• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
apt28 hacker group targeting europe, americas, asia in widespread phishing

APT28 Hacker Group Targeting Europe, Americas, Asia in Widespread Phishing Scheme

You are here: Home / General Cyber Security News / APT28 Hacker Group Targeting Europe, Americas, Asia in Widespread Phishing Scheme
March 18, 2024

The Russia-linked risk actor recognised as APT28 has been connected to numerous ongoing phishing campaigns that hire entice paperwork imitating authorities and non-governmental companies (NGOs) in Europe, the South Caucasus, Central Asia, and North and South The united states.

“The uncovered lures include things like a combination of inner and publicly obtainable files, as effectively as possible actor-generated files related with finance, critical infrastructure, government engagements, cyber security, maritime security, healthcare, enterprise, and protection industrial manufacturing,” IBM X-Power said in a report released final week.

The tech firm is monitoring the exercise less than the moniker ITG05, which is also known as Blue Athena, BlueDelta, Fancy Bear, Combating Ursa, Forest Blizzard (previously Strontium), FROZENLAKE, Iron Twilight, Pawn Storm, Sednit, Sofacy, TA422, and UAC-028.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


Cybersecurity

The disclosure will come additional than 3 months right after the adversary was spotted applying decoys relevant to the ongoing Israel-Hamas war to produce a personalized backdoor dubbed HeadLace.

APT28 has considering that also targeted Ukrainian govt entities and Polish businesses with phishing messages designed to deploy bespoke implants and details stealers like MASEPIE, OCEANMAP, and STEELHOOK.

Other campaigns have entailed the exploitation of security flaws in Microsoft Outlook (CVE-2023-23397, CVSS score: 9.8) to plunder NT LAN Supervisor (NTLM) v2 hashes, increasing the possibility that the menace actor may perhaps leverage other weaknesses to exfiltrate NTLMv2 hashes for use in relay attacks.

Widespread Phishing Scheme

The latest strategies observed by IBM X-Drive concerning late November 2023 and February 2024 leverage the “lookup-ms:” URI protocol handler in Microsoft Windows to trick victims into downloading malware hosted on actor-controlled WebDAV servers.

There is proof to recommend that both of those the WebDAV servers, as nicely as the MASEPIE C2 servers, may perhaps be hosted on compromised Ubiquiti routers, a botnet comprising which was taken down by the U.S. federal government last month.

Cybersecurity

The phishing attacks impersonate entities from a number of nations around the world these kinds of as Argentina, Ukraine, Georgia, Belarus, Kazakhstan, Poland, Armenia, Azerbaijan, and the U.S., placing to use a mix of authentic publicly out there federal government and non-governing administration lure documents to activate the infection chains.

“In an update to their methodologies, ITG05 is making use of the freely out there hosting company, firstcloudit[.]com to stage payloads to enable ongoing functions,” security researchers Joe Fasulo, Claire Zaboeva, and Golo Mühr said.

The climax of APT28’s elaborate plan finishes with the execution of MASEPIE, OCEANMAP, and STEELHOOK, which are made to exfiltrate documents, operate arbitrary instructions, and steal browser data. OCEANMAP has been characterised as a more able model of CredoMap, yet another backdoor earlier determined as made use of by the group.

“ITG05 remains adaptable to adjustments in prospect by delivering new an infection methodologies and leveraging commercially out there infrastructure, though persistently evolving malware abilities,” the scientists concluded.

Uncovered this short article attention-grabbing? Comply with us on Twitter  and LinkedIn to examine extra special written content we publish.


Some components of this write-up are sourced from:
thehackernews.com

Previous Post: «hackers using cracked software on github to spread risepro info Hackers Using Cracked Software on GitHub to Spread RisePro Info Stealer
Next Post: WordPress Admins Urged to Remove miniOrange Plugins Due to Critical Flaw wordpress admins urged to remove miniorange plugins due to critical»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Fortinet Releases Patch for Critical SQL Injection Flaw in FortiWeb (CVE-2025-25257)
  • PerfektBlue Bluetooth Vulnerabilities Expose Millions of Vehicles to Remote Code Execution
  • Securing Data in the AI Era
  • Critical Wing FTP Server Vulnerability (CVE-2025-47812) Actively Being Exploited in the Wild
  • Iranian-Backed Pay2Key Ransomware Resurfaces with 80% Profit Share for Cybercriminals
  • CISA Adds Citrix NetScaler CVE-2025-5777 to KEV Catalog as Active Exploits Target Enterprises
  • Critical mcp-remote Vulnerability Enables Remote Code Execution, Impacting 437,000+ Downloads
  • Fake Gaming and AI Firms Push Malware on Cryptocurrency Users via Telegram and Discord
  • Four Arrested in £440M Cyber Attack on Marks & Spencer, Co-op, and Harrods
  • What Security Leaders Need to Know About AI Governance for SaaS

Copyright © TheCyberSecurity.News, All Rights Reserved.