Operation MacroMaze: APT28 exploits webhooks for covert data exfiltration
好的,我现在需要帮用户总结这篇文章的内容,控制在100字以内。首先,我得仔细阅读文章,抓住主要信息。 文章标题是“Operation MacroMaze: APT28 exploits webhooks for covert data exfiltration”,作者是Pierluigi Paganini,日期是2026年2月24日。内容讲的是俄罗斯相关的APT28组织(也称为Fancy Bear等)发起了名为Operation MacroMaze的活动,目标是西欧和中欧的一些机构,时间是从2025年9月到2026年1月。 攻击手段是使用基于webhook的宏恶意软件。攻击链开始于钓鱼邮件,附件中包含武器化的文档,里面有INCLUDEPICTURE字段指向webhook.site的URL。当文档被打开时,会无声地请求图片,作为跟踪像素,通知攻击者文档已被查看。 进一步分析显示,宏会下载恶意软件并部署额外负载。研究人员发现了四个宏变种作为droppers,它们会下载VBS、BAT、CMD等文件到用户目录,并使用GUID命名隐藏。宏启动VBScript触发多阶段执行,创建计划任务以维持持久性,并删除痕迹。变种还使用了UI操作来绕过安全提示。 数据外泄通过浏览器使用HTML表单POST到webhook端点完成,留下很少的磁盘痕迹。虽然具体命令文件未被恢复,但推测收集了系统信息如IP、目录列表等。 报告结论指出攻击者使用简单工具但安排巧妙以最大化隐蔽性,低技术但高技巧使得检测更难。 总结时要包括:APT28发起Operation MacroMaze活动;目标西欧和中欧;使用基于webhook的宏恶意软件;钓鱼邮件中的文档触发HTTP请求;静默收集数据;利用简单工具实现隐蔽性;APT28背景和活动历史。 现在要将这些信息浓缩到100字以内,并且不以“文章内容总结”开头。 </think> 俄罗斯关联的APT28组织发起"Operation MacroMaze"活动,针对西欧和中欧机构。利用基于webhook的宏恶意软件通过钓鱼邮件传播,文档打开时触发HTTP请求并静默收集数据。攻击者采用简单工具实现高隐蔽性。 2026-2-24 09:10:39 Author: securityaffairs.com(查看原文) 阅读量:16 收藏

Operation MacroMaze: APT28 exploits webhooks for covert data exfiltration

Pierluigi Paganini February 24, 2026

Russia-linked APT28 targeted European entities with a webhook-based macro malware campaign called Operation MacroMaze.

Russia-linked APT28 (aka UAC-0001, aka Fancy BearPawn StormSofacy GroupSednit, BlueDelta, and STRONTIUM) launched Operation MacroMaze, targeting select entities in Western and Central Europe from September 2025 to January 2026. The campaign used webhook-based macro malware, leveraging simple tools and legitimate services for infrastructure and data exfiltration.

The attack chain campaign begins with spear-phishing emails delivering weaponized documents that contain an “INCLUDEPICTURE” field pointing to a webhook[.]site URL hosting a JPG.

“All analyzed documents share a common structural element within their XML: an INCLUDEPICTURE field referencing a remote URL hosted on webhook[.]site.” reads the report published by S2 Grupo’s LAB52 threat intelligence team. “This field is embedded in the document’s XML (w:instrText) and instructs Microsoft Word to retrieve an external image resource when the field is evaluated. The referenced file (docopened.jpg) is fetched from the remote server when the document is opened and fields are updated. This behavior functions as a tracking mechanism: when the document is opened and Word processes the INCLUDEPICTURE field, an outbound HTTP request is generated to the remote server. The server operator can then log metadata associated with the request, effectively confirming that the document has been opened.”

When opened, the file silently retrieves the image, acting like a tracking pixel that alerts attackers the document was viewed. Variants seen between September 2025 and January 2026 use modified macros to drop malware and deploy additional payloads on compromised systems.

Researchers identified four closely related macro variants acting as droppers. Each drops six files (VBS, BAT, CMD, HTM, XHTML) into the %USERPROFILE% folder using GUID-like names tied to a webhook[.]site C2 path. The attackers used heavy string concatenation to hide key commands. The macro launches a VBScript that triggers multi-stage execution, creates a Scheduled Task for persistence, then deletes traces. Over time, the variants evolved from simple document cleanup to fake Word error messages and SendKeys-based UI manipulation to bypass security prompts. Two batch versions follow: one uses Edge in headless mode for stealth, the other hides the browser off-screen and forcefully kills processes for reliability, suppressing certificate errors.

“The final HTML file is constructed by concatenating a static HTM file, the captured output of the reconstructed CMD payload, and a closing XHTML template. The initial HTM file defines an auto-submitting form that sends a POST request to a webhook[.]site endpoint, while the payload output is embedded directly within a element. The closing XHTML fragment completes the document structure.” continues the report. “When the resulting HTML file is rendered by Microsoft Edge, the form is submitted, causing the collected command output to be exfiltrated to the remote webhook endpoint without user interaction.”

The Operation MacroMaze campaign uses a browser-based exfiltration method that relies on standard HTML features to send stolen data while leaving minimal traces on disk. Although the specific command file used to gather system data was not recovered, similar operations previously attributed to APT28 by CERT Polska and the Computer Emergency Response Team of Ukraine suggest this stage likely deploys a lightweight reconnaissance script, collecting basic host details such as IP address, directory listings, and system environment information before exfiltration.

“This campaign proves that simplicity can be powerful. The attacker uses very basic tools (batch files, tiny VBS launchers and simple HTML) but arranges them with care to maximise stealth.” concludes the report. “The tooling may be unsophisticated, but the operational tradeoffs are effective. It’s low-tech executed with high craft, which makes detection and attribution harder than the artifacts alone would suggest.”

The APT28 group has been active since at least 2007 and it has targeted governments, militaries, and security organizations worldwide. The group was involved also in the string of attacks that targeted 2016 Presidential election.

The group operates out of military unity 26165 of the Russian General Staff Main Intelligence Directorate (GRU) 85th Main Special Service Center (GTsSS).

In January 2026, Zscaler ThreatLabz uncovered the campaign Operation Neusploit targeting Central and Eastern Europe. Threat actors targeted the vulnerability CVE-2026-21509, they used weaponized RTF files and localized lures to deploy MiniDoor, PixyNetLoader, and Covenant Grunt implants.

Follow me on Twitter: @securityaffairs and Facebook and Mastodon

Pierluigi Paganini

(SecurityAffairs – hacking, APT28)




文章来源: https://securityaffairs.com/188421/apt/operation-macromaze-apt28-exploits-webhooks-for-covert-data-exfiltration.html
如有侵权请联系:admin#unsafe.sh