Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Resolve AI, a startup led by former Splunk executives, reaches $1 billion Series A valuation

Establish a venture-backable company in a highly regulated field

Cursor continues acquisition spree with deal with Graphite

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » APT28 targets UKR-net users in Ukraine in long-running credential phishing campaign
Identity

APT28 targets UKR-net users in Ukraine in long-running credential phishing campaign

userBy userDecember 17, 2025No Comments2 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

December 17, 2025Ravi LakshmananEmail Security/Threat Intelligence

A Russian state-sponsored threat actor known as APT28 is believed to be involved in what is described as an “ongoing” credential harvesting campaign targeting UKR users.[.]net is a popular webmail and news service in Ukraine.

This activity was observed by Recorded Future’s Insikt Group from June 2024 to April 2025, and builds on previous research the company conducted in May 2024 detailing the hacker group’s attacks targeting European networks with the HeadLace malware and credential harvesting web pages.

APT28 is also tracked as BlueDelta, Fancy Bear, Forest Blizzard, FROZENLAKE, Iron Twilight, ITG05, Pawn Storm, Sednit, Sofacy, and TA422. It is believed to be affiliated with Russia’s General Staff of the Russian Federation (GRU).

cyber security

The latest attack features the introduction of UKR[.]Net-themed login pages on legitimate services such as Mocky prompt recipients to enter their credentials and two-factor authentication (2FA) code. Links to these pages are embedded within PDF documents distributed through phishing emails.

Shorten your links using a service like tiny.[.]cc or tinyurl[.]Com. In some cases, attackers have also been observed using subdomains created on platforms such as Blogger (*.blogspot).[.]com) to launch a two-tier redirect chain leading to a credential collection page.

This effort is part of a broader phishing and credential theft operation orchestrated by adversaries since the mid-2000s, targeting government agencies, defense contractors, arms suppliers, logistics companies, and policy think tanks in pursuit of Russia’s strategic goals.

“Although this campaign does not disclose specific targets, Blue Delta’s past focus on stealing credentials that enable information collection provides strong indicators that it likely intends to collect sensitive information from users in Ukraine in support of broader GRU intelligence requirements,” the Mastercard-owned company said in a report shared with Hacker News.

What has changed is the move from using compromised routers to proxy tunneling services like ngrok and Serveo to capture and relay stolen credentials and 2FA codes.

“Blue Delta’s continued exploitation of free hosting and anonymized tunneling infrastructure likely reflects an adaptive response to Western-led infrastructure destruction in early 2024,” Recorded Future said. “This campaign highlights the GRU’s persistent interest in compromising Ukrainian user credentials to support Russia’s intelligence-gathering operations amid Russia’s ongoing war in the country.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleGoogle’s vibe coding tool Opal comes to Gemini
Next Article Coursera and Udemy sign merger agreement worth approximately $2.5 billion
user
  • Website

Related Posts

Russian-linked hackers use Microsoft 365 device code phishing to take over accounts

December 19, 2025

Cracked software and YouTube videos spread CountLoader and GachiLoader malware

December 19, 2025

WatchGuard warns of active exploitation of critical Fireware OS VPN vulnerability

December 19, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Resolve AI, a startup led by former Splunk executives, reaches $1 billion Series A valuation

Establish a venture-backable company in a highly regulated field

Cursor continues acquisition spree with deal with Graphite

Elon Musk’s $56 billion Tesla pay package reinstated by Delaware Supreme Court

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.