Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

APT28 Targets Ukrainian UKR-net Users in Long-Running Credential Phishing Campaign

Posted on December 17, 2025December 17, 2025 By CWS

Dec 17, 2025Ravie LakshmananEmail Safety / Risk Intelligence
The Russian state-sponsored menace actor referred to as APT28 has been attributed to what has been described as a “sustained” credential-harvesting marketing campaign focusing on customers of UKR[.]web, a webmail and information service widespread in Ukraine.
The exercise, noticed by Recorded Future’s Insikt Group between June 2024 and April 2025, builds upon prior findings from the cybersecurity firm in Could 2024 that detailed the hacking group’s assaults focusing on European networks with the HeadLace malware and credential-harvesting internet pages.
APT28 can be tracked as BlueDelta, Fancy Bear, Forest Blizzard, FROZENLAKE, Iron Twilight, ITG05, Pawn Storm, Sednit, Sofacy, and TA422. It is assessed to be affiliated with Russia’s Principal Directorate of the Normal Workers of the Russian Federation’s Armed Forces (GRU).

The newest assaults are characterised by the deployment of UKR[.]net-themed login pages on reliable companies like Mocky to entice recipients into coming into their credentials and two-factor authentication (2FA) codes. Hyperlinks to those pages are embedded inside PDF paperwork which might be distributed by way of phishing emails.
The hyperlinks are shortened utilizing companies like tiny[.]cc or tinyurl[.]com. In some circumstances, the menace actor has additionally been noticed utilizing subdomains created on platforms like Blogger (*.blogspot[.]com) to launch a two-tier redirection chain that results in the credential harvesting web page.

The efforts are a part of a broader set of phishing and credential theft operations orchestrated by the adversary since mid-2000s focusing on authorities establishments, protection contractors, weapons suppliers, logistics corporations, and coverage assume tanks in pursuit of Russia’s strategic targets.

“Whereas this marketing campaign doesn’t reveal particular targets, BlueDelta’s historic give attention to credential theft to allow intelligence assortment offers robust indicators of probably intent to gather delicate info from Ukrainian customers in help of broader GRU intelligence necessities,” the Mastercard-owned firm mentioned in a report shared with The Hacker Information.
What has modified is the transition from utilizing compromised routers to proxy tunneling companies corresponding to ngrok and Serveo to seize and relay the stolen credentials and 2FA codes.
“BlueDelta’s continued abuse of free internet hosting and anonymized tunneling infrastructure probably displays an adaptive response to Western-led infrastructure takedowns in early 2024,” Recorded Future mentioned. “The marketing campaign highlights the GRU’s persistent curiosity in compromising Ukrainian consumer credentials to help intelligence-gathering operations amid Russia’s ongoing conflict in Ukraine.”

The Hacker News Tags:APT28, Campaign, Credential, LongRunning, Phishing, Targets, Ukrainian, UKRnet, Users

Post navigation

Previous Post: New ForumTroll Phishing Attacks Target Russian Scholars Using Fake eLibrary Emails
Next Post: Microsoft Desktop Windows Manager Out-Of-Bounds Vulnerability Let Attackers Escalate Privileges

Related Posts

Chrome Targeted by Active In-the-Wild Exploit Tied to Undisclosed High-Severity Flaw The Hacker News
An Anti-Sales Guide for MSPs The Hacker News
Microsoft Links Storm-1175 to GoAnywhere Exploit Deploying Medusa Ransomware The Hacker News
NightEagle APT Exploits Microsoft Exchange Flaw to Target China’s Military and Tech Sectors The Hacker News
Eurojust Arrests 5 in €100M Cryptocurrency Investment Fraud Spanning 23 Countries The Hacker News
295 Malicious IPs Launch Coordinated Brute-Force Attacks on Apache Tomcat Manager The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • China-Aligned Threat Group Uses Windows Group Policy to Deploy Espionage Malware
  • New Udados Botnet Launches Massive HTTP Flood DDoS Attacks Targeting Tech Sector
  • UEFI Vulnerability in Major Motherboards Enables Early-Boot Attacks
  • HPE Patches Critical Flaw in IT Infrastructure Management Software
  • HPE OneView Flaw Rated CVSS 10.0 Allows Unauthenticated Remote Code Execution

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • China-Aligned Threat Group Uses Windows Group Policy to Deploy Espionage Malware
  • New Udados Botnet Launches Massive HTTP Flood DDoS Attacks Targeting Tech Sector
  • UEFI Vulnerability in Major Motherboards Enables Early-Boot Attacks
  • HPE Patches Critical Flaw in IT Infrastructure Management Software
  • HPE OneView Flaw Rated CVSS 10.0 Allows Unauthenticated Remote Code Execution

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark