BT
Privacy ToolboxJournalProjectsResumeBookmarks
Feed
Privacy Toolbox
Journal
Projects
Resume
Bookmarks
Intel
Threat Actors
Privacy Threats
Dashboard
CVEs
Tags
Intel
Threat ActorsPrivacy ThreatsDashboardCVEsTags

Intel

  • Feed
  • Threat Actors
  • Privacy Threats
  • Dashboard
  • Privacy Toolbox
  • CVEs

Personal

  • Journal
  • Projects

Resources

  • Subscribe
  • Bookmarks
  • Developers
  • Tags
Cybersecurity News & Analysis
github
defconxt
โ€ข
ยฉ 2026
โ€ข
blacktemple.net
Threat Actors/APT28
๐Ÿ‡ท๐Ÿ‡บ

APT28

Also known as: Fancy Bear ยท Sofacy ยท Sednit ยท Pawn Storm ยท Forest Blizzard ยท Strontium ยท Tsar Team ยท Threat Group-4127

nation-state
Nation
๐Ÿ‡ท๐Ÿ‡บ Russia
Active Since
2004
Targets
GovernmentMilitaryDefenseMediaPolitical OrganizationsEnergyTransportationSports Organizations
Known Tools
X-AgentX-TunnelSofacySeduploaderDowndelphZebrocyKoadicResponderMimikatzCertutilGooseEgg
MITRE ATT&CK
T1566.001T1566.002T1059.001T1203T1027T1078T1110T1556T1071.001T1573T1041T1583.001T1584.001T1190T1210
References
MITRE ATT&CKCISA Advisory AA23-108AMicrosoft Threat IntelligenceCrowdStrike Threat Profile

Background

APT28, widely known as Fancy Bear, is a cyber espionage group attributed to the Russian General Staff Main Intelligence Directorate (GRU), specifically Military Unit 26165 of the 85th Main Special Service Center (GTsSS). The group has been active since at least 2004 and is one of the most prolific and technically capable nation-state threat actors in the world. The U.S. Department of Justice has issued multiple indictments against GRU officers linked to APT28 operations.

The group operates with clear strategic objectives aligned with Russian state interests, targeting governments, military organizations, defense contractors, media outlets, and political entities across NATO member states and countries of geopolitical interest to Russia. APT28 is organizationally distinct from Sandworm (GRU Unit 74455), though both fall under GRU command and have been observed coordinating operations.

APT28 is notable for its ability to rapidly weaponize zero-day vulnerabilities, conduct large-scale credential harvesting campaigns, and maintain persistent access to high-value targets over extended periods. The group combines sophisticated custom malware with commodity tools and living-off-the-land techniques, adapting its tradecraft in response to public exposure and defensive improvements.

Notable Campaigns

Democratic National Committee Breach (2015-2016) โ€” APT28 gained access to DNC networks through spearphishing campaigns targeting political staffers. The operation, alongside parallel APT29 activity, resulted in the exfiltration and subsequent public release of thousands of emails and documents. This campaign led to the indictment of 12 GRU officers by Special Counsel Robert Mueller in July 2018.

German Bundestag Attack (2015) โ€” APT28 compromised the German parliament's network, exfiltrating approximately 16 gigabytes of data before detection. The intrusion required a complete rebuild of the Bundestag's IT infrastructure. German authorities later issued an arrest warrant for GRU officer Dmitriy Badin in connection with the attack.

World Anti-Doping Agency (WADA) Breach (2016) โ€” Following Russia's Olympic doping scandal, APT28 breached WADA systems and leaked athletes' confidential medical records through the "Fancy Bears' Hack Team" persona. The operation targeted the Therapeutic Use Exemption (TUE) database, releasing records of athletes from countries that supported Russia's Olympic ban.

Exploitation of Microsoft Outlook Vulnerability CVE-2023-23397 (2023-2024) โ€” APT28 conducted widespread exploitation of a critical NTLM relay vulnerability in Microsoft Outlook, targeting government, energy, transportation, and military organizations across Europe. The zero-click exploit allowed credential theft without user interaction via specially crafted calendar invitations.

GooseEgg Privilege Escalation Campaign (2024) โ€” Microsoft disclosed APT28's use of a custom post-exploitation tool called GooseEgg that exploited CVE-2022-38028 in the Windows Print Spooler service. The tool was used to elevate privileges and steal credentials across government, education, and transportation sector targets since at least June 2020.

Tactics, Techniques & Procedures

Initial Access โ€” APT28 primarily relies on spearphishing emails with malicious attachments (T1566.001) or credential-harvesting links (T1566.002). The group operates extensive infrastructure mimicking legitimate login portals for services like Outlook Web Access, Google, and Yahoo. They have also exploited internet-facing vulnerabilities in VPN appliances, mail servers, and web applications (T1190), including Cisco, Microsoft Exchange, and Zimbra products.

Execution & Persistence โ€” After initial access, APT28 deploys custom loaders and backdoors including Seduploader for reconnaissance and X-Agent for full-featured remote access. They use PowerShell (T1059.001) and scheduled tasks for execution and persistence. The group frequently abuses legitimate credentials (T1078) harvested through NTLM relay attacks or credential dumping with tools like Mimikatz.

Defense Evasion โ€” APT28 employs obfuscation (T1027), timestomping, and living-off-the-land binaries to blend with legitimate activity. They abuse trusted cloud services including Microsoft OneDrive and Google Drive for command and control, making detection through network monitoring more challenging.

Command & Control and Exfiltration โ€” Communications typically use HTTPS (T1071.001) with encrypted channels (T1573) to blend with normal web traffic. The group uses compromised legitimate websites and rented infrastructure for C2. Data exfiltration (T1041) occurs over the same encrypted C2 channels, often staged in compressed archives before transfer.

Tools & Malware

  • X-Agent (Sofacy) โ€” Cross-platform modular backdoor (Windows, Linux, iOS, Android) providing keylogging, file collection, screenshot capture, and remote command execution. The group's primary implant for years.
  • X-Tunnel โ€” Network tunneling tool used to relay traffic through compromised hosts, enabling lateral movement and data exfiltration from air-gapped network segments.
  • Seduploader โ€” First-stage reconnaissance downloader used for target profiling before deploying more capable implants.
  • Zebrocy โ€” Multi-language downloader/backdoor written in Delphi, AutoIt, C++, Go, and C#. Used as a first-stage implant primarily targeting Central Asian and Eastern European governments.
  • GooseEgg โ€” Custom post-exploitation tool exploiting Windows Print Spooler vulnerabilities for privilege escalation and credential access.
  • Downdelph โ€” Delphi-based bootkit-enabled backdoor for long-term persistent access to high-value targets.
  • Responder / Mimikatz โ€” Open-source tools used for NTLM hash capture, credential dumping, and lateral movement.

Indicators & Detection

Email-Based Detection โ€” Monitor for spearphishing emails containing links to credential-harvesting domains that mimic legitimate services. APT28 frequently registers typosquatting domains resembling webmail portals. Implement DMARC, DKIM, and SPF to reduce spoofed email delivery.

Network Indicators โ€” Look for NTLM authentication attempts to external IP addresses, particularly those exploiting CVE-2023-23397. Monitor for anomalous SMB traffic to internet-facing hosts. Inspect TLS connections to recently registered domains or known bulletproof hosting providers.

Endpoint Detection โ€” Monitor for suspicious Print Spooler activity associated with GooseEgg exploitation. Detect unauthorized use of credential-dumping tools (Mimikatz, Rubeus). Alert on PowerShell execution with encoded commands, scheduled task creation by non-administrative processes, and modification of Outlook registry keys.

Authentication Monitoring โ€” Implement multi-factor authentication universally, as APT28 extensively targets single-factor authentication. Monitor for impossible travel in authentication logs, password spray patterns, and OAuth token abuse. Audit delegated permissions in cloud environments.

Related Intelligence (12)

high

APT28 Targets Ukrainian Forces While Nation-State Threats Persist Globally

Mar 11, 2026

high

March Security Roundup: Microsoft Patches Zero-Days, Cloud Configs Under Fire, and Geopolitical Threats Escalate

Mar 11, 2026

critical

CISA KEV Updates, APT28 Campaign, and Agentic AI Security Challenges

Mar 10, 2026

critical

Malware Threats Weekly: CISA Flags Ivanti EPM Zero-Day, APT28 Leverages Covenant Framework, Meta Ad Network Powers Global Scam Operations

Mar 10, 2026

critical

Weekly Threat Brief: March 1-8, 2026 โ€” AI Weaponization and Kinetic-Cyber Convergence

Mar 8, 2026

high

State Actors Unleash New Malware Arsenal as Phishing-as-a-Service Operations Scale Globally

Mar 5, 2026

high

APT Roundup: Zero-Day Exploitation, Iranian Cyber Escalation, and AI-Targeted Attacks

Mar 3, 2026

critical

APT28 Exploits MSHTML Zero-Day; North Korean npm Campaign Evolves

Mar 2, 2026

critical

Weekly Threat Brief: Feb 23 - Mar 2, 2026 , Critical Infrastructure Under Active Exploitation

Mar 2, 2026

high

Nation-State Activity Roundup: APT28 MacroMaze Campaign, MuddyWater Operations, and Mass Infrastructure Compromises

Mar 1, 2026

critical

Weekly Threat Brief: Feb 22-Mar 1, 2026 , AI Arms Race Accelerates as Critical Infrastructure Under Fire

Mar 1, 2026

high

APT28 Macro Campaign, AI Model Theft, and Central Asian Telecom Attacks

Feb 24, 2026

All Threat Actors