Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
APT28’s Webhook Malware Targets Europe

APT28’s Webhook Malware Targets Europe

Posted on February 23, 2026 By CWS

The Russian state-backed cyber threat group known as APT28 has launched a fresh campaign aimed at organizations in Western and Central Europe. According to insights from S2 Grupo’s LAB52 threat intelligence team, this operation, labeled Operation MacroMaze, was active between September 2025 and January 2026. It exploits basic tools and legitimate services to breach infrastructure and extract data.

Operation MacroMaze Unveiled

The campaign begins with spear-phishing emails that distribute documents equipped with a macro. These documents include an XML field called “INCLUDEPICTURE,” which refers to a URL on webhook[.]site that hosts an image file. When the document is opened, the image is fetched, initiating an HTTP request to the server and allowing operators to log metadata, confirming the recipient has opened the file.

LAB52 observed several documents containing modified macros during the operation period. These macros serve as a dropper, establishing a foothold on the target system to deploy further payloads. Although the fundamental operation of these macros remains unchanged, there is a noticeable evolution in their evasion tactics.

Advanced Evasion Techniques

Originally, the macros utilized ‘headless’ browser execution, but newer versions employ keyboard simulation to potentially bypass security alerts. The macro executes a Visual Basic Script, advancing the infection by running a CMD file that uses scheduled tasks to ensure persistence. Additionally, it launches a batch script, which processes a Base64-encoded HTML payload in Microsoft Edge in headless mode, retrieves commands from the webhook endpoint, executes them, and sends output to another webhook instance.

An alternative batch script version avoids headless mode, instead relocating the browser window off-screen while terminating other Edge processes. This ensures a controlled environment for the exfiltration process.

Simplicity in Complexity

LAB52 describes this browser-based exfiltration as using standard HTML features to transmit data with minimal disk traces. The campaign demonstrates how straightforward tools like batch files, small VBS launchers, and simple HTML can be effectively combined to create a stealthy attack. Operations are concealed in hidden browser sessions, artifacts are minimized, and both payload delivery and data exfiltration are outsourced to common webhook services.

APT28’s approach highlights the power of simplicity in cyber attacks. By leveraging uncomplicated yet ingenious tactics, the group effectively maximizes stealth and efficiency, posing a significant threat to targeted entities in Europe.

The Hacker News Tags:APT28, cyber attack, Cybersecurity, data exfiltration, Europe, macro malware, Malware, spear-phishing, threat intelligence, Webhook

Post navigation

Previous Post: GrayCharlie Targets WordPress Sites with Malicious Scripts
Next Post: Anthropic Accuses Chinese AI Labs of Distillation Attacks

Related Posts

ZeroDayRAT Spyware Threatens Android and iOS Security ZeroDayRAT Spyware Threatens Android and iOS Security The Hacker News
U.S. Seizes .74M in Crypto Tied to North Korea’s Global Fake IT Worker Network U.S. Seizes $7.74M in Crypto Tied to North Korea’s Global Fake IT Worker Network The Hacker News
Researchers Detail Tuoni C2’s Role in an Attempted 2025 Real-Estate Cyber Intrusion Researchers Detail Tuoni C2’s Role in an Attempted 2025 Real-Estate Cyber Intrusion The Hacker News
Fake WhatsApp API Package on npm Steals Messages, Contacts, and Login Tokens Fake WhatsApp API Package on npm Steals Messages, Contacts, and Login Tokens The Hacker News
Second Sha1-Hulud Wave Affects 25,000+ Repositories via npm Preinstall Credential Theft Second Sha1-Hulud Wave Affects 25,000+ Repositories via npm Preinstall Credential Theft The Hacker News
Taiwan Web Servers Breached by UAT-7237 Using Customized Open-Source Hacking Tools Taiwan Web Servers Breached by UAT-7237 Using Customized Open-Source Hacking Tools The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • North Korean Cyber Threats Exploit IT Hiring Processes
  • Conduent’s Massive Data Breach: 8 TB Stolen by Ransomware
  • Anthropic Accuses Chinese AI Labs of Distillation Attacks
  • APT28’s Webhook Malware Targets Europe
  • GrayCharlie Targets WordPress Sites with Malicious Scripts

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • North Korean Cyber Threats Exploit IT Hiring Processes
  • Conduent’s Massive Data Breach: 8 TB Stolen by Ransomware
  • Anthropic Accuses Chinese AI Labs of Distillation Attacks
  • APT28’s Webhook Malware Targets Europe
  • GrayCharlie Targets WordPress Sites with Malicious Scripts

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News