Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
FancyBear Security Breach Uncovers NATO Espionage Efforts

FancyBear Security Breach Uncovers NATO Espionage Efforts

Posted on March 18, 2026 By CWS

A significant operational security lapse by the Russian state-sponsored hacking group known as FancyBear has provided an unprecedented glimpse into an espionage campaign targeting government and military bodies across Europe. The incident exposes their strategies and targets, offering a rare insight into the group’s ongoing activities.

Exposed Operations and Initial Discoveries

On March 11, 2026, Hunt.io, a threat intelligence firm, disclosed details of Operation Roundish. This campaign was identified through an unsecured open-directory first detected on January 13, 2026. FancyBear, also referred to as APT28, Forest Blizzard, and Sednit, is associated with Russia’s GRU Military Intelligence Unit 26165, according to the UK’s NCSC.

The campaign, initially a covert webmail exploitation operation, inadvertently became public when the group failed to secure a NameCheap Virtual Private Server in the U.S., associated with IP address 203.161.50.145. Despite being linked to FancyBear by Ukraine’s CERT-UA since September 2024, the server remained in use for over 500 days.

Data Breach and Geopolitical Implications

Researchers discovered an open-directory containing 2,800 government and military emails, 240 credentials including passwords and TOTP 2FA secrets, and 11,500 contact addresses from victims’ address books. Additional findings included command-and-control source code and exfiltrated data, indicating a comprehensive espionage operation.

The targets included nations like Ukraine, Romania, Bulgaria, Greece, Serbia, and North Macedonia. Notably, email addresses linked to NATO headquarters were found among the stolen data, revealing a deliberate geopolitical targeting strategy. Romanian and Greek military and governmental entities were among those compromised, underscoring the operation’s intelligence-driven nature.

Exploiting 2FA Vulnerabilities

FancyBear’s ability to bypass two-factor authentication without detection was a significant concern. By deploying a JavaScript module named keyTwoAuth.js, they extracted TOTP-based 2FA secrets directly from authenticated webmail sessions. The module operated seamlessly within the victim’s Roundcube email session, capturing credentials without any additional user interaction.

Analysis by Ctrl-Alt-Intel revealed 516 log entries under the ktfu prefix, with 256 accounts having their TOTP secrets stolen. This included accounts from Romania’s Air Force, Greece’s GEETHA, and Serbia’s Ministry of Defence. Organizations using Roundcube with the twofactorgauthenticator plugin are advised to consider their TOTP secrets compromised and update them immediately.

Defensive Measures and Future Outlook

To defend against such breaches, organizations should audit email-filtering rules for unauthorized entries and block connections to IP address 203.161.50.145 and the domain zhblz.com. Applying patches for vulnerabilities like Roundcube CVE-2023-43770 and monitoring for XSS injection attempts are critical steps to enhance security.

As cyber threats evolve, ongoing vigilance and proactive security measures remain paramount. Stay informed about the latest updates by following us on Google News, LinkedIn, and X, and consider setting CSN as a preferred source for timely information.

Cyber Security News Tags:2FA bypass, APT28, cyber espionage, Cybersecurity, FancyBear, government hacking, GRU, military targets, NATO espionage, Roundcube

Post navigation

Previous Post: Apple Enhances Security with New Update System
Next Post: Critical ScreenConnect Flaw Puts Remote Sessions at Risk

Related Posts

Windows 11 New Security Feature Denies Unauthorized Access to System Files Windows 11 New Security Feature Denies Unauthorized Access to System Files Cyber Security News
Claude Desktop Raises Privacy Concerns with Browser Integration Claude Desktop Raises Privacy Concerns with Browser Integration Cyber Security News
Lessons Learned from Massive npm Supply Chain Attack Using “Shai-Hulud” Self-Replicating Malware Lessons Learned from Massive npm Supply Chain Attack Using “Shai-Hulud” Self-Replicating Malware Cyber Security News
Microsoft Confirms Recent Updates Cause Login Issues on Windows 11 24H2, 25H2, and Windows Server 2025 Microsoft Confirms Recent Updates Cause Login Issues on Windows 11 24H2, 25H2, and Windows Server 2025 Cyber Security News
New Elastic EDR 0-Day Vulnerability Allows Attackers to Bypass Detection, Execute Malware, and Cause BSOD New Elastic EDR 0-Day Vulnerability Allows Attackers to Bypass Detection, Execute Malware, and Cause BSOD Cyber Security News
Microsoft Brokering File System Vulnerability Let Attackers Escalate Privileges Microsoft Brokering File System Vulnerability Let Attackers Escalate Privileges Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Microsoft Defender Misidentifies DigiCert Certificates
  • Pentagon Partners with Tech Giants for AI in Defense
  • CISA Highlights Critical Linux Vulnerability Exploitation
  • Government Servers Compromised Through cPanel Vulnerability
  • Trellix Faces Security Breach in Source Code Repository

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Microsoft Defender Misidentifies DigiCert Certificates
  • Pentagon Partners with Tech Giants for AI in Defense
  • CISA Highlights Critical Linux Vulnerability Exploitation
  • Government Servers Compromised Through cPanel Vulnerability
  • Trellix Faces Security Breach in Source Code Repository

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark