Article Details

Scrape Timestamp (UTC): 2026-01-09 15:29:21.604

Source: https://thehackernews.com/2026/01/russian-apt28-runs-credential-stealing.html

Original Article Text

Click to Toggle View

Russian APT28 Runs Credential-Stealing Campaign Targeting Energy and Policy Organizations. Russian state-sponsored threat actors have been linked to a fresh set of credential harvesting attacks targeting individuals associated with a Turkish energy and nuclear research agency, as well as staff affiliated with a European think tank and organizations in North Macedonia and Uzbekistan. The activity has been attributed to APT28 (aka BlueDelta), which was attributed to a "sustained" credential-harvesting campaign targeting users of UKR[.]net last month. APT28 is associated with the Main Directorate of the General Staff of the Armed Forces of the Russian Federation (GRU). "The use of Turkish-language and regionally targeted lure material suggests that BlueDelta tailored its content to increase credibility among specific professional and geographic audiences," Recorded Future's Insikt Group said. "These selections reflect a continued interest in organizations connected to energy research, defense cooperation, and government communication networks relevant to Russian intelligence priorities." The cybersecurity company described the attacks as targeting a small but distinct set of victims in February and September 2025, with the campaign leveraging fake login pages that were styled to resemble popular services like Microsoft Outlook Web Access (OWA), Google, and Sophos VPN portals. The efforts are noteworthy for the fact that unsuspecting users are redirected to the legitimate sites after the credentials are entered on the bogus landing pages, thereby avoiding raising any red flags. The campaigns have also been found to lean heavily on services like Webhook[.]site, InfinityFree, Byet Internet Services, and ngrok to host the phishing pages, exfiltrate stolen data, and enable redirections. In a further attempt to lend them a veneer of legitimacy, the threat actors are said to have used legitimate PDF lure documents, including a publication from the Gulf Research Center related to the June 2025 Iran-Israel war and a July 2025 policy briefing calling for a new pact for the Mediterranean released by climate change think tank ECCO. The attack chain starts with a phishing email containing a shortened link that, when clicked, redirects victims to another link hosted on webhook[.]site, which briefly displays the decoy document for about two seconds before redirecting to a second webhook[.]site that hosts a spoofed Microsoft OWA login page. Present within this page is a hidden HTML form element that stores the webhook[.]site URL and uses JavaScript to send a "page opened" beacon, transmit the submitted credentials to the webhook endpoint, and ultimately redirect back to the PDF hosted on the actual website. APT28 has also been observed conducting three other campaigns - "BlueDelta's consistent abuse of legitimate internet service infrastructure demonstrates the group's continued reliance on disposable services to host and relay credential data," the Mastercard-owned company said. "These campaigns underscore the GRU's sustained commitment to credential harvesting as a low-cost, high-yield method of collecting information that supports Russian intelligence objectives."

Daily Brief Summary

NATION STATE ACTIVITY // Russian APT28 Targets Energy and Policy Sectors in Credential Theft Campaign

Russian state-sponsored group APT28, also known as BlueDelta, has launched credential-stealing attacks on Turkish energy and nuclear research agencies, European think tanks, and organizations in North Macedonia and Uzbekistan.

The campaign targets professionals in energy research, defense cooperation, and government communication, aligning with Russian intelligence goals.

APT28's tactics include fake login pages mimicking Microsoft Outlook, Google, and Sophos VPN, redirecting victims to legitimate sites post-credential capture to avoid detection.

Phishing emails with shortened links lead victims to spoofed login pages via services like Webhook[.]site, InfinityFree, and ngrok, which facilitate data exfiltration and redirection.

The group uses legitimate-looking PDF documents as lures, including publications related to geopolitical events, enhancing credibility among targeted audiences.

This activity reflects APT28's ongoing strategy of leveraging low-cost, high-yield credential harvesting techniques to support Russian intelligence operations.

Organizations in targeted sectors should enhance email filtering, user training, and multi-factor authentication to mitigate such threats.