BT
Privacy ToolboxJournalProjectsResumeBookmarks
Feed
Privacy Toolbox
Journal
Projects
Resume
Bookmarks
Intel
Threat Actors
Privacy Threats
Dashboard
CVEs
Tags
Intel
Threat ActorsPrivacy ThreatsDashboardCVEsTags

Intel

  • Feed
  • Threat Actors
  • Privacy Threats
  • Dashboard
  • Privacy Toolbox
  • CVEs

Personal

  • Journal
  • Projects

Resources

  • Subscribe
  • Bookmarks
  • Developers
  • Tags
Cybersecurity News & Analysis
github
defconxt
•
© 2026
•
blacktemple.net
  1. Feed
  2. /APT28 Macro Campaign, AI Model Theft, and Central Asian Telecom Attacks

APT28 Macro Campaign, AI Model Theft, and Central Asian Telecom Attacks

February 24, 2026Vulnerabilities & Exploits2 min readhigh

Originally reported by The Hacker News, SANS ISC

#apt28#russia#backdoor#ai-theft#telecom-attacks#macros#state-sponsored#central-asia
Share

TL;DR

APT28 launched Operation MacroMaze against European targets using webhook-based macro malware, while UnsolicitedBooker deployed dual backdoors against Central Asian telecoms. Meanwhile, Anthropic exposed Chinese AI companies conducting industrial-scale model theft through 16 million fraudulent queries.

Why high?

Russian state-sponsored APT28 conducting active campaigns against European entities combined with sophisticated backdoor deployments in critical telecom infrastructure represents significant threat activity requiring immediate attention.

Multiple threat campaigns emerged this week spanning state-sponsored attacks, critical infrastructure targeting, and AI model theft operations.

APT28 Deploys Webhook-Based Macro Malware Against Europe

The Russia-linked APT28 group conducted a sustained campaign codenamed Operation MacroMaze targeting Western and Central European entities between September 2025 and January 2026. S2 Grupo's LAB52 threat intelligence team attributed the attacks to the state-sponsored actor.

The campaign leverages basic tooling combined with exploitation of legitimate services, demonstrating APT28's continued adaptation of low-complexity techniques to evade detection. The webhook-based macro delivery mechanism represents an evolution in the group's tactical approach to initial access operations.

UnsolicitedBooker Shifts Focus to Central Asian Telecoms

The threat cluster known as UnsolicitedBooker expanded operations to target telecommunications companies in Kyrgyzstan and Tajikistan, marking a geographic shift from previous campaigns against Saudi Arabian entities. Positive Technologies researchers documented the deployment of two distinct backdoors: LuciDoor and MarsSnake.

The targeting of telecom infrastructure in Central Asia suggests potential intelligence collection objectives, with critical communications networks serving as high-value targets for state-aligned threat actors. The dual-backdoor approach provides redundant access mechanisms and increased operational persistence.

Chinese AI Firms Conduct Industrial-Scale Model Theft

Anthropic disclosed that three Chinese artificial intelligence companies, DeepSeek, Moonshot AI, and MiniMax, conducted "industrial-scale campaigns" to illegally extract Claude's capabilities through distillation attacks. The operations generated over 16 million exchanges with Anthropic's large language model through approximately 24,000 fraudulent accounts.

The model theft campaigns violate Anthropic's terms of service and represent a sophisticated form of intellectual property theft targeting AI capabilities. The scale of the operation, 16 million queries across thousands of accounts, demonstrates coordinated effort to systematically extract model behavior patterns.

Identity Risk Prioritization Framework

Security practitioners continue to struggle with identity program prioritization, often applying traditional IT ticket management approaches to complex identity risk scenarios. The traditional volume-based or compliance-driven prioritization breaks down in modern environments containing diverse identity types beyond human users.

Effective identity risk management requires consideration of control posture, hygiene metrics, business context, and threat intent as compound factors rather than isolated variables.

SANS Stormcast Update

The SANS Internet Storm Center released its regular Stormcast update for February 24th, providing ongoing threat intelligence and security community updates.

Sources

  • https://thehackernews.com/2026/02/apt28-targeted-european-entities-using.html
  • https://thehackernews.com/2026/02/unsolicitedbooker-targets-central-asian.html
  • https://thehackernews.com/2026/02/anthropic-says-chinese-ai-firms-used-16.html
  • https://thehackernews.com/2026/02/identity-prioritization-isnt-backlog.html
  • https://isc.sans.edu/diary/rss/32740

Originally reported by The Hacker News, SANS ISC

Tags

#apt28#russia#backdoor#ai-theft#telecom-attacks#macros#state-sponsored#central-asia

Threat Actors

🇷🇺APT28

Related Intelligence

  • State Actors Unleash New Malware Arsenal as Phishing-as-a-Service Operations Scale Globally

    highMar 5, 2026
  • New Campaign Targets Healthcare & Education While Blockchain C2 Evolves Evasion

    highFeb 27, 2026
  • APT28 Targets Ukrainian Forces While Nation-State Threats Persist Globally

    highMar 11, 2026

Explore

  • Dashboard
  • Privacy Threats
  • Threat Actors
← Back to the feed

Previous Article

← Data Breach Intelligence: New Mobile Surveillance Malware, Victim Notification Gaps, and 2026 Threat Evolution

Next Article

APT Threat Roundup: AI-Assisted Malware, Healthcare Ransomware, and Cryptojacking Campaigns →