Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
APT28’s Webhook Malware Targets Europe

APT28’s Webhook Malware Targets Europe

Posted on February 23, 2026 By CWS

The Russian state-backed cyber threat group known as APT28 has launched a fresh campaign aimed at organizations in Western and Central Europe. According to insights from S2 Grupo’s LAB52 threat intelligence team, this operation, labeled Operation MacroMaze, was active between September 2025 and January 2026. It exploits basic tools and legitimate services to breach infrastructure and extract data.

Operation MacroMaze Unveiled

The campaign begins with spear-phishing emails that distribute documents equipped with a macro. These documents include an XML field called “INCLUDEPICTURE,” which refers to a URL on webhook[.]site that hosts an image file. When the document is opened, the image is fetched, initiating an HTTP request to the server and allowing operators to log metadata, confirming the recipient has opened the file.

LAB52 observed several documents containing modified macros during the operation period. These macros serve as a dropper, establishing a foothold on the target system to deploy further payloads. Although the fundamental operation of these macros remains unchanged, there is a noticeable evolution in their evasion tactics.

Advanced Evasion Techniques

Originally, the macros utilized ‘headless’ browser execution, but newer versions employ keyboard simulation to potentially bypass security alerts. The macro executes a Visual Basic Script, advancing the infection by running a CMD file that uses scheduled tasks to ensure persistence. Additionally, it launches a batch script, which processes a Base64-encoded HTML payload in Microsoft Edge in headless mode, retrieves commands from the webhook endpoint, executes them, and sends output to another webhook instance.

An alternative batch script version avoids headless mode, instead relocating the browser window off-screen while terminating other Edge processes. This ensures a controlled environment for the exfiltration process.

Simplicity in Complexity

LAB52 describes this browser-based exfiltration as using standard HTML features to transmit data with minimal disk traces. The campaign demonstrates how straightforward tools like batch files, small VBS launchers, and simple HTML can be effectively combined to create a stealthy attack. Operations are concealed in hidden browser sessions, artifacts are minimized, and both payload delivery and data exfiltration are outsourced to common webhook services.

APT28’s approach highlights the power of simplicity in cyber attacks. By leveraging uncomplicated yet ingenious tactics, the group effectively maximizes stealth and efficiency, posing a significant threat to targeted entities in Europe.

The Hacker News Tags:APT28, cyber attack, Cybersecurity, data exfiltration, Europe, macro malware, Malware, spear-phishing, threat intelligence, Webhook

Post navigation

Previous Post: GrayCharlie Targets WordPress Sites with Malicious Scripts
Next Post: Anthropic Accuses Chinese AI Labs of Distillation Attacks

Related Posts

Google Mandiant Probes New Oracle Extortion Wave Possibly Linked to Cl0p Ransomware Google Mandiant Probes New Oracle Extortion Wave Possibly Linked to Cl0p Ransomware The Hacker News
Watch This Webinar to Uncover Hidden Flaws in Login, AI, and Digital Trust — and Fix Them Watch This Webinar to Uncover Hidden Flaws in Login, AI, and Digital Trust — and Fix Them The Hacker News
New SAP NetWeaver Bug Lets Attackers Take Over Servers Without Login New SAP NetWeaver Bug Lets Attackers Take Over Servers Without Login The Hacker News
OneLogin Bug Let Attackers Use API Keys to Steal OIDC Secrets and Impersonate Apps OneLogin Bug Let Attackers Use API Keys to Steal OIDC Secrets and Impersonate Apps The Hacker News
Fake Kling AI Facebook Ads Deliver RAT Malware to Over 22 Million Potential Victims Fake Kling AI Facebook Ads Deliver RAT Malware to Over 22 Million Potential Victims The Hacker News
Critical AdonisJS Bodyparser Flaw (CVSS 9.2) Enables Arbitrary File Write on Servers Critical AdonisJS Bodyparser Flaw (CVSS 9.2) Enables Arbitrary File Write on Servers The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Zoom Software Vulnerabilities Pose Security Risks
  • Enhancing MSSP Security with Real-Time Threat Visibility
  • SAP Addresses Critical Vulnerabilities in S/4HANA
  • Ivanti Releases Security Patches for Multiple Products
  • Apple Updates macOS, iOS to Fix Numerous Security Flaws

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Zoom Software Vulnerabilities Pose Security Risks
  • Enhancing MSSP Security with Real-Time Threat Visibility
  • SAP Addresses Critical Vulnerabilities in S/4HANA
  • Ivanti Releases Security Patches for Multiple Products
  • Apple Updates macOS, iOS to Fix Numerous Security Flaws

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark