BT
Privacy ToolboxJournalProjectsResumeBookmarks
Feed
Privacy Toolbox
Journal
Projects
Resume
Bookmarks
Intel
Threat Actors
Privacy Threats
Dashboard
CVEs
Tags
Intel
Threat ActorsPrivacy ThreatsDashboardCVEsTags

Intel

  • Feed
  • Threat Actors
  • Privacy Threats
  • Dashboard
  • Privacy Toolbox
  • CVEs

Personal

  • Journal
  • Projects

Resources

  • Subscribe
  • Bookmarks
  • Developers
  • Tags
Cybersecurity News & Analysis
github
defconxt
β€’
Β© 2026
β€’
blacktemple.net
  1. Feed
  2. /APT28 Targets Ukrainian Forces While Nation-State Threats Persist Globally

APT28 Targets Ukrainian Forces While Nation-State Threats Persist Globally

March 11, 2026Nation-State & APT3 min readhigh

Originally reported by Security Affairs, The Record

#apt28#ukraine#russia#china#finland#salesforce#nsa#cybercommand#espionage
Share

TL;DR

Russian APT28 has been conducting extensive surveillance of Ukrainian military personnel since April 2024 using custom malware. Meanwhile, Finnish intelligence reports persistent cyber espionage from Russia and China targeting government and technology sectors.

Why high?

Active APT28 espionage campaign against Ukrainian military represents ongoing nation-state threat with significant geopolitical implications during wartime operations.

Nation-State Activity Intensifies Across Multiple Fronts

Nation-state actors continue aggressive cyber operations across multiple theaters, with Russian APT28 maintaining sustained surveillance operations against Ukrainian forces while broader espionage campaigns target Western infrastructure and technology sectors.

APT28 Maintains Long-Term Ukrainian Military Surveillance

ESET researchers have documented an ongoing APT28 campaign targeting Ukrainian military personnel that began in April 2024. The Russian intelligence-linked group, also tracked as UAC-0001, Fancy Bear, and STRONTIUM, deployed custom BEARDSHELL and COVENANT malware for persistent surveillance operations.

The campaign demonstrates APT28's continued focus on intelligence collection against Ukrainian defense capabilities during the ongoing conflict. The use of custom tooling indicates sustained resource allocation for these operations, suggesting the intelligence value of Ukrainian military communications remains a high priority for Russian cyber units.

Salesforce Systems Under Mass Reconnaissance

Salesforce's Customer Security Operations Center has observed threat actors conducting mass scans of publicly accessible Experience Cloud sites using a modified version of AuraInspector. The tool, originally developed by Google/Mandiant for security auditing, has been weaponized to identify misconfigurations that could expose sensitive customer data.

The campaign represents a shift toward targeting cloud-based business platforms where organizations store critical customer and operational data. The systematic nature of the scanning suggests either nation-state actors or sophisticated criminal groups seeking high-value intelligence across multiple organizations simultaneously.

NSA and Cyber Command Leadership Confirmed

The Senate confirmed General Rudd as the dual-hat leader of NSA and U.S. Cyber Command by a 71-29 vote, ending a nearly year-long vacancy in these critical positions. Rudd assumes leadership as foreign adversaries intensify cyber operations against U.S. infrastructure while the administration pursues federal workforce reductions.

The confirmation provides continuity for defensive and offensive cyber operations at a time when both agencies face increasing operational tempo against state-sponsored threats. The dual-hat structure maintains unified command over signals intelligence and military cyber operations.

Finnish Intelligence Documents Persistent State-Sponsored Espionage

Finland's intelligence services report that cyber espionage remains the country's most significant digital security threat, with Russian and Chinese actors persistently targeting government systems, research institutions, and advanced technology companies.

The intelligence assessment reflects Finland's strategic position following NATO accession and its advanced technology sector's attractiveness to foreign intelligence services. The persistent nature of these operations suggests long-term strategic intelligence collection rather than opportunistic attacks.

CISA Accelerates Federal Patching Requirements

CISA has shortened federal agencies' deadline to patch CVE-2025-26399, a critical vulnerability in SolarWinds Web Help Desk, requiring remediation by Thursday. The accelerated timeline suggests either confirmed exploitation or imminent threat intelligence indicating active targeting.

The expedited patching requirement for SolarWinds products reflects continued sensitivity around the vendor following the 2020 supply chain compromise. Federal agencies must balance rapid remediation with operational continuity for help desk systems.

Sources

  • https://securityaffairs.com/189230/apt/apt28-conducts-long-term-espionage-on-ukrainian-forces-using-custom-malware.html
  • https://securityaffairs.com/189214/security/threat-actors-use-custom-aurainspector-to-harvest-data-from-salesforce-systems.html
  • https://therecord.media/rudd-confirmed-nsa-cyber-command-chief
  • https://therecord.media/finnish-intel-warns-espionage-china-russia
  • https://therecord.media/cisa-shortens-patch-deadline-ivanti-solarwinds

Originally reported by Security Affairs, The Record

Tags

#apt28#ukraine#russia#china#finland#salesforce#nsa#cybercommand#espionage

Threat Actors

πŸ‡·πŸ‡ΊAPT28

Tracked Companies

πŸ‡ΊπŸ‡ΈGoogle

Related Intelligence

  • Nation-State Roundup: Russian AI-Powered Campaigns and Hybrid Warfare Operations

    highFeb 23, 2026
  • Tycoon 2FA Platform Disrupted, Russian Messaging App Attacks, AI Security Bypasses

    highMar 10, 2026
  • Russian APT Deploys New Ukraine-Targeting Malware as Law Enforcement Disrupts Global Cybercrime Operations

    mediumMar 5, 2026

Explore

  • Dashboard
  • Privacy Threats
  • Threat Actors
← Back to the feed

Previous Article

← Data Breach Roundup: ShinyHunters Targets 400 Firms, MyFitnessPal Compromised, Lazarus Group Deploys Deepfakes

Next Article

Whistleblower Alleges Former DOGE Member Took Social Security Data to New Position β†’