Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
FancyBear Security Breach Uncovers NATO Espionage Efforts

FancyBear Security Breach Uncovers NATO Espionage Efforts

Posted on March 18, 2026 By CWS

A significant operational security lapse by the Russian state-sponsored hacking group known as FancyBear has provided an unprecedented glimpse into an espionage campaign targeting government and military bodies across Europe. The incident exposes their strategies and targets, offering a rare insight into the group’s ongoing activities.

Exposed Operations and Initial Discoveries

On March 11, 2026, Hunt.io, a threat intelligence firm, disclosed details of Operation Roundish. This campaign was identified through an unsecured open-directory first detected on January 13, 2026. FancyBear, also referred to as APT28, Forest Blizzard, and Sednit, is associated with Russia’s GRU Military Intelligence Unit 26165, according to the UK’s NCSC.

The campaign, initially a covert webmail exploitation operation, inadvertently became public when the group failed to secure a NameCheap Virtual Private Server in the U.S., associated with IP address 203.161.50.145. Despite being linked to FancyBear by Ukraine’s CERT-UA since September 2024, the server remained in use for over 500 days.

Data Breach and Geopolitical Implications

Researchers discovered an open-directory containing 2,800 government and military emails, 240 credentials including passwords and TOTP 2FA secrets, and 11,500 contact addresses from victims’ address books. Additional findings included command-and-control source code and exfiltrated data, indicating a comprehensive espionage operation.

The targets included nations like Ukraine, Romania, Bulgaria, Greece, Serbia, and North Macedonia. Notably, email addresses linked to NATO headquarters were found among the stolen data, revealing a deliberate geopolitical targeting strategy. Romanian and Greek military and governmental entities were among those compromised, underscoring the operation’s intelligence-driven nature.

Exploiting 2FA Vulnerabilities

FancyBear’s ability to bypass two-factor authentication without detection was a significant concern. By deploying a JavaScript module named keyTwoAuth.js, they extracted TOTP-based 2FA secrets directly from authenticated webmail sessions. The module operated seamlessly within the victim’s Roundcube email session, capturing credentials without any additional user interaction.

Analysis by Ctrl-Alt-Intel revealed 516 log entries under the ktfu prefix, with 256 accounts having their TOTP secrets stolen. This included accounts from Romania’s Air Force, Greece’s GEETHA, and Serbia’s Ministry of Defence. Organizations using Roundcube with the twofactorgauthenticator plugin are advised to consider their TOTP secrets compromised and update them immediately.

Defensive Measures and Future Outlook

To defend against such breaches, organizations should audit email-filtering rules for unauthorized entries and block connections to IP address 203.161.50.145 and the domain zhblz.com. Applying patches for vulnerabilities like Roundcube CVE-2023-43770 and monitoring for XSS injection attempts are critical steps to enhance security.

As cyber threats evolve, ongoing vigilance and proactive security measures remain paramount. Stay informed about the latest updates by following us on Google News, LinkedIn, and X, and consider setting CSN as a preferred source for timely information.

Cyber Security News Tags:2FA bypass, APT28, cyber espionage, Cybersecurity, FancyBear, government hacking, GRU, military targets, NATO espionage, Roundcube

Post navigation

Previous Post: Apple Enhances Security with New Update System
Next Post: Critical ScreenConnect Flaw Puts Remote Sessions at Risk

Related Posts

Iranian Hackers Targeting Academics and Foreign Policy Experts Using RMM Tools Iranian Hackers Targeting Academics and Foreign Policy Experts Using RMM Tools Cyber Security News
Darknet Market Escrow Systems is Vulnerable to Administrator Exit Scams Darknet Market Escrow Systems is Vulnerable to Administrator Exit Scams Cyber Security News
CodeSign Secure v3.02: Future of Code Signing with PQC CodeSign Secure v3.02: Future of Code Signing with PQC Cyber Security News
Link11 Highlights Growing Cybersecurity Risks and Introduces Integrated WAAP Protection Platform Link11 Highlights Growing Cybersecurity Risks and Introduces Integrated WAAP Protection Platform Cyber Security News
8000+ SmarterMail Hosts Vulnerable to RCE Attack 8000+ SmarterMail Hosts Vulnerable to RCE Attack Cyber Security News
10 Best Security Service Edge (SSE) Solutions 10 Best Security Service Edge (SSE) Solutions Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Critical ScreenConnect Flaw Puts Remote Sessions at Risk
  • FancyBear Security Breach Uncovers NATO Espionage Efforts
  • Apple Enhances Security with New Update System
  • Critical Apple WebKit Flaw Patched on iOS and macOS
  • Manifold Secures $8 Million to Enhance AI Security

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Critical ScreenConnect Flaw Puts Remote Sessions at Risk
  • FancyBear Security Breach Uncovers NATO Espionage Efforts
  • Apple Enhances Security with New Update System
  • Critical Apple WebKit Flaw Patched on iOS and macOS
  • Manifold Secures $8 Million to Enhance AI Security

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark