Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

AI models are starting to decipher high-level math problems

Researchers null-root over 550 Kimwolf and Aisuru botnet command servers

Digg unveils new Reddit rival to the public

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Russia’s APT28 runs credential theft campaign targeting energy and policy organizations
Identity

Russia’s APT28 runs credential theft campaign targeting energy and policy organizations

userBy userJanuary 9, 2026No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

January 9, 2026Ravi LakshmananEmail Security/Threat Intelligence

Russian APT28

Russian state-sponsored threat actors have been implicated in a series of new credential harvesting attacks targeting individuals associated with Turkey’s Energy and Nuclear Research Institute, as well as staff affiliated with European think tanks and organizations in North Macedonia and Uzbekistan.

This activity is believed to be by APT28 (also known as BlueDelta) and is believed to be the result of an “ongoing” credential harvesting campaign targeting users of UKR.[.]last month’s net. APT28 coordinates with the main directorates of the General Staff of the Armed Forces of the Russian Federation (GRU).

Recorded Future’s Insict Group said, “The use of Turkish language and regionally targeted lure material suggests that Blue Delta has tailored its content to increase credibility among specific professional and geographic audiences.” “These selections reflect continued interest in organizations related to energy research, defense cooperation, and government communications networks related to Russian intelligence priorities.”

cyber security

The cybersecurity firm said the attacks targeted a small but distinct set of victims in February and September 2025, with campaigns utilizing fake login pages styled to resemble popular services such as Microsoft Outlook Web Access (OWA), Google, and the Sophos VPN portal.

This effort is notable for the fact that after credentials are entered on the fake landing page, unsuspecting users are redirected to the legitimate site, avoiding any red flags. Campaigns have also been found to rely heavily on services such as webhooks[.]site, InfinityFree, Byet Internet Services, and ngrok to host phishing pages, extract stolen data, and enable redirects.

In further attempts to appear legitimate, threat actors are said to have used legitimate PDF decoy documents, including a June 2025 Gulf Studies Center publication related to the Iran-Israel war and a July 2025 policy briefing for a new deal on the Mediterranean published by climate change think tank ECCO.

The attack chain begins with a phishing email containing a shortened link, which, when clicked, redirects the victim to another link hosted on a webhook.[.]site. The decoy document is briefly displayed for about 2 seconds before being redirected to the second webhook.[.]Sites that host spoofed Microsoft OWA login pages.

Within this page is a hidden HTML form element that stores the webhook.[.]Specify your site’s URL and use JavaScript to

It sends a “page opened” beacon, sends the submitted credentials to a webhook endpoint, and ultimately redirects to the PDF hosted on the actual website.

APT28 has also been observed running three other campaigns.

cyber security

Deployed a credential collection page that mimics a Sophos VPN password reset page hosted on infrastructure provided by InfinityFree, collects credentials entered in a form, and redirects victims to a legitimate Sophos VPN portal belonging to an anonymous EU think tank June 2025 campaign A credential collection page hosted on the InfinityFree domain was used to falsely warn users about expired passwords and trick them into logging in September 2025 Campaign Enters credentials and redirects to a legitimate login page associated with a military organization in the Republic of North Macedonia and an IT integrator based in Uzbekistan April 2025 Campaign uses a fake Google password reset page hosted on Byet Internet Services to collect victim credentials and exfiltrate them to an ngrok URL

“Blue Delta’s consistent abuse of legitimate Internet services infrastructure demonstrates the group’s continued reliance on disposable services to host and relay authentication data,” the Mastercard-owned company said. “These campaigns highlight the GRU’s continued commitment to credential collection as a low-cost, high-yield intelligence gathering method in support of Russian intelligence objectives.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleSmall bumps in 7-million-year-old fossil suggest ancient apes walked upright and may even be human ancestors
Next Article Unreleased footage captures the moment a new species of giant anaconda was discovered in the Amazon
user
  • Website

Related Posts

Researchers null-root over 550 Kimwolf and Aisuru botnet command servers

January 14, 2026

AI agents are becoming a privilege escalation path

January 14, 2026

Hackers exploit sideloading of c-ares DLLs to bypass security and deploy malware

January 14, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

AI models are starting to decipher high-level math problems

Researchers null-root over 550 Kimwolf and Aisuru botnet command servers

Digg unveils new Reddit rival to the public

Bandcamp takes action against AI music, bans it from platform

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.