Turkish renewable energy scientists with a climate change policy document from a real Middle Eastern think tank. The group used phishing emails themed to match their intended targets and written in the targets' native tongues. Victims were redirected to a login page mimicking a legitimate online service after following a link in a phishing email. APT28 used regular hosted services rather than custom tools and infrastructure for their attacks. The targets included an IT integrator based in Uzbekistan, a European think tank, a military organization in North Macedonia, and scientists and researchers associated with a Turkish energy and nuclear research organization. The campaign was highly selective and consistent with GRU collection priorities, aligning with geopolitical, military, or strategic intelligence objectives. APT28 has been targeting organizations associated with energy research, defense collaboration, and government communication in a new credential-harvesting campaign. The group used phishing pages impersonating Microsoft Outlook Web Access (OWA), Google, and Sophos VPN portals. Victims were redirected to legitimate domains after entering their credentials. APT28 relied heavily on free hosting and tunneling services such as Webhook.site, InfinityFree, Byet Internet Services, and Ngrok to host phishing content, capture user data, and manage redirections. In February 2025, APT28 deployed a Microsoft OWA phishing page and used the ShortURL link-shortening service for the first-stage redirection. The group employed a webhook relying on HTML to load a PDF lure document in the browser for two seconds before redirecting the victim to a second webhook hosting the spoofed OWA login page. In July, APT28 deployed a spoofed OWA login portal containing Turkish-language text and targeting Turkish scientists and researchers. In June, APT28 deployed a spoofed Sophos VPN password reset page hosted on InfinityFree infrastructure. In September, APT28 hosted two spoofed OWA expired password pages on an InfinityFree domain. In April, Recorded Future discovered a spoofed Google password reset page in Portuguese, hosted on a free apex domain from Byet Internet Services. APT28 abused Ngrok's free service to connect servers behind a firewall to a proxy server and expose that server to the internet without changing firewall rules. APT28's ability to adapt its infrastructure and rebrand credential-harvesting pages suggests it will continue to abuse free hosting, tunneling, and link-shortening services to reduce operational costs and obscure attribution.
Show sources
- APT28 Targets Ukrainian UKR-net Users in Long-Running Credential Phishing Campaign — thehackernews.com — 17.12.2025 17:30
- Notorious Russian APT Nabs Credentials From Global Targets — www.darkreading.com — 09.01.2026 09:00
- Russian APT28 Runs Credential-Stealing Campaign Targeting Energy and Policy Organizations — thehackernews.com — 09.01.2026 17:28
- Russia’s APT28 Targeting Energy Research, Defense Collaboration Entities — www.securityweek.com — 12.01.2026 14:23
-
16.12.2025 14:27 5 articles · 27d ago
APT44 targets Western critical infrastructure with misconfigured network edge devices
The campaign targeted critical organizations in North America, Europe, and the Middle East, with a notable focus on the energy sector. Attackers targeted enterprise routers, routing infrastructure, VPN concentrators, network management appliances, collaboration platforms, and cloud-based project management systems. The shift toward targeting misconfigured network edge devices began gradually between 2021 and 2025. In 2021, the threat cluster exploited WatchGuard flaw CVE-2022-26318. Between 2022 and 2023, threat actors targeted Confluence vulnerabilities CVE-2021-26084 and CVE-2023-22518. In 2024, attackers targeted Veeam flaw CVE-2023-27532. The primary credential extraction mechanism appeared to be packet capture and traffic analysis. Amazon identified and notified customers with compromised network appliances, enabled remediation of compromised EC2 resources, shared intelligence with partners and affected vendors, and reported observations to network appliance vendors.
Show sources
- Amazon Exposes Years-Long GRU Cyber Campaign Targeting Energy and Cloud Infrastructure — thehackernews.com — 16.12.2025 14:27
- Amazon: Russian Hackers Now Favor Misconfigurations in Critical Infrastructure Attacks — www.securityweek.com — 16.12.2025 15:22
- Amazon disrupts Russian GRU hackers attacking edge network devices — www.bleepingcomputer.com — 16.12.2025 22:13
- Russia Hits Critical Orgs Via Misconfigured Edge Devices — www.darkreading.com — 16.12.2025 22:03
- APT28 Targets Ukrainian UKR-net Users in Long-Running Credential Phishing Campaign — thehackernews.com — 17.12.2025 17:30
-
29.08.2025 16:22 2 articles · 4mo ago
Amazon disrupts APT29 watering hole campaign targeting Microsoft device code authentication
The campaign targeted Microsoft 365 accounts and data. APT29 has previously targeted European embassies, Hewlett Packard Enterprise, and TeamViewer. Amazon's threat intelligence team discovered the domain names used in the watering hole campaign. The campaign used a cookie-based system to prevent the same user from being redirected multiple times. Amazon isolated the EC2 instances used by the threat actor and partnered with Cloudflare and Microsoft to disrupt the identified domains. APT29 attempted to move its infrastructure to another cloud provider and registered new domain names. The campaign reflects an evolution in APT29's technical approach, no longer relying on domains that impersonate AWS or social engineering attempts to bypass multi-factor authentication (MFA).
Show sources
- Amazon Disrupts APT29 Watering Hole Campaign Abusing Microsoft Device Code Authentication — thehackernews.com — 29.08.2025 16:22
- Amazon disrupts Russian APT29 hackers targeting Microsoft 365 — www.bleepingcomputer.com — 01.09.2025 18:35
Information Snippets
-
APT29, also known as BlueBravo, Cloaked Ursa, CozyLarch, Cozy Bear, Earth Koshchei, ICECAP, Midnight Blizzard, and The Dukes, is a state-sponsored hacking group tied to Russia's Foreign Intelligence Service (SVR).
First reported: 29.08.2025 16:222 sources, 3 articlesShow sources
- Amazon Disrupts APT29 Watering Hole Campaign Abusing Microsoft Device Code Authentication — thehackernews.com — 29.08.2025 16:22
- Amazon disrupts Russian APT29 hackers targeting Microsoft 365 — www.bleepingcomputer.com — 01.09.2025 18:35
- Amazon Exposes Years-Long GRU Cyber Campaign Targeting Energy and Cloud Infrastructure — thehackernews.com — 16.12.2025 14:27
-
The campaign used compromised websites to redirect visitors to malicious infrastructure designed to trick users into authorizing attacker-controlled devices through Microsoft's device code authentication flow.
First reported: 29.08.2025 16:222 sources, 2 articlesShow sources
- Amazon Disrupts APT29 Watering Hole Campaign Abusing Microsoft Device Code Authentication — thehackernews.com — 29.08.2025 16:22
- Amazon disrupts Russian APT29 hackers targeting Microsoft 365 — www.bleepingcomputer.com — 01.09.2025 18:35
-
APT29 has been linked to attacks leveraging malicious Remote Desktop Protocol (RDP) configuration files to target Ukrainian entities and exfiltrate sensitive data.
First reported: 29.08.2025 16:221 source, 1 articleShow sources
- Amazon Disrupts APT29 Watering Hole Campaign Abusing Microsoft Device Code Authentication — thehackernews.com — 29.08.2025 16:22
-
The adversarial collective has been observed adopting various phishing methods, including device code phishing and device join phishing, to obtain unauthorized access to Microsoft 365 accounts.
First reported: 29.08.2025 16:221 source, 1 articleShow sources
- Amazon Disrupts APT29 Watering Hole Campaign Abusing Microsoft Device Code Authentication — thehackernews.com — 29.08.2025 16:22
-
The campaign involved injecting JavaScript into compromised websites to redirect approximately 10% of visitors to actor-controlled domains.
First reported: 29.08.2025 16:222 sources, 2 articlesShow sources
- Amazon Disrupts APT29 Watering Hole Campaign Abusing Microsoft Device Code Authentication — thehackernews.com — 29.08.2025 16:22
- Amazon disrupts Russian APT29 hackers targeting Microsoft 365 — www.bleepingcomputer.com — 01.09.2025 18:35
-
The actor-controlled domains mimicked Cloudflare verification pages to deceive users into entering legitimate device codes, granting attackers access to Microsoft accounts and data.
First reported: 29.08.2025 16:222 sources, 2 articlesShow sources
- Amazon Disrupts APT29 Watering Hole Campaign Abusing Microsoft Device Code Authentication — thehackernews.com — 29.08.2025 16:22
- Amazon disrupts Russian APT29 hackers targeting Microsoft 365 — www.bleepingcomputer.com — 01.09.2025 18:35
-
The campaign employed evasion techniques such as Base64 encoding to conceal malicious code, setting cookies to prevent repeated redirects of the same visitor, and shifting to new infrastructure when blocked.
First reported: 29.08.2025 16:222 sources, 2 articlesShow sources
- Amazon Disrupts APT29 Watering Hole Campaign Abusing Microsoft Device Code Authentication — thehackernews.com — 29.08.2025 16:22
- Amazon disrupts Russian APT29 hackers targeting Microsoft 365 — www.bleepingcomputer.com — 01.09.2025 18:35
-
Amazon's intervention led to the disruption of the campaign, despite APT29's attempts to migrate to new infrastructure.
First reported: 29.08.2025 16:222 sources, 2 articlesShow sources
- Amazon Disrupts APT29 Watering Hole Campaign Abusing Microsoft Device Code Authentication — thehackernews.com — 29.08.2025 16:22
- Amazon disrupts Russian APT29 hackers targeting Microsoft 365 — www.bleepingcomputer.com — 01.09.2025 18:35
-
The campaign targeted Microsoft 365 accounts and data.
First reported: 01.09.2025 18:351 source, 1 articleShow sources
- Amazon disrupts Russian APT29 hackers targeting Microsoft 365 — www.bleepingcomputer.com — 01.09.2025 18:35
-
APT29 has previously targeted European embassies, Hewlett Packard Enterprise, and TeamViewer.
First reported: 01.09.2025 18:351 source, 1 articleShow sources
- Amazon disrupts Russian APT29 hackers targeting Microsoft 365 — www.bleepingcomputer.com — 01.09.2025 18:35
-
Amazon's threat intelligence team discovered the domain names used in the watering hole campaign.
First reported: 01.09.2025 18:351 source, 1 articleShow sources
- Amazon disrupts Russian APT29 hackers targeting Microsoft 365 — www.bleepingcomputer.com — 01.09.2025 18:35
-
The campaign used a cookie-based system to prevent the same user from being redirected multiple times.
First reported: 01.09.2025 18:352 sources, 2 articlesShow sources
- Amazon disrupts Russian APT29 hackers targeting Microsoft 365 — www.bleepingcomputer.com — 01.09.2025 18:35
- Russia Hits Critical Orgs Via Misconfigured Edge Devices — www.darkreading.com — 16.12.2025 22:03
-
Amazon isolated the EC2 instances used by the threat actor and partnered with Cloudflare and Microsoft to disrupt the identified domains.
First reported: 01.09.2025 18:351 source, 1 articleShow sources
- Amazon disrupts Russian APT29 hackers targeting Microsoft 365 — www.bleepingcomputer.com — 01.09.2025 18:35
-
APT29 attempted to move its infrastructure to another cloud provider and registered new domain names.
First reported: 01.09.2025 18:351 source, 1 articleShow sources
- Amazon disrupts Russian APT29 hackers targeting Microsoft 365 — www.bleepingcomputer.com — 01.09.2025 18:35
-
The campaign reflects an evolution in APT29's technical approach, no longer relying on domains that impersonate AWS or social engineering attempts to bypass multi-factor authentication (MFA).
First reported: 01.09.2025 18:351 source, 1 articleShow sources
- Amazon disrupts Russian APT29 hackers targeting Microsoft 365 — www.bleepingcomputer.com — 01.09.2025 18:35
-
Users are advised to verify device authorization requests, enable multi-factor authentication (MFA), and avoid executing commands copied from webpages.
First reported: 01.09.2025 18:351 source, 1 articleShow sources
- Amazon disrupts Russian APT29 hackers targeting Microsoft 365 — www.bleepingcomputer.com — 01.09.2025 18:35
-
Administrators should disable unnecessary device authorization flaws, enforce conditional access policies, and monitor for suspicious authentication events.
First reported: 01.09.2025 18:351 source, 1 articleShow sources
- Amazon disrupts Russian APT29 hackers targeting Microsoft 365 — www.bleepingcomputer.com — 01.09.2025 18:35
-
Amazon's infrastructure and services were not compromised by the campaign.
First reported: 01.09.2025 18:351 source, 1 articleShow sources
- Amazon disrupts Russian APT29 hackers targeting Microsoft 365 — www.bleepingcomputer.com — 01.09.2025 18:35
-
APT44, also known as FROZENBARENTS, Sandworm, Seashell Blizzard, and Voodoo Bear, is a GRU-affiliated cyber threat group.
First reported: 16.12.2025 14:273 sources, 4 articlesShow sources
- Amazon Exposes Years-Long GRU Cyber Campaign Targeting Energy and Cloud Infrastructure — thehackernews.com — 16.12.2025 14:27
- Amazon: Russian Hackers Now Favor Misconfigurations in Critical Infrastructure Attacks — www.securityweek.com — 16.12.2025 15:22
- Amazon disrupts Russian GRU hackers attacking edge network devices — www.bleepingcomputer.com — 16.12.2025 22:13
- APT28 Targets Ukrainian UKR-net Users in Long-Running Credential Phishing Campaign — thehackernews.com — 17.12.2025 17:30
-
APT44 targeted Western critical infrastructure, including energy sector organizations, between 2021 and 2025.
First reported: 16.12.2025 14:274 sources, 5 articlesShow sources
- Amazon Exposes Years-Long GRU Cyber Campaign Targeting Energy and Cloud Infrastructure — thehackernews.com — 16.12.2025 14:27
- Amazon: Russian Hackers Now Favor Misconfigurations in Critical Infrastructure Attacks — www.securityweek.com — 16.12.2025 15:22
- Amazon disrupts Russian GRU hackers attacking edge network devices — www.bleepingcomputer.com — 16.12.2025 22:13
- Russia Hits Critical Orgs Via Misconfigured Edge Devices — www.darkreading.com — 16.12.2025 22:03
- APT28 Targets Ukrainian UKR-net Users in Long-Running Credential Phishing Campaign — thehackernews.com — 17.12.2025 17:30
-
APT44 exploited misconfigured customer network edge devices as initial access vectors.
First reported: 16.12.2025 14:274 sources, 4 articlesShow sources
- Amazon Exposes Years-Long GRU Cyber Campaign Targeting Energy and Cloud Infrastructure — thehackernews.com — 16.12.2025 14:27
- Amazon: Russian Hackers Now Favor Misconfigurations in Critical Infrastructure Attacks — www.securityweek.com — 16.12.2025 15:22
- Amazon disrupts Russian GRU hackers attacking edge network devices — www.bleepingcomputer.com — 16.12.2025 22:13
- Russia Hits Critical Orgs Via Misconfigured Edge Devices — www.darkreading.com — 16.12.2025 22:03
-
APT44 leveraged vulnerabilities in WatchGuard Firebox and XTM (CVE-2022-26318), Atlassian Confluence (CVE-2021-26084, CVE-2023-22518), and Veeam (CVE-2023-27532).
First reported: 16.12.2025 14:274 sources, 4 articlesShow sources
- Amazon Exposes Years-Long GRU Cyber Campaign Targeting Energy and Cloud Infrastructure — thehackernews.com — 16.12.2025 14:27
- Amazon: Russian Hackers Now Favor Misconfigurations in Critical Infrastructure Attacks — www.securityweek.com — 16.12.2025 15:22
- Amazon disrupts Russian GRU hackers attacking edge network devices — www.bleepingcomputer.com — 16.12.2025 22:13
- Russia Hits Critical Orgs Via Misconfigured Edge Devices — www.darkreading.com — 16.12.2025 22:03
-
APT44 targeted enterprise routers, VPN concentrators, network management appliances, and cloud-based project management systems.
First reported: 16.12.2025 14:274 sources, 4 articlesShow sources
- Amazon Exposes Years-Long GRU Cyber Campaign Targeting Energy and Cloud Infrastructure — thehackernews.com — 16.12.2025 14:27
- Amazon: Russian Hackers Now Favor Misconfigurations in Critical Infrastructure Attacks — www.securityweek.com — 16.12.2025 15:22
- Amazon disrupts Russian GRU hackers attacking edge network devices — www.bleepingcomputer.com — 16.12.2025 22:13
- Russia Hits Critical Orgs Via Misconfigured Edge Devices — www.darkreading.com — 16.12.2025 22:03
-
APT44 conducted credential replay attacks against victim organizations' online services.
First reported: 16.12.2025 14:274 sources, 4 articlesShow sources
- Amazon Exposes Years-Long GRU Cyber Campaign Targeting Energy and Cloud Infrastructure — thehackernews.com — 16.12.2025 14:27
- Amazon: Russian Hackers Now Favor Misconfigurations in Critical Infrastructure Attacks — www.securityweek.com — 16.12.2025 15:22
- Amazon disrupts Russian GRU hackers attacking edge network devices — www.bleepingcomputer.com — 16.12.2025 22:13
- Russia Hits Critical Orgs Via Misconfigured Edge Devices — www.darkreading.com — 16.12.2025 22:03
-
APT44's activities were linked to infrastructure overlaps with the Curly COMrades cluster tracked by Bitdefender.
First reported: 16.12.2025 14:274 sources, 4 articlesShow sources
- Amazon Exposes Years-Long GRU Cyber Campaign Targeting Energy and Cloud Infrastructure — thehackernews.com — 16.12.2025 14:27
- Amazon: Russian Hackers Now Favor Misconfigurations in Critical Infrastructure Attacks — www.securityweek.com — 16.12.2025 15:22
- Amazon disrupts Russian GRU hackers attacking edge network devices — www.bleepingcomputer.com — 16.12.2025 22:13
- Russia Hits Critical Orgs Via Misconfigured Edge Devices — www.darkreading.com — 16.12.2025 22:03
-
Amazon identified and notified affected customers and disrupted active threat actor operations targeting its cloud services.
First reported: 16.12.2025 14:274 sources, 4 articlesShow sources
- Amazon Exposes Years-Long GRU Cyber Campaign Targeting Energy and Cloud Infrastructure — thehackernews.com — 16.12.2025 14:27
- Amazon: Russian Hackers Now Favor Misconfigurations in Critical Infrastructure Attacks — www.securityweek.com — 16.12.2025 15:22
- Amazon disrupts Russian GRU hackers attacking edge network devices — www.bleepingcomputer.com — 16.12.2025 22:13
- Russia Hits Critical Orgs Via Misconfigured Edge Devices — www.darkreading.com — 16.12.2025 22:03
-
APT44 has shifted focus from exploiting vulnerabilities to targeting misconfigured network edge devices starting in 2025.
First reported: 16.12.2025 15:223 sources, 3 articlesShow sources
- Amazon: Russian Hackers Now Favor Misconfigurations in Critical Infrastructure Attacks — www.securityweek.com — 16.12.2025 15:22
- Amazon disrupts Russian GRU hackers attacking edge network devices — www.bleepingcomputer.com — 16.12.2025 22:13
- Russia Hits Critical Orgs Via Misconfigured Edge Devices — www.darkreading.com — 16.12.2025 22:03
-
APT44 leveraged native packet-capture capabilities to intercept traffic and collect credentials.
First reported: 16.12.2025 15:223 sources, 3 articlesShow sources
- Amazon: Russian Hackers Now Favor Misconfigurations in Critical Infrastructure Attacks — www.securityweek.com — 16.12.2025 15:22
- Amazon disrupts Russian GRU hackers attacking edge network devices — www.bleepingcomputer.com — 16.12.2025 22:13
- Russia Hits Critical Orgs Via Misconfigured Edge Devices — www.darkreading.com — 16.12.2025 22:03
-
Amazon's monitoring of attacks was facilitated by the fact that targeted network edge devices were hosted on AWS.
First reported: 16.12.2025 15:223 sources, 3 articlesShow sources
- Amazon: Russian Hackers Now Favor Misconfigurations in Critical Infrastructure Attacks — www.securityweek.com — 16.12.2025 15:22
- Amazon disrupts Russian GRU hackers attacking edge network devices — www.bleepingcomputer.com — 16.12.2025 22:13
- Russia Hits Critical Orgs Via Misconfigured Edge Devices — www.darkreading.com — 16.12.2025 22:03
-
Amazon Threat Intelligence team disrupted active operations attributed to GRU hackers targeting cloud infrastructure.
First reported: 16.12.2025 22:032 sources, 2 articlesShow sources
- Amazon disrupts Russian GRU hackers attacking edge network devices — www.bleepingcomputer.com — 16.12.2025 22:13
- Russia Hits Critical Orgs Via Misconfigured Edge Devices — www.darkreading.com — 16.12.2025 22:03
-
GRU hackers targeted Western critical infrastructure, especially the energy sector, starting in 2021.
First reported: 16.12.2025 22:032 sources, 2 articlesShow sources
- Amazon disrupts Russian GRU hackers attacking edge network devices — www.bleepingcomputer.com — 16.12.2025 22:13
- Russia Hits Critical Orgs Via Misconfigured Edge Devices — www.darkreading.com — 16.12.2025 22:03
-
Threat actor shifted from exploiting vulnerabilities to leveraging misconfigured edge devices for initial access.
First reported: 16.12.2025 22:032 sources, 2 articlesShow sources
- Amazon disrupts Russian GRU hackers attacking edge network devices — www.bleepingcomputer.com — 16.12.2025 22:13
- Russia Hits Critical Orgs Via Misconfigured Edge Devices — www.darkreading.com — 16.12.2025 22:03
-
Up to 2024, the campaign exploited vulnerabilities in WatchGuard, Confluence, and Veeam as primary initial access vectors.
First reported: 16.12.2025 22:032 sources, 2 articlesShow sources
- Amazon disrupts Russian GRU hackers attacking edge network devices — www.bleepingcomputer.com — 16.12.2025 22:13
- Russia Hits Critical Orgs Via Misconfigured Edge Devices — www.darkreading.com — 16.12.2025 22:03
-
In 2025, the threat actor relied less on vulnerabilities and more on targeting misconfigured customer network edge devices.
First reported: 16.12.2025 22:032 sources, 2 articlesShow sources
- Amazon disrupts Russian GRU hackers attacking edge network devices — www.bleepingcomputer.com — 16.12.2025 22:13
- Russia Hits Critical Orgs Via Misconfigured Edge Devices — www.darkreading.com — 16.12.2025 22:03
-
Targeted devices included enterprise routers, VPN gateways, network management appliances, collaboration platforms, and cloud-based project management solutions.
First reported: 16.12.2025 22:032 sources, 2 articlesShow sources
- Amazon disrupts Russian GRU hackers attacking edge network devices — www.bleepingcomputer.com — 16.12.2025 22:13
- Russia Hits Critical Orgs Via Misconfigured Edge Devices — www.darkreading.com — 16.12.2025 22:03
-
Threat actor's shift in operational tempo represents a concerning evolution, maintaining focus on misconfigured devices while reducing investment in zero-day and N-day exploitation.
First reported: 16.12.2025 22:032 sources, 2 articlesShow sources
- Amazon disrupts Russian GRU hackers attacking edge network devices — www.bleepingcomputer.com — 16.12.2025 22:13
- Russia Hits Critical Orgs Via Misconfigured Edge Devices — www.darkreading.com — 16.12.2025 22:03
-
Tactical evolution did not reflect any change in the group's operational objectives: stealing credentials and moving laterally on the victim network with minimal exposure and resources.
First reported: 16.12.2025 22:032 sources, 2 articlesShow sources
- Amazon disrupts Russian GRU hackers attacking edge network devices — www.bleepingcomputer.com — 16.12.2025 22:13
- Russia Hits Critical Orgs Via Misconfigured Edge Devices — www.darkreading.com — 16.12.2025 22:03
-
Based on targeting patterns and overlaps in infrastructure, Amazon assesses with high confidence that the observed attacks were carried out by hackers working for the Russian GRU.
First reported: 16.12.2025 22:033 sources, 3 articlesShow sources
- Amazon disrupts Russian GRU hackers attacking edge network devices — www.bleepingcomputer.com — 16.12.2025 22:13
- Russia Hits Critical Orgs Via Misconfigured Edge Devices — www.darkreading.com — 16.12.2025 22:03
- APT28 Targets Ukrainian UKR-net Users in Long-Running Credential Phishing Campaign — thehackernews.com — 17.12.2025 17:30
-
Amazon believes that the Curly COMRades hackers may be tasked with post-compromise activity in a broader GRU campaign involving multiple specialized subclusters.
First reported: 16.12.2025 22:032 sources, 2 articlesShow sources
- Amazon disrupts Russian GRU hackers attacking edge network devices — www.bleepingcomputer.com — 16.12.2025 22:13
- Russia Hits Critical Orgs Via Misconfigured Edge Devices — www.darkreading.com — 16.12.2025 22:03
-
Evidence points to passive packet capturing and traffic interception for credential harvesting.
First reported: 16.12.2025 22:032 sources, 2 articlesShow sources
- Amazon disrupts Russian GRU hackers attacking edge network devices — www.bleepingcomputer.com — 16.12.2025 22:13
- Russia Hits Critical Orgs Via Misconfigured Edge Devices — www.darkreading.com — 16.12.2025 22:03
-
Compromised devices were customer-managed network appliances hosted on AWS EC2 instances, with no flaws in the AWS service itself.
First reported: 16.12.2025 22:032 sources, 2 articlesShow sources
- Amazon disrupts Russian GRU hackers attacking edge network devices — www.bleepingcomputer.com — 16.12.2025 22:13
- Russia Hits Critical Orgs Via Misconfigured Edge Devices — www.darkreading.com — 16.12.2025 22:03
-
Amazon took immediate action to protect compromised EC2 instances, notified affected customers, and shared intelligence with impacted vendors and industry partners.
First reported: 16.12.2025 22:032 sources, 2 articlesShow sources
- Amazon disrupts Russian GRU hackers attacking edge network devices — www.bleepingcomputer.com — 16.12.2025 22:13
- Russia Hits Critical Orgs Via Misconfigured Edge Devices — www.darkreading.com — 16.12.2025 22:03
-
Amazon disrupted active threat actor operations and reduced the attack surface available to this threat activity subcluster.
First reported: 16.12.2025 22:032 sources, 2 articlesShow sources
- Amazon disrupts Russian GRU hackers attacking edge network devices — www.bleepingcomputer.com — 16.12.2025 22:13
- Russia Hits Critical Orgs Via Misconfigured Edge Devices — www.darkreading.com — 16.12.2025 22:03
-
Amazon shared offending IP addresses but warned against blocking them without first conducting a contextual investigation.
First reported: 16.12.2025 22:032 sources, 2 articlesShow sources
- Amazon disrupts Russian GRU hackers attacking edge network devices — www.bleepingcomputer.com — 16.12.2025 22:13
- Russia Hits Critical Orgs Via Misconfigured Edge Devices — www.darkreading.com — 16.12.2025 22:03
-
Amazon recommended auditing network devices, watching for credential replay activity, and monitoring access to administrative portals.
First reported: 16.12.2025 22:032 sources, 2 articlesShow sources
- Amazon disrupts Russian GRU hackers attacking edge network devices — www.bleepingcomputer.com — 16.12.2025 22:13
- Russia Hits Critical Orgs Via Misconfigured Edge Devices — www.darkreading.com — 16.12.2025 22:03
-
In AWS environments, it is recommended to isolate management interfaces, restrict security groups, and enable CloudTrail, GuardDuty, and VPC Flow Logs.
First reported: 16.12.2025 22:032 sources, 2 articlesShow sources
- Amazon disrupts Russian GRU hackers attacking edge network devices — www.bleepingcomputer.com — 16.12.2025 22:13
- Russia Hits Critical Orgs Via Misconfigured Edge Devices — www.darkreading.com — 16.12.2025 22:03
-
The campaign targeted critical organizations in North America, Europe, and the Middle East, with a notable focus on the energy sector.
First reported: 16.12.2025 22:031 source, 1 articleShow sources
- Russia Hits Critical Orgs Via Misconfigured Edge Devices — www.darkreading.com — 16.12.2025 22:03
-
Attackers targeted enterprise routers, routing infrastructure, VPN concentrators, network management appliances, collaboration platforms, and cloud-based project management systems.
First reported: 16.12.2025 22:031 source, 1 articleShow sources
- Russia Hits Critical Orgs Via Misconfigured Edge Devices — www.darkreading.com — 16.12.2025 22:03
-
The shift toward targeting misconfigured network edge devices began gradually between 2021 and 2025.
First reported: 16.12.2025 22:031 source, 1 articleShow sources
- Russia Hits Critical Orgs Via Misconfigured Edge Devices — www.darkreading.com — 16.12.2025 22:03
-
In 2021, the threat cluster exploited WatchGuard flaw CVE-2022-26318.
First reported: 16.12.2025 22:031 source, 1 articleShow sources
- Russia Hits Critical Orgs Via Misconfigured Edge Devices — www.darkreading.com — 16.12.2025 22:03
-
Between 2022 and 2023, threat actors targeted Confluence vulnerabilities CVE-2021-26084 and CVE-2023-22518.
First reported: 16.12.2025 22:031 source, 1 articleShow sources
- Russia Hits Critical Orgs Via Misconfigured Edge Devices — www.darkreading.com — 16.12.2025 22:03
-
In 2024, attackers targeted Veeam flaw CVE-2023-27532.
First reported: 16.12.2025 22:031 source, 1 articleShow sources
- Russia Hits Critical Orgs Via Misconfigured Edge Devices — www.darkreading.com — 16.12.2025 22:03
-
The primary credential extraction mechanism appeared to be packet capture and traffic analysis.
First reported: 16.12.2025 22:031 source, 1 articleShow sources
- Russia Hits Critical Orgs Via Misconfigured Edge Devices — www.darkreading.com — 16.12.2025 22:03
-
Amazon identified and notified customers with compromised network appliances, enabled remediation of compromised EC2 resources, shared intelligence with partners and affected vendors, and reported observations to network appliance vendors.
First reported: 16.12.2025 22:031 source, 1 articleShow sources
- Russia Hits Critical Orgs Via Misconfigured Edge Devices — www.darkreading.com — 16.12.2025 22:03
-
APT28, also known as BlueDelta, Fancy Bear, Forest Blizzard, FROZENLAKE, Iron Twilight, ITG05, Pawn Storm, Sednit, Sofacy, and TA422, is affiliated with Russia's Main Directorate of the General Staff of the Russian Federation's Armed Forces (GRU).
First reported: 17.12.2025 17:303 sources, 4 articlesShow sources
- APT28 Targets Ukrainian UKR-net Users in Long-Running Credential Phishing Campaign — thehackernews.com — 17.12.2025 17:30
- Notorious Russian APT Nabs Credentials From Global Targets — www.darkreading.com — 09.01.2026 09:00
- Russian APT28 Runs Credential-Stealing Campaign Targeting Energy and Policy Organizations — thehackernews.com — 09.01.2026 17:28
- Russia’s APT28 Targeting Energy Research, Defense Collaboration Entities — www.securityweek.com — 12.01.2026 14:23
-
APT28 has been conducting a sustained credential-harvesting campaign targeting users of UKR[.]net, a webmail and news service popular in Ukraine, between June 2024 and April 2025.
First reported: 17.12.2025 17:303 sources, 4 articlesShow sources
- APT28 Targets Ukrainian UKR-net Users in Long-Running Credential Phishing Campaign — thehackernews.com — 17.12.2025 17:30
- Notorious Russian APT Nabs Credentials From Global Targets — www.darkreading.com — 09.01.2026 09:00
- Russian APT28 Runs Credential-Stealing Campaign Targeting Energy and Policy Organizations — thehackernews.com — 09.01.2026 17:28
- Russia’s APT28 Targeting Energy Research, Defense Collaboration Entities — www.securityweek.com — 12.01.2026 14:23
-
The campaign involves deploying UKR[.]net-themed login pages on legitimate services like Mocky to entice recipients into entering their credentials and two-factor authentication (2FA) codes.
First reported: 17.12.2025 17:303 sources, 4 articlesShow sources
- APT28 Targets Ukrainian UKR-net Users in Long-Running Credential Phishing Campaign — thehackernews.com — 17.12.2025 17:30
- Notorious Russian APT Nabs Credentials From Global Targets — www.darkreading.com — 09.01.2026 09:00
- Russian APT28 Runs Credential-Stealing Campaign Targeting Energy and Policy Organizations — thehackernews.com — 09.01.2026 17:28
- Russia’s APT28 Targeting Energy Research, Defense Collaboration Entities — www.securityweek.com — 12.01.2026 14:23
-
Links to these pages are embedded within PDF documents distributed via phishing emails, often shortened using services like tiny[.]cc or tinyurl[.]com.
First reported: 17.12.2025 17:303 sources, 4 articlesShow sources
- APT28 Targets Ukrainian UKR-net Users in Long-Running Credential Phishing Campaign — thehackernews.com — 17.12.2025 17:30
- Notorious Russian APT Nabs Credentials From Global Targets — www.darkreading.com — 09.01.2026 09:00
- Russian APT28 Runs Credential-Stealing Campaign Targeting Energy and Policy Organizations — thehackernews.com — 09.01.2026 17:28
- Russia’s APT28 Targeting Energy Research, Defense Collaboration Entities — www.securityweek.com — 12.01.2026 14:23
-
In some cases, APT28 uses subdomains created on platforms like Blogger (*.blogspot[.]com) to launch a two-tier redirection chain leading to the credential harvesting page.
First reported: 17.12.2025 17:303 sources, 4 articlesShow sources
- APT28 Targets Ukrainian UKR-net Users in Long-Running Credential Phishing Campaign — thehackernews.com — 17.12.2025 17:30
- Notorious Russian APT Nabs Credentials From Global Targets — www.darkreading.com — 09.01.2026 09:00
- Russian APT28 Runs Credential-Stealing Campaign Targeting Energy and Policy Organizations — thehackernews.com — 09.01.2026 17:28
- Russia’s APT28 Targeting Energy Research, Defense Collaboration Entities — www.securityweek.com — 12.01.2026 14:23
-
APT28 has transitioned from using compromised routers to proxy tunneling services such as ngrok and Serveo to capture and relay stolen credentials and 2FA codes.
First reported: 17.12.2025 17:302 sources, 3 articlesShow sources
- APT28 Targets Ukrainian UKR-net Users in Long-Running Credential Phishing Campaign — thehackernews.com — 17.12.2025 17:30
- Russian APT28 Runs Credential-Stealing Campaign Targeting Energy and Policy Organizations — thehackernews.com — 09.01.2026 17:28
- Russia’s APT28 Targeting Energy Research, Defense Collaboration Entities — www.securityweek.com — 12.01.2026 14:23
-
The campaign is part of a broader set of phishing and credential theft operations targeting government institutions, defense contractors, weapons suppliers, logistics firms, and policy think tanks in pursuit of Russia's strategic objectives.
First reported: 17.12.2025 17:302 sources, 3 articlesShow sources
- APT28 Targets Ukrainian UKR-net Users in Long-Running Credential Phishing Campaign — thehackernews.com — 17.12.2025 17:30
- Notorious Russian APT Nabs Credentials From Global Targets — www.darkreading.com — 09.01.2026 09:00
- Russian APT28 Runs Credential-Stealing Campaign Targeting Energy and Policy Organizations — thehackernews.com — 09.01.2026 17:28
-
APT28 targeted Turkish renewable energy scientists with a climate change policy document from a real Middle Eastern think tank.
First reported: 09.01.2026 09:003 sources, 3 articlesShow sources
- Notorious Russian APT Nabs Credentials From Global Targets — www.darkreading.com — 09.01.2026 09:00
- Russian APT28 Runs Credential-Stealing Campaign Targeting Energy and Policy Organizations — thehackernews.com — 09.01.2026 17:28
- Russia’s APT28 Targeting Energy Research, Defense Collaboration Entities — www.securityweek.com — 12.01.2026 14:23
-
APT28 used phishing emails themed to match their intended targets and written in the targets' native tongues.
First reported: 09.01.2026 09:003 sources, 3 articlesShow sources
- Notorious Russian APT Nabs Credentials From Global Targets — www.darkreading.com — 09.01.2026 09:00
- Russian APT28 Runs Credential-Stealing Campaign Targeting Energy and Policy Organizations — thehackernews.com — 09.01.2026 17:28
- Russia’s APT28 Targeting Energy Research, Defense Collaboration Entities — www.securityweek.com — 12.01.2026 14:23
-
APT28 redirected victims to a login page mimicking a legitimate online service after they followed a link in a phishing email.
First reported: 09.01.2026 09:003 sources, 3 articlesShow sources
- Notorious Russian APT Nabs Credentials From Global Targets — www.darkreading.com — 09.01.2026 09:00
- Russian APT28 Runs Credential-Stealing Campaign Targeting Energy and Policy Organizations — thehackernews.com — 09.01.2026 17:28
- Russia’s APT28 Targeting Energy Research, Defense Collaboration Entities — www.securityweek.com — 12.01.2026 14:23
-
APT28 used regular hosted services rather than custom tools and infrastructure for their attacks.
First reported: 09.01.2026 09:003 sources, 3 articlesShow sources
- Notorious Russian APT Nabs Credentials From Global Targets — www.darkreading.com — 09.01.2026 09:00
- Russian APT28 Runs Credential-Stealing Campaign Targeting Energy and Policy Organizations — thehackernews.com — 09.01.2026 17:28
- Russia’s APT28 Targeting Energy Research, Defense Collaboration Entities — www.securityweek.com — 12.01.2026 14:23
-
APT28's targets included an IT integrator based in Uzbekistan, a European think tank, a military organization in North Macedonia, and scientists and researchers associated with a Turkish energy and nuclear research organization.
First reported: 09.01.2026 09:003 sources, 3 articlesShow sources
- Notorious Russian APT Nabs Credentials From Global Targets — www.darkreading.com — 09.01.2026 09:00
- Russian APT28 Runs Credential-Stealing Campaign Targeting Energy and Policy Organizations — thehackernews.com — 09.01.2026 17:28
- Russia’s APT28 Targeting Energy Research, Defense Collaboration Entities — www.securityweek.com — 12.01.2026 14:23
-
APT28's campaign was highly selective and consistent with GRU collection priorities, aligning with geopolitical, military, or strategic intelligence objectives.
First reported: 09.01.2026 09:003 sources, 3 articlesShow sources
- Notorious Russian APT Nabs Credentials From Global Targets — www.darkreading.com — 09.01.2026 09:00
- Russian APT28 Runs Credential-Stealing Campaign Targeting Energy and Policy Organizations — thehackernews.com — 09.01.2026 17:28
- Russia’s APT28 Targeting Energy Research, Defense Collaboration Entities — www.securityweek.com — 12.01.2026 14:23
-
APT28 targeted individuals associated with a Turkish energy and nuclear research agency, a European think tank, and organizations in North Macedonia and Uzbekistan.
First reported: 09.01.2026 17:282 sources, 2 articlesShow sources
- Russian APT28 Runs Credential-Stealing Campaign Targeting Energy and Policy Organizations — thehackernews.com — 09.01.2026 17:28
- Russia’s APT28 Targeting Energy Research, Defense Collaboration Entities — www.securityweek.com — 12.01.2026 14:23
-
APT28 used fake login pages styled to resemble popular services like Microsoft Outlook Web Access (OWA), Google, and Sophos VPN portals.
First reported: 09.01.2026 17:282 sources, 2 articlesShow sources
- Russian APT28 Runs Credential-Stealing Campaign Targeting Energy and Policy Organizations — thehackernews.com — 09.01.2026 17:28
- Russia’s APT28 Targeting Energy Research, Defense Collaboration Entities — www.securityweek.com — 12.01.2026 14:23
-
The phishing campaigns redirected users to legitimate sites after credentials were entered, avoiding suspicion.
First reported: 09.01.2026 17:282 sources, 2 articlesShow sources
- Russian APT28 Runs Credential-Stealing Campaign Targeting Energy and Policy Organizations — thehackernews.com — 09.01.2026 17:28
- Russia’s APT28 Targeting Energy Research, Defense Collaboration Entities — www.securityweek.com — 12.01.2026 14:23
-
APT28 used services like Webhook.site, InfinityFree, Byet Internet Services, and ngrok to host phishing pages and exfiltrate data.
First reported: 09.01.2026 17:282 sources, 2 articlesShow sources
- Russian APT28 Runs Credential-Stealing Campaign Targeting Energy and Policy Organizations — thehackernews.com — 09.01.2026 17:28
- Russia’s APT28 Targeting Energy Research, Defense Collaboration Entities — www.securityweek.com — 12.01.2026 14:23
-
APT28 used legitimate PDF lure documents, including a publication from the Gulf Research Center and a policy briefing from climate change think tank ECCO.
First reported: 09.01.2026 17:282 sources, 2 articlesShow sources
- Russian APT28 Runs Credential-Stealing Campaign Targeting Energy and Policy Organizations — thehackernews.com — 09.01.2026 17:28
- Russia’s APT28 Targeting Energy Research, Defense Collaboration Entities — www.securityweek.com — 12.01.2026 14:23
-
APT28 conducted a June 2025 campaign targeting an E.U. think tank with a Sophos VPN password reset page.
First reported: 09.01.2026 17:282 sources, 2 articlesShow sources
- Russian APT28 Runs Credential-Stealing Campaign Targeting Energy and Policy Organizations — thehackernews.com — 09.01.2026 17:28
- Russia’s APT28 Targeting Energy Research, Defense Collaboration Entities — www.securityweek.com — 12.01.2026 14:23
-
APT28 conducted a September 2025 campaign targeting a military organization in North Macedonia and an IT integrator in Uzbekistan with fake password expiration warnings.
First reported: 09.01.2026 17:282 sources, 2 articlesShow sources
- Russian APT28 Runs Credential-Stealing Campaign Targeting Energy and Policy Organizations — thehackernews.com — 09.01.2026 17:28
- Russia’s APT28 Targeting Energy Research, Defense Collaboration Entities — www.securityweek.com — 12.01.2026 14:23
-
APT28 conducted an April 2025 campaign using a fake Google password reset page hosted on Byet Internet Services to gather credentials.
First reported: 09.01.2026 17:282 sources, 2 articlesShow sources
- Russian APT28 Runs Credential-Stealing Campaign Targeting Energy and Policy Organizations — thehackernews.com — 09.01.2026 17:28
- Russia’s APT28 Targeting Energy Research, Defense Collaboration Entities — www.securityweek.com — 12.01.2026 14:23
-
APT28 has been targeting organizations associated with energy research, defense collaboration, and government communication in a new credential-harvesting campaign.
First reported: 12.01.2026 14:231 source, 1 articleShow sources
- Russia’s APT28 Targeting Energy Research, Defense Collaboration Entities — www.securityweek.com — 12.01.2026 14:23
-
APT28 used phishing pages impersonating Microsoft Outlook Web Access (OWA), Google, and Sophos VPN portals.
First reported: 12.01.2026 14:231 source, 1 articleShow sources
- Russia’s APT28 Targeting Energy Research, Defense Collaboration Entities — www.securityweek.com — 12.01.2026 14:23
-
Victims were redirected to legitimate domains after entering their credentials.
First reported: 12.01.2026 14:231 source, 1 articleShow sources
- Russia’s APT28 Targeting Energy Research, Defense Collaboration Entities — www.securityweek.com — 12.01.2026 14:23
-
APT28 relied heavily on free hosting and tunneling services such as Webhook.site, InfinityFree, Byet Internet Services, and Ngrok to host phishing content, capture user data, and manage redirections.
First reported: 12.01.2026 14:231 source, 1 articleShow sources
- Russia’s APT28 Targeting Energy Research, Defense Collaboration Entities — www.securityweek.com — 12.01.2026 14:23
-
In February 2025, APT28 deployed a Microsoft OWA phishing page and used the ShortURL link-shortening service for the first-stage redirection.
First reported: 12.01.2026 14:231 source, 1 articleShow sources
- Russia’s APT28 Targeting Energy Research, Defense Collaboration Entities — www.securityweek.com — 12.01.2026 14:23
-
APT28 employed a webhook relying on HTML to load a PDF lure document in the browser for two seconds before redirecting the victim to a second webhook hosting the spoofed OWA login page.
First reported: 12.01.2026 14:231 source, 1 articleShow sources
- Russia’s APT28 Targeting Energy Research, Defense Collaboration Entities — www.securityweek.com — 12.01.2026 14:23
-
In July, APT28 deployed a spoofed OWA login portal containing Turkish-language text and targeting Turkish scientists and researchers.
First reported: 12.01.2026 14:231 source, 1 articleShow sources
- Russia’s APT28 Targeting Energy Research, Defense Collaboration Entities — www.securityweek.com — 12.01.2026 14:23
-
In June, APT28 deployed a spoofed Sophos VPN password reset page hosted on InfinityFree infrastructure.
First reported: 12.01.2026 14:231 source, 1 articleShow sources
- Russia’s APT28 Targeting Energy Research, Defense Collaboration Entities — www.securityweek.com — 12.01.2026 14:23
-
In September, APT28 hosted two spoofed OWA expired password pages on an InfinityFree domain.
First reported: 12.01.2026 14:231 source, 1 articleShow sources
- Russia’s APT28 Targeting Energy Research, Defense Collaboration Entities — www.securityweek.com — 12.01.2026 14:23
-
In April, Recorded Future discovered a spoofed Google password reset page in Portuguese, hosted on a free apex domain from Byet Internet Services.
First reported: 12.01.2026 14:231 source, 1 articleShow sources
- Russia’s APT28 Targeting Energy Research, Defense Collaboration Entities — www.securityweek.com — 12.01.2026 14:23
-
APT28 abused Ngrok's free service to connect servers behind a firewall to a proxy server and expose that server to the internet without changing firewall rules.
First reported: 12.01.2026 14:231 source, 1 articleShow sources
- Russia’s APT28 Targeting Energy Research, Defense Collaboration Entities — www.securityweek.com — 12.01.2026 14:23
-
APT28's ability to adapt its infrastructure and rebrand credential-harvesting pages suggests it will continue to abuse free hosting, tunneling, and link-shortening services to reduce operational costs and obscure attribution.
First reported: 12.01.2026 14:231 source, 1 articleShow sources
- Russia’s APT28 Targeting Energy Research, Defense Collaboration Entities — www.securityweek.com — 12.01.2026 14:23
Similar Happenings
OAuth Device Code Phishing Campaigns Target Microsoft 365 Accounts
A surge in phishing campaigns exploiting Microsoft’s OAuth device code authorization flow has been observed, targeting Microsoft 365 accounts. Both state-aligned and financially motivated actors are using social engineering to trick users into approving malicious applications, leading to account takeover and data theft. The attacks leverage the OAuth 2.0 device authorization grant, a legitimate process designed for devices with limited input capabilities. Once victims enter a device code generated by an attacker-controlled application, the threat actor receives a valid access token, granting control over the compromised account. The campaigns use QR codes, embedded buttons, and hyperlinked text to initiate the attack chain, often claiming to involve document sharing, token reauthorization, or security verification. The growth of these campaigns is linked to readily available phishing tools like SquarePhish2 and Graphish, which simplify device code abuse and require limited technical skill. Proofpoint observed financially motivated actor TA2723 and Russia-linked group UNK_AcademicFlare adopting this technique, targeting various sectors in the US and Europe. Organizations are advised to strengthen OAuth controls and train users to avoid entering device codes from untrusted sources. The activity, ongoing since September 2025, is being tracked by Proofpoint under the moniker UNK_AcademicFlare. The attacks involve using compromised email addresses belonging to government and military organizations to strike entities within government, think tanks, higher education, and transportation sectors in the U.S. and Europe. The adversary claims to share a link to a document that includes questions or topics for the email recipient to review before the meeting. The URL points to a Cloudflare Worker URL that mimics the compromised sender's Microsoft OneDrive account and instructs the victim to copy the provided code and click 'Next' to access the supposed document. Device code phishing was documented in detail by both Microsoft and Volexity in February 2025, attributing the use of the attack method to Russia-aligned clusters such as Storm-2372, APT29, UTA0304, and UTA0307. The October 2025 campaign is assessed to have been fueled by the ready availability of crimeware offerings like the Graphish phishing kit and red-team tools such as SquarePhish. To counter the risk posed by device code phishing, the best option is to create a Conditional Access policy using the Authentication Flows condition to block device code flow for all users. If that's not feasible, it's advised to use a policy that uses an allow-list approach to allow device code authentication for approved users, operating systems, or IP ranges.
Russian GRU Shifts Tactics to Target Misconfigured Edge Devices in Western Critical Infrastructure
A Russian state-sponsored threat actor, attributed to the GRU, has shifted its tactics from exploiting vulnerabilities to targeting misconfigured customer network edge devices. The campaign, active since 2021, primarily targets energy sector organizations and critical infrastructure providers in Western nations. The shift in tactics allows the group to maintain persistent access, harvest credentials, and move laterally within victim networks while reducing exposure and resource expenditure.
Pro-Russia Hacktivists Target Critical Infrastructure with Low-Sophistication Attacks
Pro-Russia hacktivist groups are conducting opportunistic, low-sophistication cyberattacks against U.S. and global critical infrastructure. These attacks target a wide range of sectors, including water treatment facilities, food production, and energy systems, using easily repeatable methods. The groups exploit minimally secured, internet-facing virtual network computing (VNC) connections to gain unauthorized access to operational technology (OT) control devices. The joint advisory from CISA, FBI, NSA, and global partners urges immediate action to mitigate these threats. The advisory highlights the use of basic methods to target supervisory control and data acquisition (SCADA) networks, sometimes combined with DDoS attacks. The cumulative impact of these activities poses a persistent and disruptive threat to essential services. According to a new report, groups such as Cyber Army of Russia Reborn (CARR), Z-Pentest, NoName057(16), and Sector16 are using simple reconnaissance tools and common password-guessing techniques to reach internet-facing human-machine interfaces. These groups have led to physical impacts in some cases, including temporary loss of view and costly manual recovery efforts.
Iranian APT Phishing Campaign Targets US Think Tanks
Between June and August 2025, an Iranian advanced persistent threat (APT) group, tentatively named UNK_SmudgedSerpent, conducted targeted phishing attacks against prominent US think tanks and policy experts. The campaign impersonated influential figures in US foreign policy, including Suzanne Maloney and Patrick Clawson, to steal credentials and deploy remote monitoring and management (RMM) software. The group's tactics, techniques, and procedures (TTPs) overlapped with multiple known Iranian APTs, suggesting possible reorganization or collaboration within Iranian cyber operations. The phishing attempts involved impersonating key figures in US policy discussions on Iran, using tailored emails to lure targets into clicking malicious links. The group used a combination of techniques reminiscent of multiple Iranian APTs, including TA453 (Charming Kitten) and TA455 (Smoke Sandstorm), and deployed RMM software, a tactic previously associated with TA450 (MuddyWater). The campaign targeted over 20 subject matter experts at a U.S.-based think tank and used decoy documents and zip files containing RMM installers. The attackers also impersonated prominent U.S. foreign policy figures associated with think tanks like Brookings Institution and Washington Institute, and used spoofed login pages to harvest Microsoft account credentials. The group's activity was observed to have paused, but concerns persist due to the tactical overlap with known Iranian APTs. The group's tactics and infrastructure suggest possible personnel movement or shared infrastructure procurement between Iranian contracting outfits.
HttpTroy Backdoor Deployed in Targeted South Korean Cyberattack
The North Korea-linked threat actor Kimsuky has been linked to a new campaign distributing a new variant of Android malware called DocSwap via QR codes hosted on phishing sites mimicking Seoul-based logistics firm CJ Logistics. The attack involved a ZIP file containing a Microsoft Windows screensaver (.scr) file, which displayed a PDF invoice written in Korean and loaded the attack chain until the backdoor program was running. The article also highlights the advanced obfuscation techniques used by HttpTroy to evade detection and the broader campaign by North Korean state-sponsored groups targeting various sectors. The attack is part of a broader campaign by North Korean state-sponsored groups targeting governments in the Asia-Pacific region, especially South Korea, as well as targets in the United States and Europe. Kimsuky has previously used password-protected ZIP files and AI-generated deepfake photos in their attacks. The groups use legitimate services and Windows processes to dodge security tools and different encryption methods for each step in a multistage infection chain. They also use techniques such as memory-resident execution and dynamic API resolution to help the malicious code avoid detection. Additionally, Kimsuky is targeting organizations involved in North Korea-related policy, research, and analysis, including non-governmental organizations, think tanks, academic institutions, strategic advisory firms, and government entities in the U.S. The group is using QR codes in phishing campaigns, a technique known as 'quishing,' to redirect victims to malicious locations disguised as questionnaires, secure drives, or fake login pages. The FBI has warned about Kimsuky's use of malicious QR codes in spear-phishing campaigns targeting entities in the U.S., highlighting the group's history of subverting email authentication protocols and exploiting improperly configured DMARC record policies.