APT28 is a long-running, GRU-linked espionage group that prioritizes stealthy credential access, targeted phishing, and long-term intelligence collection across Europe, North America, and Ukraine. Recent reporting through 2025 highlights new tooling like the LAMEHUG AI-assisted malware and sustained credential/token harvesting campaigns against services such as UKR[.]net. #APT28 #LAMEHUG
Keypoints
- APT28 (aka Fancy Bear, Sofacy, STRONTIUM) is widely attributed to Russiaâs GRU Unit 26165 and has operated since the mid-2000s with persistent focus on intelligence collection.
- The group targets NATO members, Western supporters of Ukraine, government and diplomatic organizations, defense and logistics firms, and media/research institutions to harvest strategic intelligence.
- Initial access methods include spearphishing, malicious links/attachments, exploitation of public-facing applications, compromised accounts, and abused remote services.
- Operational tradecraft emphasizes credential theft (including OAuth tokens), covert persistence, built-in tool abuse (PowerShell, rundll32), and low-volume exfiltration over web services to avoid detection.
- Notable campaigns include LAMEHUG (2025 AI-assisted malware), credential/token theft against UKR[.]net and Microsoft cloud accounts (2024â2025), and router compromise/ reconnaissance targeting Cisco devices (2021).
- Mitigations center on identity protection (MFA, account hygiene), phishing defenses, patching exposed services and devices, monitoring for low-noise C2 and persistence, and applying threat intelligence.
MITRE Techniques
- [T1189 ] Drive-by Compromise â Used to gain initial access via web-based content and browser/client-side vectors (âdrive-byâ implied by browser- or email-based attacks and client-side exploitation).
- [T1190 ] Exploit Public-Facing Application â Exploited internet-facing services and known CVEs for entry (âexploitation of public-facing applications, particularly webmail and edge infrastructureâ).
- [T1566.001 ] Phishing: Spearphishing Attachment â Delivered ZIP archives and PyInstaller-packed executables via spearphishing attachments (âphishing emails delivering ZIP archives with a PyInstaller-packed executableâ).
- [T1598.003 ] Spearphishing Link â Phishing emails routed victims to fake login pages to harvest credentials (âphishing emails that routed victims to fake login pages hosted on legitimate servicesâ).
- [T1204.001 ] User Execution: Malicious Link â Users were prompted to click malicious links in targeted spearphishing (âphishing, malicious links or attachmentsâ).
- [T1204.002 ] User Execution: Malicious File â Malicious files (PyInstaller executables, disguised documents) required user execution to run payloads (âa PyInstaller-packed executable disguised as a documentâ).
- [T1133 ] External Remote Services â Abuse of external remote services and compromised accounts to access environments (âabused trusted relationships and compromised accounts, including cloud and email credentialsâ).
- [T1199 ] Trusted Relationship â Leveraged trusted third-party relationships and compromised partner accounts to appear legitimate (âabused trusted relationships and compromised accountsâ).
- [T1586.002 ] Compromise Accounts: Email Accounts â Compromised email accounts for access and phishing operations (âcompromise accounts: email accountsâ and email collection and theft repeatedly referenced).
- [T1584.008 ] Compromise Infrastructure: Network Devices â Compromised routers and network devices (Cisco) for reconnaissance and follow-on malware (âactivity against poorly maintained Cisco routersâ and âreconnaissance against routers globallyâ).
- [T1078 ] Valid Accounts â Use of valid user accounts to maintain access and blend with normal activity (âreuse of compromised credentialsâ and âvalid accountsâ).
- [T1078.004 ] Valid Accounts: Cloud Accounts â Targeting and use of cloud/email credentials and OAuth tokens to persist in cloud services (âprompted for Microsoft cloud logins and captured credentials and OAuth tokensâ).
- [T1059.001 ] Command and Scripting Interpreter: PowerShell â Use of PowerShell to execute payloads and scripts while blending with normal activity (âPowerShell ⌠commonly used to run payloads and scriptsâ).
- [T1059.003 ] Command and Scripting Interpreter: Windows Command Shell â Use of the Windows command shell for command execution (âthe Windows command shell ⌠commonly used to run payloads and scriptsâ).
- [T1203 ] Exploitation for Client Execution â Client-side exploitation in browser- or email-based attacks to execute code (âclient-side exploitation allows code to execute as soon as malicious content is renderedâ).
- [T1218.011 ] System Binary Proxy Execution: Rundll32 â Abused trusted binaries such as rundll32 to run payloads (âtrusted binaries such as rundll32 are commonly used to run payloadsâ).
- [T1137.002 ] Office Application Startup: Office Test â Abuse of Office application startup features to execute malicious content (âin browser- or email-based attacks, client-side exploitationâ and use of office features implied for execution patterns).
- [T1559.002 ] Inter-Process Communication: Dynamic Data Exchange â Used inter-process communication techniques in client exploitation or lateral activity (âInter-Process Communication ⌠Dynamic Data Exchangeâ mapping in table aligns with described client-side and execution tradecraft).
- [T1221 ] Template Injection â Use of templates or document-based injection vectors in spearphishing/document payloads (âdisguised as a documentâ delivery and exploitation for client execution).
- [T1547.001 ] Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder â Persistence via registry run keys and startup entries (âmodifying logon scripts, registry run keys, scheduled tasksâ).
- [T1037.001 ] Boot or Logon Initialization Scripts: Logon Script â Persistence through logon scripts and initialization scripts (âmodifying logon scriptsâ).
- [T1098.002 ] Account Manipulation: Additional Email Delegate Permissions â Manipulated email delegation and permissions to maintain access and stealth (âadditional email delegate permissionsâ mapping and âaccount manipulationâ in persistent email-focused campaigns).
- [T1546.015 ] Event Triggered Execution: Component Object Model Hijacking â Achieved persistence and evasion via COM hijacking (âCOM objectsâ modification used for persistence).
- [T1505.003 ] Server Software Component: Web Shell â Deployment of web shells on compromised infrastructure to maintain remote access (âserver-side follow-on malware deployment on devices and web-facing infrastructureâ).
- [T1542.003 ] Pre-OS Boot: Bootkit â Use of advanced persistence like bootkits/rootkits as observed capability (âPre-OS Boot: Bootkitâ listed and capability to deploy rootkits noted in techniques).
- [T1014 ] Rootkit â Use or capability to deploy rootkits for stealth and persistence (âRootkitâ cited in MITRE mapping and references to deep persistence techniques).
- [T1068 ] Exploitation for Privilege Escalation â Exploited vulnerabilities to escalate privileges in target environments (âprivilege escalation may involve exploiting vulnerabilitiesâ).
- [T1134.001 ] Access Token Manipulation: Token Impersonation/Theft â Theft and reuse of tokens and access material to escalate or impersonate users (âcaptured credentials and OAuth tokensâ and âaccess token theftâ).
- [T1211 ] Exploitation for Defense Evasion â Used exploitation techniques to evade detection and disable defenses (âexploitation for defense evasionâ mapping and described avoidance of detection).
- [T1562.004 ] Impair Defenses: Disable or Modify System Firewall â Efforts to modify or impair defensive controls during intrusions (âimpair defensesâ listed and described activity to remove indicators and hamper detection).
- [T1070.001 ] Indicator Removal: Clear Windows Event Logs â Clearing logs to remove traces of activity (âactively removes indicators of compromise, clears logsâ).
- [T1070.004 ] Indicator Removal: File Deletion â Deleting artifacts and files to reduce forensic evidence (âdeletes artifactsâ).
- [T1070.006 ] Indicator Removal: Timestomp â Use of timestomping or file timestamp manipulation to hide activity (âIndicator Removal and timestomp techniques listedâ).
- [T1564.001 ] Hide Artifacts: Hidden Files and Directories â Hiding files and directories to evade discovery (âHide Artifacts and hidden files and directories listed as evasion tacticsâ).
- [T1564.003 ] Hide Artifacts: Hidden Window â Use of hidden windows or UI techniques to run malicious code stealthily (âHidden Windowâ included among defense-evasion mappings).
- [T1027.013 ] Obfuscated Files or Information: Encrypted/Encoded File â Obfuscation and encoding of payloads and staged data to avoid detection (âCollected data is staged ⌠often compressed and obfuscatedâ).
- [T1140 ] Deobfuscate/Decode Files or Information â On-host decoding/deobfuscation of stored payloads during execution (âdeobfuscate/decode files or informationâ mapping supporting staged obfuscated payloads).
- [T1006 ] Direct Volume Access â Low-level access techniques for destructive or covert operations (âDirect Volume Accessâ mapped within impact/defense-evasion capabilities and disk manipulation discussion).
- [T1036 ] Masquerading â Masquerading malicious files or processes as legitimate resources to blend in (âdisguises malicious files as legitimate resourcesâ).
- [T1036.005 ] Masquerading: Match Legitimate Resource Name or Location â Naming and placement of resources to mimic legitimate items (âMatch Legitimate Resource Name or Locationâ matches the described practice of disguising artifacts).
- [T1001.001 ] Data Obfuscation: Junk Data â Use of junk data and obfuscation in exfiltration or staging to evade detection (âData obfuscation and compressed/obfuscated staging referencedâ).
- [T1110 ] Brute Force â Brute-force and credential-guessing against webmail and services (âbrute-force activity against webmailâ described in French CERT reporting).
- [T1110.001 ] Brute Force: Password Guessing â Password guessing approaches used in account compromise efforts (âpassword guessingâ category within brute-force targeting webmail/services).
- [T1110.003 ] Brute Force: Password Spraying â Password spraying employed against multiple accounts to gain access (âpassword sprayingâ listed as credential theft technique used by the group).
- [T1003 ] OS Credential Dumping â Dumping credentials from system memory and stores to harvest account data (âdumping credentials from memory and directory servicesâ).
- [T1003.001 ] OS Credential Dumping: LSASS Memory â Extraction of credentials from LSASS memory (âOS credential dumping: LSASS memoryâ listed and memory dumping described).
- [T1003.002 ] OS Credential Dumping: Security Account Manager â Harvesting credentials from the Security Account Manager (âSecurity Account Managerâ listed among credential dumping variants).
- [T1003.003 ] OS Credential Dumping: NTDS â Dumping NTDS/Active Directory database for credential harvesting (âNTDSâ included in credential dumping techniques referenced).
- [T1056.001 ] Input Capture: Keylogging â Keylogging to capture typed credentials and sensitive data (âkeyloggingâ included among credential theft techniques).
- [T1040 ] Network Sniffing â Network sniffing to capture credentials and network traffic (ânetwork sniffingâ listed as a credential access technique).
- [T1557.004 ] Adversary-in-the-Middle: Evil Twin â Use of adversary-in-the-middle approaches like evil twin WiâFi to steal credentials or intercept communications (âAdversary-in-the-Middle: Evil Twinâ listed and WiâFi reconnaissance noted).
- [T1528 ] Steal Application Access Token â Theft of application access tokens (OAuth) to maintain cloud access (âcaptured credentials and OAuth tokensâ explicitly described).
- [T1550.001 ] Use Alternate Authentication Material: Application Access Token â Use of stolen tokens to authenticate and persist in cloud environments (âcaptured ⌠OAuth tokens to maintain access while blending into normal account activityâ).
- [T1550.002 ] Use Alternate Authentication Material: Pass the Hash â Use of alternate authentication materials such as pass-the-hash in lateral movement and privilege operations (âpass the hashâ mapping within credential access techniques).
- [T1589.001 ] Gather Victim Identity Information: Credentials â Targeted gathering of credentials and identity information via phishing and harvesting pages (âaiming to capture both credentials and 2FA codesâ).
- [T1083 ] File and Directory Discovery â Discovery of files and directories to locate intelligence-rich content for exfiltration (âtargeted discovery to map users, systems, processesâ and file discovery mapping).
- [T1057 ] Process Discovery â Process enumeration to understand running applications and plan actions (âtargeted discovery to map ⌠processesâ).
- [T1120 ] Peripheral Device Discovery â Discovery of peripheral devices when mapping systems during reconnaissance (âPeripheral Device Discoveryâ listed among discovery techniques).
- [T1016.002 ] System Network Configuration Discovery: Wi-Fi Discovery â WiâFi discovery and mapping of network configuration as part of reconnaissance (âWi-Fi Discoveryâ and WiâFi networks listed in reconnaissance).
- [T1596 ] Search Open Technical Databases â Searching open technical databases to gather target information (âSearch Open Technical Databasesâ listed and discovery includes open-source information collection).
- [T1591 ] Gather Victim Org Information â Collection of organizational information to inform targeting and follow-on operations (âGather Victim Org Informationâ aligns with intelligence-driven targeting described).
- [T1669 ] Wi-Fi Networks â Reconnaissance and exploitation of WiâFi networks as part of environmental mapping (âWiâFi Networksâ included in discovery/reconnaissance mapping).
- [T1210 ] Exploitation of Remote Services â Exploiting remote services (RDP, SMB, other remote services) for lateral movement (âLateral movement is typically achieved through remote services such as RDP or SMBâ).
- [T1021.001 ] Remote Services: Remote Desktop Protocol â Use of RDP for lateral movement and pivoting (âRemote Desktop Protocolâ explicitly referenced as a lateral movement method).
- [T1021.002 ] Remote Services: SMB/Windows Admin Shares â Use of SMB and admin shares to move laterally and access data (âSMBâ and Windows admin shares used for lateral movement).
- [T1091 ] Replication Through Removable Media â Use of removable media for replication or data transfer in certain campaigns (âReplication Through Removable Mediaâ included among lateral movement techniques and data staging).
- [T1119 ] Automated Collection â Automated collection of emails, documents, and repositories for targeted intelligence gathering (âData collection focuses on emails, documents, shared repositories, screenshotsâ).
- [T1213 ] Data from Information Repositories â Targeted collection from information repositories like shared drives and cloud stores (âcollection focuses on ⌠shared repositoriesâ).
- [T1213.002 ] Data from Information Repositories: Sharepoint â Targeting SharePoint and similar repositories to harvest documents (âData from Information Repositories: Sharepointâ explicitly listed).
- [T1005 ] Data from Local System â Collection of local system files and documents for exfiltration (âData from Local Systemâ and staging described for local collection).
- [T1039 ] Data from Network Shared Drive â Harvesting files from network shares and shared drives (âData from Network Shared Driveâ listed and network share collection described).
- [T1025 ] Data from Removable Media â Collection of data from removable media when applicable (âData from Removable Mediaâ included in collection mappings).
- [T1113 ] Screen Capture â Use of screenshots to capture contextual information from compromised systems (âScreen Captureâ listed among collection techniques used to gather intelligence).
- [T1114.002 ] Email Collection: Remote Email Collection â Remote collection of email via compromised accounts or mail access (âEmail Collection: Remote Email Collectionâ and repeated focus on email access and exfiltration).
- [T1560 ] Archive Collected Data â Archiving and compressing collected data prior to exfiltration (âCollected data is staged locally or remotely, often compressed and obfuscated before exfiltrationâ).
- [T1560.001 ] Archive via Utility â Use of utilities to archive and compress data for staging and exfiltration (âArchive via Utilityâ implied by compressed staging behavior described).
- [T1074.001 ] Data Staged: Local Data Staging â Local staging of collected documents prior to exfiltration (âCollected data is staged locally or remotelyâ).
- [T1074.002 ] Data Staged: Remote Data Staging â Remote staging on infrastructure controlled by the actor for later exfiltration (âstaged locally or remotelyâ described in collection/exfiltration section).
- [T1071.001 ] Application Layer Protocol: Web Protocols â Use of standard web protocols for C2 and exfiltration to blend with legitimate traffic (âCommunications often occur over standard web and mail protocolsâ).
- [T1071.003 ] Application Layer Protocol: Mail Protocols â Use of mail protocols for command-and-control or data movement to blend in (âCommunications often occur over ⌠mail protocolsâ).
- [T1102.002 ] Web Service: Bidirectional Communication â Use of web services and cloud channels for bidirectional C2 and control (âcloud-based or proxy infrastructureâ and âWeb Service: Bidirectional Communicationâ mapped to C2 patterns).
- [T1090.001 ] Proxy: Internal Proxy â Use of internal proxying to obscure traffic flows (âinternal proxyâ mapping and use of layered proxies to obscure malicious traffic).
- [T1090.002 ] Proxy: External Proxy â Use of external proxies and rented infrastructure to hide origin (âexternal proxyâ and rented servers/VPNs/free hosting used to stay flexible and harder to trackâ).
- [T1090.003 ] Proxy: Multi-hop Proxy â Multi-hop proxying through chained infrastructure to complicate attribution (âMulti-hop Proxyâ referenced by use of layered proxies and rented infrastructure).
- [T1573.001 ] Encrypted Channel: Symmetric Cryptography â Use of encrypted channels for C2 and exfiltration to avoid inspection (âencrypted channelsâ and controlled, low-volume exfiltration described).
- [T1105 ] Ingress Tool Transfer â Transfer of tools and malware into target environments following reconnaissance (âfollow-on malware deployment on some devicesâ and ingress tool transfer mapping).
- [T1092 ] Communication Through Removable Media â Use of removable media as a comms or transfer mechanism in some lateral/collection contexts (âCommunication Through Removable Mediaâ included in C2/exfiltration mappings).
- [T1048.002 ] Exfiltration Over Alternative Protocol â Exfiltration using alternative protocols or channels to bypass controls (âexfiltration typically occurs over web services or alternative encrypted channelsâ).
- [T1567 ] Exfiltration Over Web Service â Use of web services for data exfiltration to blend with normal traffic (âexfiltration typically occurs over web servicesâ).
- [T1030 ] Data Transfer Size Limits â Controlled, low-volume exfiltration to avoid detection by size-based thresholds (âlow-volume manner to avoid detectionâ in exfiltration description).
- [T1561.001 ] Disk Content Wipe: Disk Content Wipe â Capability to wipe or destroy disk content when objectives require disruption (âthe group has demonstrated the capability to wipe disksâ).
- [T1498 ] Network Denial of Service â Ability to perform network denial or disruption when aligned with operational objectives (âNetwork Denial of Serviceâ listed under impact capabilities).
- [T1595.002 ] Active Scanning: Vulnerability Scanning â Active scanning and reconnaissance for vulnerable services and devices (âreconnaissance against routers globallyâ and vulnerability scanning mapping).
- [T1598 ] Phishing for Information â Use of phishing to harvest credentials, 2FA codes, and information (âphishing for informationâ and credential harvesting via fake login pages documented).
- [T1583.001 ] Acquire Infrastructure: Domains â Acquisition of domains for phishing and hosting landing pages (âacquire infrastructure: domainsâ and use of domains and hosted pages for credential collection).
- [T1583.003 ] Acquire Infrastructure: Virtual Private Server â Use of VPS and rented servers to host infrastructure and C2 (ârented servers, VPN services, and free hosting to stay flexible and harder to trackâ).
- [T1583.006 ] Acquire Infrastructure: Web Services â Use of web services and legitimate hosting for phishing and staging (âfake login pages hosted on legitimate servicesâ and âweb servicesâ for C2/exfiltration).
- [T1588.002 ] Obtain Capabilities: Tool â Development or acquisition of tooling (e.g., LAMEHUG, AUTHENTIC ANTICS) to support dynamic collection and operations (âLAMEHUG ⌠malware frameworkâ and âAUTHENTIC ANTICSâ attribution).
Indicators of Compromise
- [Malware ] campaign-specific samples â LAMEHUG (AI-assisted malware framework used in 2025), AUTHENTIC ANTICS (credential-capturing malware attributed to APT28).
- [Domain ] credential-phishing landing pages â UKR[.]net impersonation and fake login pages hosted on legitimate services used to harvest credentials and 2FA codes.
- [Vulnerability ] exploited for initial access â CVE-2017-6742 (Cisco router issue exploited in 2021), CVE-2023-23397 (exploitation path cited in French CERT reporting).
- [File ] delivery artifacts â PyInstaller-packed executable inside ZIP archives disguised as documents, and malicious attachments used in spearphishing campaigns.
- [Infrastructure ] hosting & proxies â Rented servers, VPN services, and free hosting used as flexible C2 and phishing infrastructure.
- [Network device ] router reconnaissance/compromise â Poorly maintained Cisco routers abused via SNMP and known vulnerabilities to collect device/network details (and follow-on malware on some devices).
- [Account/credentials ] targeted account types â Cloud and email credentials plus OAuth tokens harvested (example: Microsoft cloud logins and captured OAuth tokens), and stolen credentials for UKR[.]net users.