Amazon Disrupts GRU-Affiliated APT44 Campaign Targeting Critical Infrastructure
Summary
Hide ▲
Show ▼
Amazon has disrupted a years-long Russian state-sponsored campaign targeting Western critical infrastructure, including energy sector organizations and cloud-hosted network infrastructure. The campaign, attributed to the GRU-affiliated APT44 group, initially leveraged vulnerabilities in WatchGuard Firebox and XTM, Atlassian Confluence, and Veeam to gain initial access. However, starting in 2025, APT44 shifted its tactics to target misconfigured network edge devices, reducing their exposure and resource expenditure. The group targeted enterprise routers, VPN concentrators, network management appliances, and cloud-based project management systems to harvest credentials and establish persistent access. Amazon's intervention led to the disruption of the campaign, highlighting the ongoing threat posed by state-sponsored cyber actors. APT44, also known as FROZENBARENTS, Sandworm, Seashell Blizzard, and Voodoo Bear, has been active since at least 2021. The group exploited vulnerabilities in WatchGuard Firebox and XTM (CVE-2022-26318), Atlassian Confluence (CVE-2021-26084, CVE-2023-22518), and Veeam (CVE-2023-27532) to compromise network edge devices. The campaign involved credential replay attacks and targeted energy, technology/cloud services, and telecom service providers across North America, Western and Eastern Europe, and the Middle East. Amazon's threat intelligence team identified and notified affected customers, disrupting active threat actor operations. Additionally, APT28, another GRU-affiliated group, has been conducting a sustained credential-harvesting campaign targeting users of UKR[.]net, a webmail and news service popular in Ukraine. The campaign, observed between June 2024 and April 2025, involves deploying UKR[.]net-themed login pages on legitimate services like Mocky to entice recipients into entering their credentials and 2FA codes. Links to these pages are embedded within PDF documents distributed via phishing emails, often shortened using services like tiny[.]cc or tinyurl[.]com. In some cases, APT28 uses subdomains created on platforms like Blogger (*.blogspot[.]com) to launch a two-tier redirection chain leading to the credential harvesting page. The campaign is part of a broader set of phishing and credential theft operations targeting various institutions in pursuit of Russia's strategic objectives. APT28's recent campaign targeted Turkish renewable energy scientists with a climate change policy document from a real Middle Eastern think tank. The group used phishing emails themed to match their intended targets and written in the targets' native tongues. Victims were redirected to a login page mimicking a legitimate online service after following a link in a phishing email. APT28 used regular hosted services rather than custom tools and infrastructure for their attacks. The targets included an IT integrator based in Uzbekistan, a European think tank, a military organization in North Macedonia, and scientists and researchers associated with a Turkish energy and nuclear research organization. The campaign was highly selective and consistent with GRU collection priorities, aligning with geopolitical, military, or strategic intelligence objectives. APT28 has been targeting organizations associated with energy research, defense collaboration, and government communication in a new credential-harvesting campaign. The group used phishing pages impersonating Microsoft Outlook Web Access (OWA), Google, and Sophos VPN portals. Victims were redirected to legitimate domains after entering their credentials. APT28 relied heavily on free hosting and tunneling services such as Webhook.site, InfinityFree, Byet Internet Services, and Ngrok to host phishing content, capture user data, and manage redirections. In February 2025, APT28 deployed a Microsoft OWA phishing page and used the ShortURL link-shortening service for the first-stage redirection. The group employed a webhook relying on HTML to load a PDF lure document in the browser for two seconds before redirecting the victim to a second webhook hosting the spoofed OWA login page. In July, APT28 deployed a spoofed OWA login portal containing Turkish-language text and targeting Turkish scientists and researchers. In June, APT28 deployed a spoofed Sophos VPN password reset page hosted on InfinityFree infrastructure. In September, APT28 hosted two spoofed OWA expired password pages on an InfinityFree domain. In April, Recorded Future discovered a spoofed Google password reset page in Portuguese, hosted on a free apex domain from Byet Internet Services. APT28 abused Ngrok's free service to connect servers behind a firewall to a proxy server and expose that server to the internet without changing firewall rules. APT28's ability to adapt its infrastructure and rebrand credential-harvesting pages suggests it will continue to abuse free hosting, tunneling, and link-shortening services to reduce operational costs and obscure attribution. Recently, APT28 exploited CVE-2026-21509, a recently patched vulnerability in multiple versions of Microsoft Office. The attacks involved malicious DOC files themed around EU COREPER consultations in Ukraine and impersonated the Ukrainian Hydrometeorological Center. The malicious document triggers a WebDAV-based download chain that installs malware via COM hijacking, a malicious DLL (EhStoreShell.dll), shellcode hidden in an image file (SplashScreen.png), and a scheduled task (OneDriveHealth). The scheduled task execution leads to the termination and restart of the explorer.exe process, ensuring the loading of the EhStoreShell.dll file. This DLL executes shellcode from the image file, which launches the COVENANT software (framework) on the computer. COVENANT uses the Filen (filen.io) cloud storage service for command-and-control (C2) operations. APT28 used three more documents in attacks against various EU-based organizations, indicating that the campaign extends beyond Ukraine.
Timeline
-
09.01.2026 09:00 1 articles · 26d ago
APT28 targets organizations in Balkans, Middle East, and Central Asia
APT28 conducted a credential-harvesting campaign targeting specific organizations in the Balkans, the Middle East, and Central Asia. The campaign involved phishing emails themed to match the intended targets and written in their native tongues. Victims were redirected to login pages mimicking legitimate online services after following links in the phishing emails. APT28 used regular hosted services rather than custom tools and infrastructure for their attacks. The targets included an IT integrator based in Uzbekistan, a European think tank, a military organization in North Macedonia, and scientists and researchers associated with a Turkish energy and nuclear research organization. The campaign was highly selective and consistent with GRU collection priorities, aligning with geopolitical, military, or strategic intelligence objectives.
Show sources
- Notorious Russian APT Nabs Credentials From Global Targets — www.darkreading.com — 09.01.2026 09:00
-
17.12.2025 17:30 6 articles · 1mo ago
APT28 conducts sustained credential-harvesting campaign targeting UKR[.]net users
APT28 targeted Turkish renewable energy scientists with a climate change policy document from a real Middle Eastern think tank. The group used phishing emails themed to match their intended targets and written in the targets' native tongues. Victims were redirected to a login page mimicking a legitimate online service after following a link in a phishing email. APT28 used regular hosted services rather than custom tools and infrastructure for their attacks. The targets included an IT integrator based in Uzbekistan, a European think tank, a military organization in North Macedonia, and scientists and researchers associated with a Turkish energy and nuclear research organization. The campaign was highly selective and consistent with GRU collection priorities, aligning with geopolitical, military, or strategic intelligence objectives. APT28 has been targeting organizations associated with energy research, defense collaboration, and government communication in a new credential-harvesting campaign. The group used phishing pages impersonating Microsoft Outlook Web Access (OWA), Google, and Sophos VPN portals. Victims were redirected to legitimate domains after entering their credentials. APT28 relied heavily on free hosting and tunneling services such as Webhook.site, InfinityFree, Byet Internet Services, and Ngrok to host phishing content, capture user data, and manage redirections. In February 2025, APT28 deployed a Microsoft OWA phishing page and used the ShortURL link-shortening service for the first-stage redirection. The group employed a webhook relying on HTML to load a PDF lure document in the browser for two seconds before redirecting the victim to a second webhook hosting the spoofed OWA login page. In July, APT28 deployed a spoofed OWA login portal containing Turkish-language text and targeting Turkish scientists and researchers. In June, APT28 deployed a spoofed Sophos VPN password reset page hosted on InfinityFree infrastructure. In September, APT28 hosted two spoofed OWA expired password pages on an InfinityFree domain. In April, Recorded Future discovered a spoofed Google password reset page in Portuguese, hosted on a free apex domain from Byet Internet Services. APT28 abused Ngrok's free service to connect servers behind a firewall to a proxy server and expose that server to the internet without changing firewall rules. APT28's ability to adapt its infrastructure and rebrand credential-harvesting pages suggests it will continue to abuse free hosting, tunneling, and link-shortening services to reduce operational costs and obscure attribution. Recently, APT28 exploited CVE-2026-21509, a recently patched vulnerability in multiple versions of Microsoft Office. The attacks involved malicious DOC files themed around EU COREPER consultations in Ukraine and impersonated the Ukrainian Hydrometeorological Center. The malicious document triggers a WebDAV-based download chain that installs malware via COM hijacking, a malicious DLL (EhStoreShell.dll), shellcode hidden in an image file (SplashScreen.png), and a scheduled task (OneDriveHealth). The scheduled task execution leads to the termination and restart of the explorer.exe process, ensuring the loading of the EhStoreShell.dll file. This DLL executes shellcode from the image file, which launches the COVENANT software (framework) on the computer. COVENANT uses the Filen (filen.io) cloud storage service for command-and-control (C2) operations. APT28 used three more documents in attacks against various EU-based organizations, indicating that the campaign extends beyond Ukraine.
Show sources
- APT28 Targets Ukrainian UKR-net Users in Long-Running Credential Phishing Campaign — thehackernews.com — 17.12.2025 17:30
- Notorious Russian APT Nabs Credentials From Global Targets — www.darkreading.com — 09.01.2026 09:00
- Russian APT28 Runs Credential-Stealing Campaign Targeting Energy and Policy Organizations — thehackernews.com — 09.01.2026 17:28
- Russia’s APT28 Targeting Energy Research, Defense Collaboration Entities — www.securityweek.com — 12.01.2026 14:23
- Russian hackers exploit recently patched Microsoft Office bug in attacks — www.bleepingcomputer.com — 02.02.2026 23:00
- APT28 Uses Microsoft Office CVE-2026-21509 in Espionage-Focused Malware Attacks — thehackernews.com — 03.02.2026 11:12
-
16.12.2025 14:27 5 articles · 1mo ago
APT44 targets Western critical infrastructure with misconfigured network edge devices
The campaign targeted critical organizations in North America, Europe, and the Middle East, with a notable focus on the energy sector. Attackers targeted enterprise routers, routing infrastructure, VPN concentrators, network management appliances, collaboration platforms, and cloud-based project management systems. The shift toward targeting misconfigured network edge devices began gradually between 2021 and 2025. In 2021, the threat cluster exploited WatchGuard flaw CVE-2022-26318. Between 2022 and 2023, threat actors targeted Confluence vulnerabilities CVE-2021-26084 and CVE-2023-22518. In 2024, attackers targeted Veeam flaw CVE-2023-27532. The primary credential extraction mechanism appeared to be packet capture and traffic analysis. Amazon identified and notified customers with compromised network appliances, enabled remediation of compromised EC2 resources, shared intelligence with partners and affected vendors, and reported observations to network appliance vendors.
Show sources
- Amazon Exposes Years-Long GRU Cyber Campaign Targeting Energy and Cloud Infrastructure — thehackernews.com — 16.12.2025 14:27
- Amazon: Russian Hackers Now Favor Misconfigurations in Critical Infrastructure Attacks — www.securityweek.com — 16.12.2025 15:22
- Amazon disrupts Russian GRU hackers attacking edge network devices — www.bleepingcomputer.com — 16.12.2025 22:13
- Russia Hits Critical Orgs Via Misconfigured Edge Devices — www.darkreading.com — 16.12.2025 22:03
- APT28 Targets Ukrainian UKR-net Users in Long-Running Credential Phishing Campaign — thehackernews.com — 17.12.2025 17:30
-
29.08.2025 16:22 2 articles · 5mo ago
Amazon disrupts APT29 watering hole campaign targeting Microsoft device code authentication
The campaign targeted Microsoft 365 accounts and data. APT29 has previously targeted European embassies, Hewlett Packard Enterprise, and TeamViewer. Amazon's threat intelligence team discovered the domain names used in the watering hole campaign. The campaign used a cookie-based system to prevent the same user from being redirected multiple times. Amazon isolated the EC2 instances used by the threat actor and partnered with Cloudflare and Microsoft to disrupt the identified domains. APT29 attempted to move its infrastructure to another cloud provider and registered new domain names. The campaign reflects an evolution in APT29's technical approach, no longer relying on domains that impersonate AWS or social engineering attempts to bypass multi-factor authentication (MFA).
Show sources
- Amazon Disrupts APT29 Watering Hole Campaign Abusing Microsoft Device Code Authentication — thehackernews.com — 29.08.2025 16:22
- Amazon disrupts Russian APT29 hackers targeting Microsoft 365 — www.bleepingcomputer.com — 01.09.2025 18:35
Information Snippets
-
APT29, also known as BlueBravo, Cloaked Ursa, CozyLarch, Cozy Bear, Earth Koshchei, ICECAP, Midnight Blizzard, and The Dukes, is a state-sponsored hacking group tied to Russia's Foreign Intelligence Service (SVR).
First reported: 29.08.2025 16:222 sources, 3 articlesShow sources
- Amazon Disrupts APT29 Watering Hole Campaign Abusing Microsoft Device Code Authentication — thehackernews.com — 29.08.2025 16:22
- Amazon disrupts Russian APT29 hackers targeting Microsoft 365 — www.bleepingcomputer.com — 01.09.2025 18:35
- Amazon Exposes Years-Long GRU Cyber Campaign Targeting Energy and Cloud Infrastructure — thehackernews.com — 16.12.2025 14:27
-
The campaign used compromised websites to redirect visitors to malicious infrastructure designed to trick users into authorizing attacker-controlled devices through Microsoft's device code authentication flow.
First reported: 29.08.2025 16:222 sources, 2 articlesShow sources
- Amazon Disrupts APT29 Watering Hole Campaign Abusing Microsoft Device Code Authentication — thehackernews.com — 29.08.2025 16:22
- Amazon disrupts Russian APT29 hackers targeting Microsoft 365 — www.bleepingcomputer.com — 01.09.2025 18:35
-
APT29 has been linked to attacks leveraging malicious Remote Desktop Protocol (RDP) configuration files to target Ukrainian entities and exfiltrate sensitive data.
First reported: 29.08.2025 16:221 source, 1 articleShow sources
- Amazon Disrupts APT29 Watering Hole Campaign Abusing Microsoft Device Code Authentication — thehackernews.com — 29.08.2025 16:22
-
The adversarial collective has been observed adopting various phishing methods, including device code phishing and device join phishing, to obtain unauthorized access to Microsoft 365 accounts.
First reported: 29.08.2025 16:221 source, 1 articleShow sources
- Amazon Disrupts APT29 Watering Hole Campaign Abusing Microsoft Device Code Authentication — thehackernews.com — 29.08.2025 16:22
-
The campaign involved injecting JavaScript into compromised websites to redirect approximately 10% of visitors to actor-controlled domains.
First reported: 29.08.2025 16:222 sources, 2 articlesShow sources
- Amazon Disrupts APT29 Watering Hole Campaign Abusing Microsoft Device Code Authentication — thehackernews.com — 29.08.2025 16:22
- Amazon disrupts Russian APT29 hackers targeting Microsoft 365 — www.bleepingcomputer.com — 01.09.2025 18:35
-
The actor-controlled domains mimicked Cloudflare verification pages to deceive users into entering legitimate device codes, granting attackers access to Microsoft accounts and data.
First reported: 29.08.2025 16:222 sources, 2 articlesShow sources
- Amazon Disrupts APT29 Watering Hole Campaign Abusing Microsoft Device Code Authentication — thehackernews.com — 29.08.2025 16:22
- Amazon disrupts Russian APT29 hackers targeting Microsoft 365 — www.bleepingcomputer.com — 01.09.2025 18:35
-
The campaign employed evasion techniques such as Base64 encoding to conceal malicious code, setting cookies to prevent repeated redirects of the same visitor, and shifting to new infrastructure when blocked.
First reported: 29.08.2025 16:222 sources, 2 articlesShow sources
- Amazon Disrupts APT29 Watering Hole Campaign Abusing Microsoft Device Code Authentication — thehackernews.com — 29.08.2025 16:22
- Amazon disrupts Russian APT29 hackers targeting Microsoft 365 — www.bleepingcomputer.com — 01.09.2025 18:35
-
Amazon's intervention led to the disruption of the campaign, despite APT29's attempts to migrate to new infrastructure.
First reported: 29.08.2025 16:222 sources, 2 articlesShow sources
- Amazon Disrupts APT29 Watering Hole Campaign Abusing Microsoft Device Code Authentication — thehackernews.com — 29.08.2025 16:22
- Amazon disrupts Russian APT29 hackers targeting Microsoft 365 — www.bleepingcomputer.com — 01.09.2025 18:35
-
The campaign targeted Microsoft 365 accounts and data.
First reported: 01.09.2025 18:351 source, 1 articleShow sources
- Amazon disrupts Russian APT29 hackers targeting Microsoft 365 — www.bleepingcomputer.com — 01.09.2025 18:35
-
APT29 has previously targeted European embassies, Hewlett Packard Enterprise, and TeamViewer.
First reported: 01.09.2025 18:351 source, 1 articleShow sources
- Amazon disrupts Russian APT29 hackers targeting Microsoft 365 — www.bleepingcomputer.com — 01.09.2025 18:35
-
Amazon's threat intelligence team discovered the domain names used in the watering hole campaign.
First reported: 01.09.2025 18:351 source, 1 articleShow sources
- Amazon disrupts Russian APT29 hackers targeting Microsoft 365 — www.bleepingcomputer.com — 01.09.2025 18:35
-
The campaign used a cookie-based system to prevent the same user from being redirected multiple times.
First reported: 01.09.2025 18:352 sources, 2 articlesShow sources
- Amazon disrupts Russian APT29 hackers targeting Microsoft 365 — www.bleepingcomputer.com — 01.09.2025 18:35
- Russia Hits Critical Orgs Via Misconfigured Edge Devices — www.darkreading.com — 16.12.2025 22:03
-
Amazon isolated the EC2 instances used by the threat actor and partnered with Cloudflare and Microsoft to disrupt the identified domains.
First reported: 01.09.2025 18:351 source, 1 articleShow sources
- Amazon disrupts Russian APT29 hackers targeting Microsoft 365 — www.bleepingcomputer.com — 01.09.2025 18:35
-
APT29 attempted to move its infrastructure to another cloud provider and registered new domain names.
First reported: 01.09.2025 18:351 source, 1 articleShow sources
- Amazon disrupts Russian APT29 hackers targeting Microsoft 365 — www.bleepingcomputer.com — 01.09.2025 18:35
-
The campaign reflects an evolution in APT29's technical approach, no longer relying on domains that impersonate AWS or social engineering attempts to bypass multi-factor authentication (MFA).
First reported: 01.09.2025 18:351 source, 1 articleShow sources
- Amazon disrupts Russian APT29 hackers targeting Microsoft 365 — www.bleepingcomputer.com — 01.09.2025 18:35
-
Users are advised to verify device authorization requests, enable multi-factor authentication (MFA), and avoid executing commands copied from webpages.
First reported: 01.09.2025 18:351 source, 1 articleShow sources
- Amazon disrupts Russian APT29 hackers targeting Microsoft 365 — www.bleepingcomputer.com — 01.09.2025 18:35
-
Administrators should disable unnecessary device authorization flaws, enforce conditional access policies, and monitor for suspicious authentication events.
First reported: 01.09.2025 18:351 source, 1 articleShow sources
- Amazon disrupts Russian APT29 hackers targeting Microsoft 365 — www.bleepingcomputer.com — 01.09.2025 18:35
-
Amazon's infrastructure and services were not compromised by the campaign.
First reported: 01.09.2025 18:351 source, 1 articleShow sources
- Amazon disrupts Russian APT29 hackers targeting Microsoft 365 — www.bleepingcomputer.com — 01.09.2025 18:35
-
APT44, also known as FROZENBARENTS, Sandworm, Seashell Blizzard, and Voodoo Bear, is a GRU-affiliated cyber threat group.
First reported: 16.12.2025 14:273 sources, 4 articlesShow sources
- Amazon Exposes Years-Long GRU Cyber Campaign Targeting Energy and Cloud Infrastructure — thehackernews.com — 16.12.2025 14:27
- Amazon: Russian Hackers Now Favor Misconfigurations in Critical Infrastructure Attacks — www.securityweek.com — 16.12.2025 15:22
- Amazon disrupts Russian GRU hackers attacking edge network devices — www.bleepingcomputer.com — 16.12.2025 22:13
- APT28 Targets Ukrainian UKR-net Users in Long-Running Credential Phishing Campaign — thehackernews.com — 17.12.2025 17:30
-
APT44 targeted Western critical infrastructure, including energy sector organizations, between 2021 and 2025.
First reported: 16.12.2025 14:274 sources, 5 articlesShow sources
- Amazon Exposes Years-Long GRU Cyber Campaign Targeting Energy and Cloud Infrastructure — thehackernews.com — 16.12.2025 14:27
- Amazon: Russian Hackers Now Favor Misconfigurations in Critical Infrastructure Attacks — www.securityweek.com — 16.12.2025 15:22
- Amazon disrupts Russian GRU hackers attacking edge network devices — www.bleepingcomputer.com — 16.12.2025 22:13
- Russia Hits Critical Orgs Via Misconfigured Edge Devices — www.darkreading.com — 16.12.2025 22:03
- APT28 Targets Ukrainian UKR-net Users in Long-Running Credential Phishing Campaign — thehackernews.com — 17.12.2025 17:30
-
APT44 exploited misconfigured customer network edge devices as initial access vectors.
First reported: 16.12.2025 14:274 sources, 4 articlesShow sources
- Amazon Exposes Years-Long GRU Cyber Campaign Targeting Energy and Cloud Infrastructure — thehackernews.com — 16.12.2025 14:27
- Amazon: Russian Hackers Now Favor Misconfigurations in Critical Infrastructure Attacks — www.securityweek.com — 16.12.2025 15:22
- Amazon disrupts Russian GRU hackers attacking edge network devices — www.bleepingcomputer.com — 16.12.2025 22:13
- Russia Hits Critical Orgs Via Misconfigured Edge Devices — www.darkreading.com — 16.12.2025 22:03
-
APT44 leveraged vulnerabilities in WatchGuard Firebox and XTM (CVE-2022-26318), Atlassian Confluence (CVE-2021-26084, CVE-2023-22518), and Veeam (CVE-2023-27532).
First reported: 16.12.2025 14:274 sources, 4 articlesShow sources
- Amazon Exposes Years-Long GRU Cyber Campaign Targeting Energy and Cloud Infrastructure — thehackernews.com — 16.12.2025 14:27
- Amazon: Russian Hackers Now Favor Misconfigurations in Critical Infrastructure Attacks — www.securityweek.com — 16.12.2025 15:22
- Amazon disrupts Russian GRU hackers attacking edge network devices — www.bleepingcomputer.com — 16.12.2025 22:13
- Russia Hits Critical Orgs Via Misconfigured Edge Devices — www.darkreading.com — 16.12.2025 22:03
-
APT44 targeted enterprise routers, VPN concentrators, network management appliances, and cloud-based project management systems.
First reported: 16.12.2025 14:274 sources, 4 articlesShow sources
- Amazon Exposes Years-Long GRU Cyber Campaign Targeting Energy and Cloud Infrastructure — thehackernews.com — 16.12.2025 14:27
- Amazon: Russian Hackers Now Favor Misconfigurations in Critical Infrastructure Attacks — www.securityweek.com — 16.12.2025 15:22
- Amazon disrupts Russian GRU hackers attacking edge network devices — www.bleepingcomputer.com — 16.12.2025 22:13
- Russia Hits Critical Orgs Via Misconfigured Edge Devices — www.darkreading.com — 16.12.2025 22:03
-
APT44 conducted credential replay attacks against victim organizations' online services.
First reported: 16.12.2025 14:274 sources, 4 articlesShow sources
- Amazon Exposes Years-Long GRU Cyber Campaign Targeting Energy and Cloud Infrastructure — thehackernews.com — 16.12.2025 14:27
- Amazon: Russian Hackers Now Favor Misconfigurations in Critical Infrastructure Attacks — www.securityweek.com — 16.12.2025 15:22
- Amazon disrupts Russian GRU hackers attacking edge network devices — www.bleepingcomputer.com — 16.12.2025 22:13
- Russia Hits Critical Orgs Via Misconfigured Edge Devices — www.darkreading.com — 16.12.2025 22:03
-
APT44's activities were linked to infrastructure overlaps with the Curly COMrades cluster tracked by Bitdefender.
First reported: 16.12.2025 14:274 sources, 4 articlesShow sources
- Amazon Exposes Years-Long GRU Cyber Campaign Targeting Energy and Cloud Infrastructure — thehackernews.com — 16.12.2025 14:27
- Amazon: Russian Hackers Now Favor Misconfigurations in Critical Infrastructure Attacks — www.securityweek.com — 16.12.2025 15:22
- Amazon disrupts Russian GRU hackers attacking edge network devices — www.bleepingcomputer.com — 16.12.2025 22:13
- Russia Hits Critical Orgs Via Misconfigured Edge Devices — www.darkreading.com — 16.12.2025 22:03
-
Amazon identified and notified affected customers and disrupted active threat actor operations targeting its cloud services.
First reported: 16.12.2025 14:274 sources, 4 articlesShow sources
- Amazon Exposes Years-Long GRU Cyber Campaign Targeting Energy and Cloud Infrastructure — thehackernews.com — 16.12.2025 14:27
- Amazon: Russian Hackers Now Favor Misconfigurations in Critical Infrastructure Attacks — www.securityweek.com — 16.12.2025 15:22
- Amazon disrupts Russian GRU hackers attacking edge network devices — www.bleepingcomputer.com — 16.12.2025 22:13
- Russia Hits Critical Orgs Via Misconfigured Edge Devices — www.darkreading.com — 16.12.2025 22:03
-
APT44 has shifted focus from exploiting vulnerabilities to targeting misconfigured network edge devices starting in 2025.
First reported: 16.12.2025 15:223 sources, 3 articlesShow sources
- Amazon: Russian Hackers Now Favor Misconfigurations in Critical Infrastructure Attacks — www.securityweek.com — 16.12.2025 15:22
- Amazon disrupts Russian GRU hackers attacking edge network devices — www.bleepingcomputer.com — 16.12.2025 22:13
- Russia Hits Critical Orgs Via Misconfigured Edge Devices — www.darkreading.com — 16.12.2025 22:03
-
APT44 leveraged native packet-capture capabilities to intercept traffic and collect credentials.
First reported: 16.12.2025 15:223 sources, 3 articlesShow sources
- Amazon: Russian Hackers Now Favor Misconfigurations in Critical Infrastructure Attacks — www.securityweek.com — 16.12.2025 15:22
- Amazon disrupts Russian GRU hackers attacking edge network devices — www.bleepingcomputer.com — 16.12.2025 22:13
- Russia Hits Critical Orgs Via Misconfigured Edge Devices — www.darkreading.com — 16.12.2025 22:03
-
Amazon's monitoring of attacks was facilitated by the fact that targeted network edge devices were hosted on AWS.
First reported: 16.12.2025 15:223 sources, 3 articlesShow sources
- Amazon: Russian Hackers Now Favor Misconfigurations in Critical Infrastructure Attacks — www.securityweek.com — 16.12.2025 15:22
- Amazon disrupts Russian GRU hackers attacking edge network devices — www.bleepingcomputer.com — 16.12.2025 22:13
- Russia Hits Critical Orgs Via Misconfigured Edge Devices — www.darkreading.com — 16.12.2025 22:03
-
Amazon Threat Intelligence team disrupted active operations attributed to GRU hackers targeting cloud infrastructure.
First reported: 16.12.2025 22:032 sources, 2 articlesShow sources
- Amazon disrupts Russian GRU hackers attacking edge network devices — www.bleepingcomputer.com — 16.12.2025 22:13
- Russia Hits Critical Orgs Via Misconfigured Edge Devices — www.darkreading.com — 16.12.2025 22:03
-
GRU hackers targeted Western critical infrastructure, especially the energy sector, starting in 2021.
First reported: 16.12.2025 22:032 sources, 2 articlesShow sources
- Amazon disrupts Russian GRU hackers attacking edge network devices — www.bleepingcomputer.com — 16.12.2025 22:13
- Russia Hits Critical Orgs Via Misconfigured Edge Devices — www.darkreading.com — 16.12.2025 22:03
-
Threat actor shifted from exploiting vulnerabilities to leveraging misconfigured edge devices for initial access.
First reported: 16.12.2025 22:032 sources, 2 articlesShow sources
- Amazon disrupts Russian GRU hackers attacking edge network devices — www.bleepingcomputer.com — 16.12.2025 22:13
- Russia Hits Critical Orgs Via Misconfigured Edge Devices — www.darkreading.com — 16.12.2025 22:03
-
Up to 2024, the campaign exploited vulnerabilities in WatchGuard, Confluence, and Veeam as primary initial access vectors.
First reported: 16.12.2025 22:032 sources, 2 articlesShow sources
- Amazon disrupts Russian GRU hackers attacking edge network devices — www.bleepingcomputer.com — 16.12.2025 22:13
- Russia Hits Critical Orgs Via Misconfigured Edge Devices — www.darkreading.com — 16.12.2025 22:03
-
In 2025, the threat actor relied less on vulnerabilities and more on targeting misconfigured customer network edge devices.
First reported: 16.12.2025 22:032 sources, 2 articlesShow sources
- Amazon disrupts Russian GRU hackers attacking edge network devices — www.bleepingcomputer.com — 16.12.2025 22:13
- Russia Hits Critical Orgs Via Misconfigured Edge Devices — www.darkreading.com — 16.12.2025 22:03
-
Targeted devices included enterprise routers, VPN gateways, network management appliances, collaboration platforms, and cloud-based project management solutions.
First reported: 16.12.2025 22:032 sources, 2 articlesShow sources
- Amazon disrupts Russian GRU hackers attacking edge network devices — www.bleepingcomputer.com — 16.12.2025 22:13
- Russia Hits Critical Orgs Via Misconfigured Edge Devices — www.darkreading.com — 16.12.2025 22:03
-
Threat actor's shift in operational tempo represents a concerning evolution, maintaining focus on misconfigured devices while reducing investment in zero-day and N-day exploitation.
First reported: 16.12.2025 22:032 sources, 2 articlesShow sources
- Amazon disrupts Russian GRU hackers attacking edge network devices — www.bleepingcomputer.com — 16.12.2025 22:13
- Russia Hits Critical Orgs Via Misconfigured Edge Devices — www.darkreading.com — 16.12.2025 22:03
-
Tactical evolution did not reflect any change in the group's operational objectives: stealing credentials and moving laterally on the victim network with minimal exposure and resources.
First reported: 16.12.2025 22:032 sources, 2 articlesShow sources
- Amazon disrupts Russian GRU hackers attacking edge network devices — www.bleepingcomputer.com — 16.12.2025 22:13
- Russia Hits Critical Orgs Via Misconfigured Edge Devices — www.darkreading.com — 16.12.2025 22:03
-
Based on targeting patterns and overlaps in infrastructure, Amazon assesses with high confidence that the observed attacks were carried out by hackers working for the Russian GRU.
First reported: 16.12.2025 22:033 sources, 3 articlesShow sources
- Amazon disrupts Russian GRU hackers attacking edge network devices — www.bleepingcomputer.com — 16.12.2025 22:13
- Russia Hits Critical Orgs Via Misconfigured Edge Devices — www.darkreading.com — 16.12.2025 22:03
- APT28 Targets Ukrainian UKR-net Users in Long-Running Credential Phishing Campaign — thehackernews.com — 17.12.2025 17:30
-
Amazon believes that the Curly COMRades hackers may be tasked with post-compromise activity in a broader GRU campaign involving multiple specialized subclusters.
First reported: 16.12.2025 22:032 sources, 2 articlesShow sources
- Amazon disrupts Russian GRU hackers attacking edge network devices — www.bleepingcomputer.com — 16.12.2025 22:13
- Russia Hits Critical Orgs Via Misconfigured Edge Devices — www.darkreading.com — 16.12.2025 22:03
-
Evidence points to passive packet capturing and traffic interception for credential harvesting.
First reported: 16.12.2025 22:032 sources, 2 articlesShow sources
- Amazon disrupts Russian GRU hackers attacking edge network devices — www.bleepingcomputer.com — 16.12.2025 22:13
- Russia Hits Critical Orgs Via Misconfigured Edge Devices — www.darkreading.com — 16.12.2025 22:03
-
Compromised devices were customer-managed network appliances hosted on AWS EC2 instances, with no flaws in the AWS service itself.
First reported: 16.12.2025 22:032 sources, 2 articlesShow sources
- Amazon disrupts Russian GRU hackers attacking edge network devices — www.bleepingcomputer.com — 16.12.2025 22:13
- Russia Hits Critical Orgs Via Misconfigured Edge Devices — www.darkreading.com — 16.12.2025 22:03
-
Amazon took immediate action to protect compromised EC2 instances, notified affected customers, and shared intelligence with impacted vendors and industry partners.
First reported: 16.12.2025 22:032 sources, 2 articlesShow sources
- Amazon disrupts Russian GRU hackers attacking edge network devices — www.bleepingcomputer.com — 16.12.2025 22:13
- Russia Hits Critical Orgs Via Misconfigured Edge Devices — www.darkreading.com — 16.12.2025 22:03
-
Amazon disrupted active threat actor operations and reduced the attack surface available to this threat activity subcluster.
First reported: 16.12.2025 22:032 sources, 2 articlesShow sources
- Amazon disrupts Russian GRU hackers attacking edge network devices — www.bleepingcomputer.com — 16.12.2025 22:13
- Russia Hits Critical Orgs Via Misconfigured Edge Devices — www.darkreading.com — 16.12.2025 22:03
-
Amazon shared offending IP addresses but warned against blocking them without first conducting a contextual investigation.
First reported: 16.12.2025 22:032 sources, 2 articlesShow sources
- Amazon disrupts Russian GRU hackers attacking edge network devices — www.bleepingcomputer.com — 16.12.2025 22:13
- Russia Hits Critical Orgs Via Misconfigured Edge Devices — www.darkreading.com — 16.12.2025 22:03
-
Amazon recommended auditing network devices, watching for credential replay activity, and monitoring access to administrative portals.
First reported: 16.12.2025 22:032 sources, 2 articlesShow sources
- Amazon disrupts Russian GRU hackers attacking edge network devices — www.bleepingcomputer.com — 16.12.2025 22:13
- Russia Hits Critical Orgs Via Misconfigured Edge Devices — www.darkreading.com — 16.12.2025 22:03
-
In AWS environments, it is recommended to isolate management interfaces, restrict security groups, and enable CloudTrail, GuardDuty, and VPC Flow Logs.
First reported: 16.12.2025 22:032 sources, 2 articlesShow sources
- Amazon disrupts Russian GRU hackers attacking edge network devices — www.bleepingcomputer.com — 16.12.2025 22:13
- Russia Hits Critical Orgs Via Misconfigured Edge Devices — www.darkreading.com — 16.12.2025 22:03
-
The campaign targeted critical organizations in North America, Europe, and the Middle East, with a notable focus on the energy sector.
First reported: 16.12.2025 22:031 source, 1 articleShow sources
- Russia Hits Critical Orgs Via Misconfigured Edge Devices — www.darkreading.com — 16.12.2025 22:03
-
Attackers targeted enterprise routers, routing infrastructure, VPN concentrators, network management appliances, collaboration platforms, and cloud-based project management systems.
First reported: 16.12.2025 22:031 source, 1 articleShow sources
- Russia Hits Critical Orgs Via Misconfigured Edge Devices — www.darkreading.com — 16.12.2025 22:03
-
The shift toward targeting misconfigured network edge devices began gradually between 2021 and 2025.
First reported: 16.12.2025 22:031 source, 1 articleShow sources
- Russia Hits Critical Orgs Via Misconfigured Edge Devices — www.darkreading.com — 16.12.2025 22:03
-
In 2021, the threat cluster exploited WatchGuard flaw CVE-2022-26318.
First reported: 16.12.2025 22:031 source, 1 articleShow sources
- Russia Hits Critical Orgs Via Misconfigured Edge Devices — www.darkreading.com — 16.12.2025 22:03
-
Between 2022 and 2023, threat actors targeted Confluence vulnerabilities CVE-2021-26084 and CVE-2023-22518.
First reported: 16.12.2025 22:031 source, 1 articleShow sources
- Russia Hits Critical Orgs Via Misconfigured Edge Devices — www.darkreading.com — 16.12.2025 22:03
-
In 2024, attackers targeted Veeam flaw CVE-2023-27532.
First reported: 16.12.2025 22:031 source, 1 articleShow sources
- Russia Hits Critical Orgs Via Misconfigured Edge Devices — www.darkreading.com — 16.12.2025 22:03
-
The primary credential extraction mechanism appeared to be packet capture and traffic analysis.
First reported: 16.12.2025 22:031 source, 1 articleShow sources
- Russia Hits Critical Orgs Via Misconfigured Edge Devices — www.darkreading.com — 16.12.2025 22:03
-
Amazon identified and notified customers with compromised network appliances, enabled remediation of compromised EC2 resources, shared intelligence with partners and affected vendors, and reported observations to network appliance vendors.
First reported: 16.12.2025 22:031 source, 1 articleShow sources
- Russia Hits Critical Orgs Via Misconfigured Edge Devices — www.darkreading.com — 16.12.2025 22:03
-
APT28, also known as BlueDelta, Fancy Bear, Forest Blizzard, FROZENLAKE, Iron Twilight, ITG05, Pawn Storm, Sednit, Sofacy, and TA422, is affiliated with Russia's Main Directorate of the General Staff of the Russian Federation's Armed Forces (GRU).
First reported: 17.12.2025 17:304 sources, 6 articlesShow sources
- APT28 Targets Ukrainian UKR-net Users in Long-Running Credential Phishing Campaign — thehackernews.com — 17.12.2025 17:30
- Notorious Russian APT Nabs Credentials From Global Targets — www.darkreading.com — 09.01.2026 09:00
- Russian APT28 Runs Credential-Stealing Campaign Targeting Energy and Policy Organizations — thehackernews.com — 09.01.2026 17:28
- Russia’s APT28 Targeting Energy Research, Defense Collaboration Entities — www.securityweek.com — 12.01.2026 14:23
- Russian hackers exploit recently patched Microsoft Office bug in attacks — www.bleepingcomputer.com — 02.02.2026 23:00
- APT28 Uses Microsoft Office CVE-2026-21509 in Espionage-Focused Malware Attacks — thehackernews.com — 03.02.2026 11:12
-
APT28 has been conducting a sustained credential-harvesting campaign targeting users of UKR[.]net, a webmail and news service popular in Ukraine, between June 2024 and April 2025.
First reported: 17.12.2025 17:304 sources, 6 articlesShow sources
- APT28 Targets Ukrainian UKR-net Users in Long-Running Credential Phishing Campaign — thehackernews.com — 17.12.2025 17:30
- Notorious Russian APT Nabs Credentials From Global Targets — www.darkreading.com — 09.01.2026 09:00
- Russian APT28 Runs Credential-Stealing Campaign Targeting Energy and Policy Organizations — thehackernews.com — 09.01.2026 17:28
- Russia’s APT28 Targeting Energy Research, Defense Collaboration Entities — www.securityweek.com — 12.01.2026 14:23
- Russian hackers exploit recently patched Microsoft Office bug in attacks — www.bleepingcomputer.com — 02.02.2026 23:00
- APT28 Uses Microsoft Office CVE-2026-21509 in Espionage-Focused Malware Attacks — thehackernews.com — 03.02.2026 11:12
-
The campaign involves deploying UKR[.]net-themed login pages on legitimate services like Mocky to entice recipients into entering their credentials and two-factor authentication (2FA) codes.
First reported: 17.12.2025 17:304 sources, 6 articlesShow sources
- APT28 Targets Ukrainian UKR-net Users in Long-Running Credential Phishing Campaign — thehackernews.com — 17.12.2025 17:30
- Notorious Russian APT Nabs Credentials From Global Targets — www.darkreading.com — 09.01.2026 09:00
- Russian APT28 Runs Credential-Stealing Campaign Targeting Energy and Policy Organizations — thehackernews.com — 09.01.2026 17:28
- Russia’s APT28 Targeting Energy Research, Defense Collaboration Entities — www.securityweek.com — 12.01.2026 14:23
- Russian hackers exploit recently patched Microsoft Office bug in attacks — www.bleepingcomputer.com — 02.02.2026 23:00
- APT28 Uses Microsoft Office CVE-2026-21509 in Espionage-Focused Malware Attacks — thehackernews.com — 03.02.2026 11:12
-
Links to these pages are embedded within PDF documents distributed via phishing emails, often shortened using services like tiny[.]cc or tinyurl[.]com.
First reported: 17.12.2025 17:304 sources, 6 articlesShow sources
- APT28 Targets Ukrainian UKR-net Users in Long-Running Credential Phishing Campaign — thehackernews.com — 17.12.2025 17:30
- Notorious Russian APT Nabs Credentials From Global Targets — www.darkreading.com — 09.01.2026 09:00
- Russian APT28 Runs Credential-Stealing Campaign Targeting Energy and Policy Organizations — thehackernews.com — 09.01.2026 17:28
- Russia’s APT28 Targeting Energy Research, Defense Collaboration Entities — www.securityweek.com — 12.01.2026 14:23
- Russian hackers exploit recently patched Microsoft Office bug in attacks — www.bleepingcomputer.com — 02.02.2026 23:00
- APT28 Uses Microsoft Office CVE-2026-21509 in Espionage-Focused Malware Attacks — thehackernews.com — 03.02.2026 11:12
-
In some cases, APT28 uses subdomains created on platforms like Blogger (*.blogspot[.]com) to launch a two-tier redirection chain leading to the credential harvesting page.
First reported: 17.12.2025 17:304 sources, 6 articlesShow sources
- APT28 Targets Ukrainian UKR-net Users in Long-Running Credential Phishing Campaign — thehackernews.com — 17.12.2025 17:30
- Notorious Russian APT Nabs Credentials From Global Targets — www.darkreading.com — 09.01.2026 09:00
- Russian APT28 Runs Credential-Stealing Campaign Targeting Energy and Policy Organizations — thehackernews.com — 09.01.2026 17:28
- Russia’s APT28 Targeting Energy Research, Defense Collaboration Entities — www.securityweek.com — 12.01.2026 14:23
- Russian hackers exploit recently patched Microsoft Office bug in attacks — www.bleepingcomputer.com — 02.02.2026 23:00
- APT28 Uses Microsoft Office CVE-2026-21509 in Espionage-Focused Malware Attacks — thehackernews.com — 03.02.2026 11:12
-
APT28 has transitioned from using compromised routers to proxy tunneling services such as ngrok and Serveo to capture and relay stolen credentials and 2FA codes.
First reported: 17.12.2025 17:303 sources, 5 articlesShow sources
- APT28 Targets Ukrainian UKR-net Users in Long-Running Credential Phishing Campaign — thehackernews.com — 17.12.2025 17:30
- Russian APT28 Runs Credential-Stealing Campaign Targeting Energy and Policy Organizations — thehackernews.com — 09.01.2026 17:28
- Russia’s APT28 Targeting Energy Research, Defense Collaboration Entities — www.securityweek.com — 12.01.2026 14:23
- Russian hackers exploit recently patched Microsoft Office bug in attacks — www.bleepingcomputer.com — 02.02.2026 23:00
- APT28 Uses Microsoft Office CVE-2026-21509 in Espionage-Focused Malware Attacks — thehackernews.com — 03.02.2026 11:12
-
The campaign is part of a broader set of phishing and credential theft operations targeting government institutions, defense contractors, weapons suppliers, logistics firms, and policy think tanks in pursuit of Russia's strategic objectives.
First reported: 17.12.2025 17:303 sources, 5 articlesShow sources
- APT28 Targets Ukrainian UKR-net Users in Long-Running Credential Phishing Campaign — thehackernews.com — 17.12.2025 17:30
- Notorious Russian APT Nabs Credentials From Global Targets — www.darkreading.com — 09.01.2026 09:00
- Russian APT28 Runs Credential-Stealing Campaign Targeting Energy and Policy Organizations — thehackernews.com — 09.01.2026 17:28
- Russian hackers exploit recently patched Microsoft Office bug in attacks — www.bleepingcomputer.com — 02.02.2026 23:00
- APT28 Uses Microsoft Office CVE-2026-21509 in Espionage-Focused Malware Attacks — thehackernews.com — 03.02.2026 11:12
-
APT28 targeted Turkish renewable energy scientists with a climate change policy document from a real Middle Eastern think tank.
First reported: 09.01.2026 09:004 sources, 5 articlesShow sources
- Notorious Russian APT Nabs Credentials From Global Targets — www.darkreading.com — 09.01.2026 09:00
- Russian APT28 Runs Credential-Stealing Campaign Targeting Energy and Policy Organizations — thehackernews.com — 09.01.2026 17:28
- Russia’s APT28 Targeting Energy Research, Defense Collaboration Entities — www.securityweek.com — 12.01.2026 14:23
- Russian hackers exploit recently patched Microsoft Office bug in attacks — www.bleepingcomputer.com — 02.02.2026 23:00
- APT28 Uses Microsoft Office CVE-2026-21509 in Espionage-Focused Malware Attacks — thehackernews.com — 03.02.2026 11:12
-
APT28 used phishing emails themed to match their intended targets and written in the targets' native tongues.
First reported: 09.01.2026 09:004 sources, 5 articlesShow sources
- Notorious Russian APT Nabs Credentials From Global Targets — www.darkreading.com — 09.01.2026 09:00
- Russian APT28 Runs Credential-Stealing Campaign Targeting Energy and Policy Organizations — thehackernews.com — 09.01.2026 17:28
- Russia’s APT28 Targeting Energy Research, Defense Collaboration Entities — www.securityweek.com — 12.01.2026 14:23
- Russian hackers exploit recently patched Microsoft Office bug in attacks — www.bleepingcomputer.com — 02.02.2026 23:00
- APT28 Uses Microsoft Office CVE-2026-21509 in Espionage-Focused Malware Attacks — thehackernews.com — 03.02.2026 11:12
-
APT28 redirected victims to a login page mimicking a legitimate online service after they followed a link in a phishing email.
First reported: 09.01.2026 09:004 sources, 5 articlesShow sources
- Notorious Russian APT Nabs Credentials From Global Targets — www.darkreading.com — 09.01.2026 09:00
- Russian APT28 Runs Credential-Stealing Campaign Targeting Energy and Policy Organizations — thehackernews.com — 09.01.2026 17:28
- Russia’s APT28 Targeting Energy Research, Defense Collaboration Entities — www.securityweek.com — 12.01.2026 14:23
- Russian hackers exploit recently patched Microsoft Office bug in attacks — www.bleepingcomputer.com — 02.02.2026 23:00
- APT28 Uses Microsoft Office CVE-2026-21509 in Espionage-Focused Malware Attacks — thehackernews.com — 03.02.2026 11:12
-
APT28 used regular hosted services rather than custom tools and infrastructure for their attacks.
First reported: 09.01.2026 09:004 sources, 5 articlesShow sources
- Notorious Russian APT Nabs Credentials From Global Targets — www.darkreading.com — 09.01.2026 09:00
- Russian APT28 Runs Credential-Stealing Campaign Targeting Energy and Policy Organizations — thehackernews.com — 09.01.2026 17:28
- Russia’s APT28 Targeting Energy Research, Defense Collaboration Entities — www.securityweek.com — 12.01.2026 14:23
- Russian hackers exploit recently patched Microsoft Office bug in attacks — www.bleepingcomputer.com — 02.02.2026 23:00
- APT28 Uses Microsoft Office CVE-2026-21509 in Espionage-Focused Malware Attacks — thehackernews.com — 03.02.2026 11:12
-
APT28's targets included an IT integrator based in Uzbekistan, a European think tank, a military organization in North Macedonia, and scientists and researchers associated with a Turkish energy and nuclear research organization.
First reported: 09.01.2026 09:004 sources, 5 articlesShow sources
- Notorious Russian APT Nabs Credentials From Global Targets — www.darkreading.com — 09.01.2026 09:00
- Russian APT28 Runs Credential-Stealing Campaign Targeting Energy and Policy Organizations — thehackernews.com — 09.01.2026 17:28
- Russia’s APT28 Targeting Energy Research, Defense Collaboration Entities — www.securityweek.com — 12.01.2026 14:23
- Russian hackers exploit recently patched Microsoft Office bug in attacks — www.bleepingcomputer.com — 02.02.2026 23:00
- APT28 Uses Microsoft Office CVE-2026-21509 in Espionage-Focused Malware Attacks — thehackernews.com — 03.02.2026 11:12
-
APT28's campaign was highly selective and consistent with GRU collection priorities, aligning with geopolitical, military, or strategic intelligence objectives.
First reported: 09.01.2026 09:004 sources, 5 articlesShow sources
- Notorious Russian APT Nabs Credentials From Global Targets — www.darkreading.com — 09.01.2026 09:00
- Russian APT28 Runs Credential-Stealing Campaign Targeting Energy and Policy Organizations — thehackernews.com — 09.01.2026 17:28
- Russia’s APT28 Targeting Energy Research, Defense Collaboration Entities — www.securityweek.com — 12.01.2026 14:23
- Russian hackers exploit recently patched Microsoft Office bug in attacks — www.bleepingcomputer.com — 02.02.2026 23:00
- APT28 Uses Microsoft Office CVE-2026-21509 in Espionage-Focused Malware Attacks — thehackernews.com — 03.02.2026 11:12
-
APT28 targeted individuals associated with a Turkish energy and nuclear research agency, a European think tank, and organizations in North Macedonia and Uzbekistan.
First reported: 09.01.2026 17:283 sources, 4 articlesShow sources
- Russian APT28 Runs Credential-Stealing Campaign Targeting Energy and Policy Organizations — thehackernews.com — 09.01.2026 17:28
- Russia’s APT28 Targeting Energy Research, Defense Collaboration Entities — www.securityweek.com — 12.01.2026 14:23
- Russian hackers exploit recently patched Microsoft Office bug in attacks — www.bleepingcomputer.com — 02.02.2026 23:00
- APT28 Uses Microsoft Office CVE-2026-21509 in Espionage-Focused Malware Attacks — thehackernews.com — 03.02.2026 11:12
-
APT28 used fake login pages styled to resemble popular services like Microsoft Outlook Web Access (OWA), Google, and Sophos VPN portals.
First reported: 09.01.2026 17:283 sources, 4 articlesShow sources
- Russian APT28 Runs Credential-Stealing Campaign Targeting Energy and Policy Organizations — thehackernews.com — 09.01.2026 17:28
- Russia’s APT28 Targeting Energy Research, Defense Collaboration Entities — www.securityweek.com — 12.01.2026 14:23
- Russian hackers exploit recently patched Microsoft Office bug in attacks — www.bleepingcomputer.com — 02.02.2026 23:00
- APT28 Uses Microsoft Office CVE-2026-21509 in Espionage-Focused Malware Attacks — thehackernews.com — 03.02.2026 11:12
-
The phishing campaigns redirected users to legitimate sites after credentials were entered, avoiding suspicion.
First reported: 09.01.2026 17:283 sources, 4 articlesShow sources
- Russian APT28 Runs Credential-Stealing Campaign Targeting Energy and Policy Organizations — thehackernews.com — 09.01.2026 17:28
- Russia’s APT28 Targeting Energy Research, Defense Collaboration Entities — www.securityweek.com — 12.01.2026 14:23
- Russian hackers exploit recently patched Microsoft Office bug in attacks — www.bleepingcomputer.com — 02.02.2026 23:00
- APT28 Uses Microsoft Office CVE-2026-21509 in Espionage-Focused Malware Attacks — thehackernews.com — 03.02.2026 11:12
-
APT28 used services like Webhook.site, InfinityFree, Byet Internet Services, and ngrok to host phishing pages and exfiltrate data.
First reported: 09.01.2026 17:283 sources, 4 articlesShow sources
- Russian APT28 Runs Credential-Stealing Campaign Targeting Energy and Policy Organizations — thehackernews.com — 09.01.2026 17:28
- Russia’s APT28 Targeting Energy Research, Defense Collaboration Entities — www.securityweek.com — 12.01.2026 14:23
- Russian hackers exploit recently patched Microsoft Office bug in attacks — www.bleepingcomputer.com — 02.02.2026 23:00
- APT28 Uses Microsoft Office CVE-2026-21509 in Espionage-Focused Malware Attacks — thehackernews.com — 03.02.2026 11:12
-
APT28 used legitimate PDF lure documents, including a publication from the Gulf Research Center and a policy briefing from climate change think tank ECCO.
First reported: 09.01.2026 17:283 sources, 4 articlesShow sources
- Russian APT28 Runs Credential-Stealing Campaign Targeting Energy and Policy Organizations — thehackernews.com — 09.01.2026 17:28
- Russia’s APT28 Targeting Energy Research, Defense Collaboration Entities — www.securityweek.com — 12.01.2026 14:23
- Russian hackers exploit recently patched Microsoft Office bug in attacks — www.bleepingcomputer.com — 02.02.2026 23:00
- APT28 Uses Microsoft Office CVE-2026-21509 in Espionage-Focused Malware Attacks — thehackernews.com — 03.02.2026 11:12
-
APT28 conducted a June 2025 campaign targeting an E.U. think tank with a Sophos VPN password reset page.
First reported: 09.01.2026 17:283 sources, 4 articlesShow sources
- Russian APT28 Runs Credential-Stealing Campaign Targeting Energy and Policy Organizations — thehackernews.com — 09.01.2026 17:28
- Russia’s APT28 Targeting Energy Research, Defense Collaboration Entities — www.securityweek.com — 12.01.2026 14:23
- Russian hackers exploit recently patched Microsoft Office bug in attacks — www.bleepingcomputer.com — 02.02.2026 23:00
- APT28 Uses Microsoft Office CVE-2026-21509 in Espionage-Focused Malware Attacks — thehackernews.com — 03.02.2026 11:12
-
APT28 conducted a September 2025 campaign targeting a military organization in North Macedonia and an IT integrator in Uzbekistan with fake password expiration warnings.
First reported: 09.01.2026 17:283 sources, 4 articlesShow sources
- Russian APT28 Runs Credential-Stealing Campaign Targeting Energy and Policy Organizations — thehackernews.com — 09.01.2026 17:28
- Russia’s APT28 Targeting Energy Research, Defense Collaboration Entities — www.securityweek.com — 12.01.2026 14:23
- Russian hackers exploit recently patched Microsoft Office bug in attacks — www.bleepingcomputer.com — 02.02.2026 23:00
- APT28 Uses Microsoft Office CVE-2026-21509 in Espionage-Focused Malware Attacks — thehackernews.com — 03.02.2026 11:12
-
APT28 conducted an April 2025 campaign using a fake Google password reset page hosted on Byet Internet Services to gather credentials.
First reported: 09.01.2026 17:283 sources, 4 articlesShow sources
- Russian APT28 Runs Credential-Stealing Campaign Targeting Energy and Policy Organizations — thehackernews.com — 09.01.2026 17:28
- Russia’s APT28 Targeting Energy Research, Defense Collaboration Entities — www.securityweek.com — 12.01.2026 14:23
- Russian hackers exploit recently patched Microsoft Office bug in attacks — www.bleepingcomputer.com — 02.02.2026 23:00
- APT28 Uses Microsoft Office CVE-2026-21509 in Espionage-Focused Malware Attacks — thehackernews.com — 03.02.2026 11:12
-
APT28 has been targeting organizations associated with energy research, defense collaboration, and government communication in a new credential-harvesting campaign.
First reported: 12.01.2026 14:233 sources, 3 articlesShow sources
- Russia’s APT28 Targeting Energy Research, Defense Collaboration Entities — www.securityweek.com — 12.01.2026 14:23
- Russian hackers exploit recently patched Microsoft Office bug in attacks — www.bleepingcomputer.com — 02.02.2026 23:00
- APT28 Uses Microsoft Office CVE-2026-21509 in Espionage-Focused Malware Attacks — thehackernews.com — 03.02.2026 11:12
-
APT28 used phishing pages impersonating Microsoft Outlook Web Access (OWA), Google, and Sophos VPN portals.
First reported: 12.01.2026 14:233 sources, 3 articlesShow sources
- Russia’s APT28 Targeting Energy Research, Defense Collaboration Entities — www.securityweek.com — 12.01.2026 14:23
- Russian hackers exploit recently patched Microsoft Office bug in attacks — www.bleepingcomputer.com — 02.02.2026 23:00
- APT28 Uses Microsoft Office CVE-2026-21509 in Espionage-Focused Malware Attacks — thehackernews.com — 03.02.2026 11:12
-
Victims were redirected to legitimate domains after entering their credentials.
First reported: 12.01.2026 14:233 sources, 3 articlesShow sources
- Russia’s APT28 Targeting Energy Research, Defense Collaboration Entities — www.securityweek.com — 12.01.2026 14:23
- Russian hackers exploit recently patched Microsoft Office bug in attacks — www.bleepingcomputer.com — 02.02.2026 23:00
- APT28 Uses Microsoft Office CVE-2026-21509 in Espionage-Focused Malware Attacks — thehackernews.com — 03.02.2026 11:12
-
APT28 relied heavily on free hosting and tunneling services such as Webhook.site, InfinityFree, Byet Internet Services, and Ngrok to host phishing content, capture user data, and manage redirections.
First reported: 12.01.2026 14:233 sources, 3 articlesShow sources
- Russia’s APT28 Targeting Energy Research, Defense Collaboration Entities — www.securityweek.com — 12.01.2026 14:23
- Russian hackers exploit recently patched Microsoft Office bug in attacks — www.bleepingcomputer.com — 02.02.2026 23:00
- APT28 Uses Microsoft Office CVE-2026-21509 in Espionage-Focused Malware Attacks — thehackernews.com — 03.02.2026 11:12
-
In February 2025, APT28 deployed a Microsoft OWA phishing page and used the ShortURL link-shortening service for the first-stage redirection.
First reported: 12.01.2026 14:233 sources, 3 articlesShow sources
- Russia’s APT28 Targeting Energy Research, Defense Collaboration Entities — www.securityweek.com — 12.01.2026 14:23
- Russian hackers exploit recently patched Microsoft Office bug in attacks — www.bleepingcomputer.com — 02.02.2026 23:00
- APT28 Uses Microsoft Office CVE-2026-21509 in Espionage-Focused Malware Attacks — thehackernews.com — 03.02.2026 11:12
-
APT28 employed a webhook relying on HTML to load a PDF lure document in the browser for two seconds before redirecting the victim to a second webhook hosting the spoofed OWA login page.
First reported: 12.01.2026 14:233 sources, 3 articlesShow sources
- Russia’s APT28 Targeting Energy Research, Defense Collaboration Entities — www.securityweek.com — 12.01.2026 14:23
- Russian hackers exploit recently patched Microsoft Office bug in attacks — www.bleepingcomputer.com — 02.02.2026 23:00
- APT28 Uses Microsoft Office CVE-2026-21509 in Espionage-Focused Malware Attacks — thehackernews.com — 03.02.2026 11:12
-
In July, APT28 deployed a spoofed OWA login portal containing Turkish-language text and targeting Turkish scientists and researchers.
First reported: 12.01.2026 14:233 sources, 3 articlesShow sources
- Russia’s APT28 Targeting Energy Research, Defense Collaboration Entities — www.securityweek.com — 12.01.2026 14:23
- Russian hackers exploit recently patched Microsoft Office bug in attacks — www.bleepingcomputer.com — 02.02.2026 23:00
- APT28 Uses Microsoft Office CVE-2026-21509 in Espionage-Focused Malware Attacks — thehackernews.com — 03.02.2026 11:12
-
In June, APT28 deployed a spoofed Sophos VPN password reset page hosted on InfinityFree infrastructure.
First reported: 12.01.2026 14:233 sources, 3 articlesShow sources
- Russia’s APT28 Targeting Energy Research, Defense Collaboration Entities — www.securityweek.com — 12.01.2026 14:23
- Russian hackers exploit recently patched Microsoft Office bug in attacks — www.bleepingcomputer.com — 02.02.2026 23:00
- APT28 Uses Microsoft Office CVE-2026-21509 in Espionage-Focused Malware Attacks — thehackernews.com — 03.02.2026 11:12
-
In September, APT28 hosted two spoofed OWA expired password pages on an InfinityFree domain.
First reported: 12.01.2026 14:233 sources, 3 articlesShow sources
- Russia’s APT28 Targeting Energy Research, Defense Collaboration Entities — www.securityweek.com — 12.01.2026 14:23
- Russian hackers exploit recently patched Microsoft Office bug in attacks — www.bleepingcomputer.com — 02.02.2026 23:00
- APT28 Uses Microsoft Office CVE-2026-21509 in Espionage-Focused Malware Attacks — thehackernews.com — 03.02.2026 11:12
-
In April, Recorded Future discovered a spoofed Google password reset page in Portuguese, hosted on a free apex domain from Byet Internet Services.
First reported: 12.01.2026 14:233 sources, 3 articlesShow sources
- Russia’s APT28 Targeting Energy Research, Defense Collaboration Entities — www.securityweek.com — 12.01.2026 14:23
- Russian hackers exploit recently patched Microsoft Office bug in attacks — www.bleepingcomputer.com — 02.02.2026 23:00
- APT28 Uses Microsoft Office CVE-2026-21509 in Espionage-Focused Malware Attacks — thehackernews.com — 03.02.2026 11:12
-
APT28 abused Ngrok's free service to connect servers behind a firewall to a proxy server and expose that server to the internet without changing firewall rules.
First reported: 12.01.2026 14:233 sources, 3 articlesShow sources
- Russia’s APT28 Targeting Energy Research, Defense Collaboration Entities — www.securityweek.com — 12.01.2026 14:23
- Russian hackers exploit recently patched Microsoft Office bug in attacks — www.bleepingcomputer.com — 02.02.2026 23:00
- APT28 Uses Microsoft Office CVE-2026-21509 in Espionage-Focused Malware Attacks — thehackernews.com — 03.02.2026 11:12
-
APT28's ability to adapt its infrastructure and rebrand credential-harvesting pages suggests it will continue to abuse free hosting, tunneling, and link-shortening services to reduce operational costs and obscure attribution.
First reported: 12.01.2026 14:233 sources, 3 articlesShow sources
- Russia’s APT28 Targeting Energy Research, Defense Collaboration Entities — www.securityweek.com — 12.01.2026 14:23
- Russian hackers exploit recently patched Microsoft Office bug in attacks — www.bleepingcomputer.com — 02.02.2026 23:00
- APT28 Uses Microsoft Office CVE-2026-21509 in Espionage-Focused Malware Attacks — thehackernews.com — 03.02.2026 11:12
-
APT28, also known as Fancy Bear and Sofacy, exploited CVE-2026-21509, a recently patched vulnerability in multiple versions of Microsoft Office.
First reported: 02.02.2026 23:002 sources, 2 articlesShow sources
- Russian hackers exploit recently patched Microsoft Office bug in attacks — www.bleepingcomputer.com — 02.02.2026 23:00
- APT28 Uses Microsoft Office CVE-2026-21509 in Espionage-Focused Malware Attacks — thehackernews.com — 03.02.2026 11:12
-
The attacks involved malicious DOC files themed around EU COREPER consultations in Ukraine and impersonated the Ukrainian Hydrometeorological Center.
First reported: 02.02.2026 23:002 sources, 2 articlesShow sources
- Russian hackers exploit recently patched Microsoft Office bug in attacks — www.bleepingcomputer.com — 02.02.2026 23:00
- APT28 Uses Microsoft Office CVE-2026-21509 in Espionage-Focused Malware Attacks — thehackernews.com — 03.02.2026 11:12
-
The malicious document triggers a WebDAV-based download chain that installs malware via COM hijacking, a malicious DLL (EhStoreShell.dll), shellcode hidden in an image file (SplashScreen.png), and a scheduled task (OneDriveHealth).
First reported: 02.02.2026 23:002 sources, 2 articlesShow sources
- Russian hackers exploit recently patched Microsoft Office bug in attacks — www.bleepingcomputer.com — 02.02.2026 23:00
- APT28 Uses Microsoft Office CVE-2026-21509 in Espionage-Focused Malware Attacks — thehackernews.com — 03.02.2026 11:12
-
The scheduled task execution leads to the termination and restart of the explorer.exe process, ensuring the loading of the EhStoreShell.dll file.
First reported: 02.02.2026 23:002 sources, 2 articlesShow sources
- Russian hackers exploit recently patched Microsoft Office bug in attacks — www.bleepingcomputer.com — 02.02.2026 23:00
- APT28 Uses Microsoft Office CVE-2026-21509 in Espionage-Focused Malware Attacks — thehackernews.com — 03.02.2026 11:12
-
This DLL executes shellcode from the image file, which launches the COVENANT software (framework) on the computer.
First reported: 02.02.2026 23:002 sources, 2 articlesShow sources
- Russian hackers exploit recently patched Microsoft Office bug in attacks — www.bleepingcomputer.com — 02.02.2026 23:00
- APT28 Uses Microsoft Office CVE-2026-21509 in Espionage-Focused Malware Attacks — thehackernews.com — 03.02.2026 11:12
-
COVENANT uses the Filen (filen.io) cloud storage service for command-and-control (C2) operations.
First reported: 02.02.2026 23:002 sources, 2 articlesShow sources
- Russian hackers exploit recently patched Microsoft Office bug in attacks — www.bleepingcomputer.com — 02.02.2026 23:00
- APT28 Uses Microsoft Office CVE-2026-21509 in Espionage-Focused Malware Attacks — thehackernews.com — 03.02.2026 11:12
-
APT28 used three more documents in attacks against various EU-based organizations, indicating that the campaign extends beyond Ukraine.
First reported: 02.02.2026 23:002 sources, 2 articlesShow sources
- Russian hackers exploit recently patched Microsoft Office bug in attacks — www.bleepingcomputer.com — 02.02.2026 23:00
- APT28 Uses Microsoft Office CVE-2026-21509 in Espionage-Focused Malware Attacks — thehackernews.com — 03.02.2026 11:12
-
Organizations are recommended to apply the latest security update on Microsoft Office 2016, 2019, LTSC 2021, LTSC 2024, and Microsoft 365 Apps.
First reported: 02.02.2026 23:002 sources, 2 articlesShow sources
- Russian hackers exploit recently patched Microsoft Office bug in attacks — www.bleepingcomputer.com — 02.02.2026 23:00
- APT28 Uses Microsoft Office CVE-2026-21509 in Espionage-Focused Malware Attacks — thehackernews.com — 03.02.2026 11:12
-
For Office 2021 and later, ensure users restart applications to allow the updates to be applied.
First reported: 02.02.2026 23:002 sources, 2 articlesShow sources
- Russian hackers exploit recently patched Microsoft Office bug in attacks — www.bleepingcomputer.com — 02.02.2026 23:00
- APT28 Uses Microsoft Office CVE-2026-21509 in Espionage-Focused Malware Attacks — thehackernews.com — 03.02.2026 11:12
-
If immediate patching is impossible, it is recommended to implement the registry-based mitigation instructions.
First reported: 02.02.2026 23:002 sources, 2 articlesShow sources
- Russian hackers exploit recently patched Microsoft Office bug in attacks — www.bleepingcomputer.com — 02.02.2026 23:00
- APT28 Uses Microsoft Office CVE-2026-21509 in Espionage-Focused Malware Attacks — thehackernews.com — 03.02.2026 11:12
-
Microsoft Defender’s Protected View adds an extra layer of defense by blocking malicious Office files originating from the Internet unless explicitly trusted.
First reported: 02.02.2026 23:002 sources, 2 articlesShow sources
- Russian hackers exploit recently patched Microsoft Office bug in attacks — www.bleepingcomputer.com — 02.02.2026 23:00
- APT28 Uses Microsoft Office CVE-2026-21509 in Espionage-Focused Malware Attacks — thehackernews.com — 03.02.2026 11:12
-
APT28 exploited CVE-2026-21509, a security feature bypass in Microsoft Office, to deliver malware via malicious RTF files.
First reported: 03.02.2026 11:121 source, 1 articleShow sources
- APT28 Uses Microsoft Office CVE-2026-21509 in Espionage-Focused Malware Attacks — thehackernews.com — 03.02.2026 11:12
-
The campaign, codenamed Operation Neusploit, targeted users in Ukraine, Slovakia, and Romania with localized social engineering lures.
First reported: 03.02.2026 11:121 source, 1 articleShow sources
- APT28 Uses Microsoft Office CVE-2026-21509 in Espionage-Focused Malware Attacks — thehackernews.com — 03.02.2026 11:12
-
APT28 used server-side evasion techniques, responding with malicious payloads only when requests originated from targeted geographic regions and included the correct User-Agent HTTP header.
First reported: 03.02.2026 11:121 source, 1 articleShow sources
- APT28 Uses Microsoft Office CVE-2026-21509 in Espionage-Focused Malware Attacks — thehackernews.com — 03.02.2026 11:12
-
The attack chains involved delivering two different versions of a dropper: one for MiniDoor, an Outlook email stealer, and another for PixyNetLoader, which deploys the COVENANT Grunt implant.
First reported: 03.02.2026 11:121 source, 1 articleShow sources
- APT28 Uses Microsoft Office CVE-2026-21509 in Espionage-Focused Malware Attacks — thehackernews.com — 03.02.2026 11:12
-
MiniDoor steals emails from various folders (Inbox, Junk, and Drafts) and forwards them to hard-coded threat actor email addresses: ahmeclaw2002@outlook[.]com and ahmeclaw@proton[.]me.
First reported: 03.02.2026 11:121 source, 1 articleShow sources
- APT28 Uses Microsoft Office CVE-2026-21509 in Espionage-Focused Malware Attacks — thehackernews.com — 03.02.2026 11:12
-
PixyNetLoader initiates an attack chain involving COM object hijacking, DLL proxying, and steganography to hide shellcode within a PNG image.
First reported: 03.02.2026 11:121 source, 1 articleShow sources
- APT28 Uses Microsoft Office CVE-2026-21509 in Espionage-Focused Malware Attacks — thehackernews.com — 03.02.2026 11:12
-
The shellcode extracted from the PNG image loads a .NET assembly associated with the COVENANT command-and-control (C2) framework.
First reported: 03.02.2026 11:121 source, 1 articleShow sources
- APT28 Uses Microsoft Office CVE-2026-21509 in Espionage-Focused Malware Attacks — thehackernews.com — 03.02.2026 11:12
-
The PixyNetLoader infection chain shares notable overlap with Operation Phantom Net Voxel, using similar techniques such as COM hijacking and DLL proxying.
First reported: 03.02.2026 11:121 source, 1 articleShow sources
- APT28 Uses Microsoft Office CVE-2026-21509 in Espionage-Focused Malware Attacks — thehackernews.com — 03.02.2026 11:12
-
CERT-UA reported that APT28 targeted more than 60 email addresses associated with central executive authorities in Ukraine using Word documents exploiting CVE-2026-21509.
First reported: 03.02.2026 11:121 source, 1 articleShow sources
- APT28 Uses Microsoft Office CVE-2026-21509 in Espionage-Focused Malware Attacks — thehackernews.com — 03.02.2026 11:12
-
The malicious documents triggered a WebDAV-based download chain that installed malware via COM hijacking, a malicious DLL (EhStoreShell.dll), shellcode hidden in an image file (SplashScreen.png), and a scheduled task (OneDriveHealth).
First reported: 03.02.2026 11:121 source, 1 articleShow sources
- APT28 Uses Microsoft Office CVE-2026-21509 in Espionage-Focused Malware Attacks — thehackernews.com — 03.02.2026 11:12
Similar Happenings
Multi-Stage Phishing Campaign Targeting Russia with Amnesia RAT and Ransomware
A sophisticated multi-stage phishing campaign is targeting users in Russia, employing social engineering tactics to deliver ransomware and Amnesia RAT. The attack begins with business-themed documents that appear benign but contain malicious scripts and payloads distributed via GitHub and Dropbox. The campaign leverages multiple public cloud services to enhance resilience and uses defendnot to disable Microsoft Defender. The malware suppresses visibility, neutralizes endpoint protection, conducts reconnaissance, and deploys payloads capable of data theft, remote control, and financial fraud.
Malware Campaign Exploits c-ares DLL Side-Loading for Evasion
A malware campaign is actively exploiting a DLL side-loading vulnerability in the c-ares library to bypass security controls and deploy various commodity trojans and stealers. The attackers pair a malicious libcares-2.dll with a signed version of the legitimate ahost.exe binary, often renaming it to evade detection. The campaign targets employees in finance, procurement, supply chain, and administration roles across commercial and industrial sectors, using lures in multiple languages. The attack leverages search order hijacking to execute the rogue DLL instead of the legitimate one, granting the threat actors code execution capabilities. The malicious artifact is distributed under various names, including invoice and request for quote (RFQ) themes to trick users into opening it.
OAuth Device Code Phishing Campaigns Target Microsoft 365 Accounts
A surge in phishing campaigns exploiting Microsoft’s OAuth device code authorization flow has been observed, targeting Microsoft 365 accounts. Both state-aligned and financially motivated actors are using social engineering to trick users into approving malicious applications, leading to account takeover and data theft. The attacks leverage the OAuth 2.0 device authorization grant, a legitimate process designed for devices with limited input capabilities. Once victims enter a device code generated by an attacker-controlled application, the threat actor receives a valid access token, granting control over the compromised account. The campaigns use QR codes, embedded buttons, and hyperlinked text to initiate the attack chain, often claiming to involve document sharing, token reauthorization, or security verification. The growth of these campaigns is linked to readily available phishing tools like SquarePhish2 and Graphish, which simplify device code abuse and require limited technical skill. Proofpoint observed financially motivated actor TA2723 and Russia-linked group UNK_AcademicFlare adopting this technique, targeting various sectors in the US and Europe. Organizations are advised to strengthen OAuth controls and train users to avoid entering device codes from untrusted sources. The activity, ongoing since September 2025, is being tracked by Proofpoint under the moniker UNK_AcademicFlare. The attacks involve using compromised email addresses belonging to government and military organizations to strike entities within government, think tanks, higher education, and transportation sectors in the U.S. and Europe. The adversary claims to share a link to a document that includes questions or topics for the email recipient to review before the meeting. The URL points to a Cloudflare Worker URL that mimics the compromised sender's Microsoft OneDrive account and instructs the victim to copy the provided code and click 'Next' to access the supposed document. Device code phishing was documented in detail by both Microsoft and Volexity in February 2025, attributing the use of the attack method to Russia-aligned clusters such as Storm-2372, APT29, UTA0304, and UTA0307. The October 2025 campaign is assessed to have been fueled by the ready availability of crimeware offerings like the Graphish phishing kit and red-team tools such as SquarePhish. To counter the risk posed by device code phishing, the best option is to create a Conditional Access policy using the Authentication Flows condition to block device code flow for all users. If that's not feasible, it's advised to use a policy that uses an allow-list approach to allow device code authentication for approved users, operating systems, or IP ranges.
Russian GRU Shifts Tactics to Target Misconfigured Edge Devices in Western Critical Infrastructure
A Russian state-sponsored threat actor, attributed to the GRU, has shifted its tactics from exploiting vulnerabilities to targeting misconfigured customer network edge devices. The campaign, active since 2021, primarily targets energy sector organizations and critical infrastructure providers in Western nations. The shift in tactics allows the group to maintain persistent access, harvest credentials, and move laterally within victim networks while reducing exposure and resource expenditure.
Pro-Russia Hacktivists Target Critical Infrastructure with Low-Sophistication Attacks
Pro-Russia hacktivist groups are conducting opportunistic, low-sophistication cyberattacks against U.S., UK, and global critical infrastructure. These attacks target a wide range of sectors, including water treatment facilities, food production, energy systems, and local government bodies, using easily repeatable methods. The groups exploit minimally secured, internet-facing virtual network computing (VNC) connections to gain unauthorized access to operational technology (OT) control devices. The joint advisory from CISA, FBI, NSA, and global partners, along with a recent warning from the UK National Cyber Security Centre (NCSC), urges immediate action to mitigate these threats. The advisory highlights the use of basic methods to target supervisory control and data acquisition (SCADA) networks, sometimes combined with DDoS attacks. The cumulative impact of these activities poses a persistent and disruptive threat to essential services. According to a new report, groups such as Cyber Army of Russia Reborn (CARR), Z-Pentest, NoName057(16), and Sector16 are using simple reconnaissance tools and common password-guessing techniques to reach internet-facing human-machine interfaces. These groups have led to physical impacts in some cases, including temporary loss of view and costly manual recovery efforts. The NCSC warns of continued malicious activity from Russian-aligned hacktivist groups targeting critical infrastructure and local government organizations in the UK with disruptive denial-of-service (DDoS) attacks. The NCSC notes that NoName057(16) operates the DDoSia project, a platform that allows volunteers to contribute computing resources to carry out crowdsourced DDoS attacks and receive monetary rewards or recognition from the community. Operation Eastwood disrupted NoName057(16)'s activity in mid-July 2025 by arresting two members of the group, issuing eight arrest warrants, and taking down 100 servers. Despite these efforts, the group has returned to action, highlighting the evolving threat they pose.