BT
Privacy ToolboxJournalProjectsResumeBookmarks
Feed
Privacy Toolbox
Journal
Projects
Resume
Bookmarks
Intel
Threat Actors
Privacy Threats
Dashboard
CVEs
Tags
Intel
Threat ActorsPrivacy ThreatsDashboardCVEsTags

Intel

  • Feed
  • Threat Actors
  • Privacy Threats
  • Dashboard
  • Privacy Toolbox
  • CVEs

Personal

  • Journal
  • Projects

Resources

  • Subscribe
  • Bookmarks
  • Developers
  • Tags
Cybersecurity News & Analysis
github
defconxt
•
© 2026
•
blacktemple.net
  1. Feed
  2. /Nation-State Activity Roundup: APT28 MacroMaze Campaign, MuddyWater Operations, and Mass Infrastructure Compromises

Nation-State Activity Roundup: APT28 MacroMaze Campaign, MuddyWater Operations, and Mass Infrastructure Compromises

March 1, 2026Nation-State & APT3 min readhigh

Originally reported by Security Affairs

#apt28#muddywater#freepbx#cve-2025-64328#web-shells#data-breach#nation-state
Share

TL;DR

Multiple nation-state groups remain active with APT28 deploying basic tooling in Operation MacroMaze and MuddyWater conducting Operation Olalampo. Separately, threat actors compromised 900 Sangoma FreePBX instances through CVE-2025-64328 exploitation, maintaining persistent web shell access.

Why high?

Active APT28 campaign combined with mass exploitation of 900 FreePBX instances via web shell deployment represents significant threat actor activity with widespread infrastructure impact.

Nation-State Activity Roundup

Multiple threat intelligence reports highlight ongoing nation-state operations targeting enterprise infrastructure, with Russian APT groups maintaining active campaigns while opportunistic attackers exploit telecommunications systems at scale.

Operation MacroMaze: APT28 Returns to Basic Tooling

Security Affairs reports that APT28 (Fancy Bear) has launched Operation MacroMaze, a new campaign notable for its use of basic tooling combined with legitimate infrastructure. The Russian military intelligence-linked group appears to be adapting tactics following increased scrutiny of their more sophisticated operations.

The campaign represents a tactical shift for APT28, which has historically deployed advanced persistent threat tools. By leveraging basic tooling alongside legitimate services, the group may be attempting to evade detection systems tuned for their known indicators of compromise.

MuddyWater's Operation Olalampo Campaign

Concurrently, Iranian-linked threat group MuddyWater continues active operations with their latest campaign designated Operation Olalampo. The group, attributed to Iran's Ministry of Intelligence and Security (MOIS), maintains its focus on strategic intelligence collection across multiple sectors.

MuddyWater's persistent activity underscores the group's role as a primary Iranian cyber espionage capability, with ongoing campaigns suggesting continued strategic intelligence requirements from Tehran.

Mass FreePBX Compromise via CVE-2025-64328

In a separate but significant development, approximately 900 Sangoma FreePBX instances remain compromised following exploitation of CVE-2025-64328, a command injection vulnerability. The attacks, which began in December 2025, resulted in widespread web shell deployment across affected systems.

Sangoma FreePBX serves as a web-based management platform for Asterisk-powered VoIP systems, making these compromises particularly concerning for business communications infrastructure. The persistent nature of the infections, with web shells remaining active months after initial compromise, indicates either inadequate incident response or continued reinfection.

The scale of the compromise, 900 affected instances, suggests either automated exploitation or coordinated campaign activity. Organizations running FreePBX deployments should immediately verify patch status and conduct forensic analysis for web shell presence.

Canadian Tire Breach: Retail Infrastructure Impact

Additionally, Canadian retail giant Canadian Tire disclosed a data breach affecting over 38 million accounts from an October 2025 incident. The breach exposed personal data including contact details and encrypted passwords, marking one of Canada's largest retail data compromises.

While not directly attributed to nation-state actors, the scale and timing of the breach warrant consideration within the broader threat landscape, particularly given nation-state interest in critical infrastructure data.

Sources

  • Security Affairs Malware Newsletter Round 86
  • CVE-2025-64328 exploitation impacts 900 Sangoma FreePBX instances
  • Canadian Tire 2025 data breach impacts 38 million users

Originally reported by Security Affairs

Tags

#apt28#muddywater#freepbx#cve-2025-64328#web-shells#data-breach#nation-state

Threat Actors

🇷🇺APT28
🇮🇷MuddyWater

Related Intelligence

  • APT Roundup: Zero-Day Exploitation, Iranian Cyber Escalation, and AI-Targeted Attacks

    highMar 3, 2026
  • AI Weaponization and Major Data Breaches Dominate Cybercrime Landscape

    highMar 2, 2026
  • Iran Conflict Escalation Raises Critical Infrastructure Cyber Threat Concerns

    highMar 2, 2026

Explore

  • Dashboard
  • Privacy Threats
  • Threat Actors
← Back to the feed

Previous Article

← Prayer App Compromised to Send Surrender Messages to Iranians During Airstrikes

Next Article

Korean Tax Agency Accidentally Exposes Seized Wallet Seed, Enables $4.8M Theft →