Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

APT28 uses webhook-based macro malware to target European companies

OpenAI brings in consultants to promote the company

Wormable XMRig campaign uses BYOVD exploit and time-based logic bombs

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » APT28 uses webhook-based macro malware to target European companies
Identity

APT28 uses webhook-based macro malware to target European companies

userBy userFebruary 23, 2026No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

Ravi LakshmananFebruary 23, 2026Malware/Threat Intelligence

A Russian-affiliated state-sponsored threat actor tracked as APT28 is believed to be involved in a new campaign targeting specific organizations in Western and Central Europe.

According to S2 Grupo’s LAB52 threat intelligence team, this activity was active from September 2025 to January 2026. The code name is “Operation MacroMaze”. “This campaign relies on basic tools and exploitation of legitimate services for infrastructure and data theft,” the cybersecurity firm said.

The attack chain uses a spear-phishing email as a starting point to distribute a decoy document that contains a common structural element within the XML (a field named “INCLUDEPICTURE” that points to a webhook).[.]URL of the site hosting the JPG image. This will fetch the image file from the remote server when the document is opened.

In other words, this mechanism acts as a beacon mechanism similar to a tracking pixel that triggers outbound HTTP requests to webhooks.[.]URL of the site when opening the document. The server operator can log metadata associated with the request and verify that the document was actually opened by the recipient.

According to LAB52, multiple documents have been identified between late September 2025 and January 2026 containing slightly tailored macros, all of which act as droppers to establish a foothold on compromised hosts and deliver additional payloads.

“Although the core logic of all detected macros is consistent, the scripts show an evolution in evasion techniques, from running a ‘headless’ browser in older versions to using keyboard simulation (SendKeys) in newer versions, which can potentially bypass security prompts,” the Spanish cybersecurity firm explained.

This macro is designed to execute Visual Basic Script (VBScript) to advance the infection to the next stage. The script runs a CMD file to establish persistence via a scheduled task, launches a batch script that renders a small Base64-encoded HTML payload in Microsoft Edge in headless mode to avoid detection, and retrieves commands from a webhook.[.]Run your site’s endpoint, capture and extract it to another webhook.[.]A site instance in HTML file format.

A second variant of the batch script was found to avoid headless execution in favor of moving the browser window off-screen, and then aggressively terminate all other Edge browser processes to ensure a controlled environment.

“When the resulting HTML file is rendered by Microsoft Edge, the form is submitted and the collected command output is spilled to a remote webhook endpoint without user interaction,” LAB52 said. “This browser-based exfiltration technology leverages standard HTML functionality to transmit data with minimal detectable artifacts on disk.”

“This campaign proves that simplicity is powerful. The attackers use very basic tools (batch files, small VBS launchers, and simple HTML) but place them carefully to maximize stealth. They move operations to hidden or off-screen browser sessions, clean up artifacts, and outsource both payload delivery and data exfiltration to widely used webhook services.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleOpenAI brings in consultants to promote the company
user
  • Website

Related Posts

Wormable XMRig campaign uses BYOVD exploit and time-based logic bombs

February 23, 2026

Double-Tap Skimmers, PromptSpy AI, 30Tbps DDoS, Docker Malware & More

February 23, 2026

How exposing endpoints increases risk across your LLM infrastructure

February 23, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

APT28 uses webhook-based macro malware to target European companies

OpenAI brings in consultants to promote the company

Wormable XMRig campaign uses BYOVD exploit and time-based logic bombs

Guide Labs Debuts New Kind of Interpretable LLM

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.