Russian APT28 Runs Credential-Stealing Campaign Targeting Energy and Policy Organizations
嗯,用户让我总结一篇文章的内容,控制在100字以内,而且不需要特定的开头。首先,我需要通读整篇文章,抓住主要信息。 文章讲的是俄罗斯支持的威胁行为者APT28,他们最近针对土耳其能源机构、欧洲智库以及北马其顿和乌兹别克斯坦的组织进行了钓鱼攻击。攻击手段包括伪造登录页面,利用地区性诱饵材料提高可信度,并使用合法的服务来托管钓鱼页面和窃取数据。 接下来,我需要将这些信息浓缩到100字以内。要确保涵盖攻击者、目标、手段和影响。同时,语言要简洁明了,避免复杂的句子结构。 可能的结构是:APT28进行钓鱼攻击,目标包括土耳其能源机构等,使用伪造页面和合法服务窃取凭证。这样既涵盖了关键点,又符合字数限制。 最后,检查一下是否符合用户的要求,没有使用“文章内容总结”之类的开头,并且保持了简洁。 </think> 俄罗斯支持的威胁组织APT28针对土耳其能源机构、欧洲智库及北马其顿和乌兹别克斯坦组织发起钓鱼攻击,利用伪造登录页面和区域化诱饵窃取凭证。攻击利用合法服务托管钓鱼页面并重定向至真实网站以规避检测。 2026-1-9 15:28:0 Author: thehackernews.com(查看原文) 阅读量:0 收藏

Email Security / Threat Intelligence

Russian APT28

Russian state-sponsored threat actors have been linked to a fresh set of credential harvesting attacks targeting individuals associated with a Turkish energy and nuclear research agency, as well as staff affiliated with a European think tank and organizations in North Macedonia and Uzbekistan.

The activity has been attributed to APT28 (aka BlueDelta), which was attributed to a "sustained" credential-harvesting campaign targeting users of UKR[.]net last month. APT28 is associated with the Main Directorate of the General Staff of the Armed Forces of the Russian Federation (GRU).

"The use of Turkish-language and regionally targeted lure material suggests that BlueDelta tailored its content to increase credibility among specific professional and geographic audiences," Recorded Future's Insikt Group said. "These selections reflect a continued interest in organizations connected to energy research, defense cooperation, and government communication networks relevant to Russian intelligence priorities."

Cybersecurity

The cybersecurity company described the attacks as targeting a small but distinct set of victims in February and September 2025, with the campaign leveraging fake login pages that were styled to resemble popular services like Microsoft Outlook Web Access (OWA), Google, and Sophos VPN portals.

The efforts are noteworthy for the fact that unsuspecting users are redirected to the legitimate sites after the credentials are entered on the bogus landing pages, thereby avoiding raising any red flags. The campaigns have also been found to lean heavily on services like Webhook[.]site, InfinityFree, Byet Internet Services, and ngrok to host the phishing pages, exfiltrate stolen data, and enable redirections.

In a further attempt to lend them a veneer of legitimacy, the threat actors are said to have used legitimate PDF lure documents, including a publication from the Gulf Research Center related to the June 2025 Iran-Israel war and a July 2025 policy briefing calling for a new pact for the Mediterranean released by climate change think tank ECCO.

The attack chain starts with a phishing email containing a shortened link that, when clicked, redirects victims to another link hosted on webhook[.]site, which briefly displays the decoy document for about two seconds before redirecting to a second webhook[.]site that hosts a spoofed Microsoft OWA login page.

Present within this page is a hidden HTML form element that stores the webhook[.]site URL and uses JavaScript to send a

"page opened" beacon, transmit the submitted credentials to the webhook endpoint, and ultimately redirect back to the PDF hosted on the actual website.

APT28 has also been observed conducting three other campaigns -

Cybersecurity
  • A June 2025 campaign that deployed a credential-harvesting page mimicking a Sophos VPN password reset page hosted on infrastructure provided by InfinityFree to harvest credentials entered into the form and redirect victims to a legitimate Sophos VPN portal belonging to an unnamed E.U. think tank
  • A September 2025 campaign that used credential-harvesting pages hosted on InfinityFree domains to falsely warn users of expired passwords to trick them into entering their credentials and redirect to a legitimate login page associated with a military organization in the Republic of North Macedonia and an IT integrator based in Uzbekistan
  • An April 2025 campaign that used a fake Google password reset page hosted on Byet Internet Services to gather victims' credentials and exfiltrate them to an ngrok URL

"BlueDelta's consistent abuse of legitimate internet service infrastructure demonstrates the group's continued reliance on disposable services to host and relay credential data," the Mastercard-owned company said. "These campaigns underscore the GRU's sustained commitment to credential harvesting as a low-cost, high-yield method of collecting information that supports Russian intelligence objectives."

Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


文章来源: https://thehackernews.com/2026/01/russian-apt28-runs-credential-stealing.html
如有侵权请联系:admin#unsafe.sh