Russia's APT28 Harvests Credentials Across Balkans and Central Asia
Fancy Bear campaigns from February through September 2025 targeted energy, defense, and policy organizations using fake VPN and email login pages.
Recorded Future published new research this week documenting sustained credential harvesting campaigns by APT28 across the Balkans, Middle East, and Central Asia throughout 2025. The Russian GRU-linked group targeted energy research facilities, military organizations, and policy think tanks using fake login pages for VPNs and email services.
The campaigns demonstrate that APT28—also tracked as Fancy Bear, BlueDelta, and Forest Blizzard—continues relying on straightforward phishing tactics rather than sophisticated zero-days. When targeting specific organizations with valid lures, simple techniques still work.
What is APT28?
APT28 is a cyber espionage unit attributed to Russia's GRU military intelligence agency. The group gained notoriety for the 2016 Democratic National Committee breach and subsequent election interference operations. They've since conducted campaigns against government, military, and critical infrastructure targets worldwide.
The group's tactics range from zero-day exploitation to basic credential phishing. This latest campaign series falls firmly in the latter category—fake login pages hosted on commodity infrastructure, designed to steal usernames and passwords from specific targets.
Campaign Timeline
Recorded Future identified three distinct waves of activity:
June 2025: A Turkish energy and nuclear research agency received phishing emails directing victims to a fake Sophos VPN password reset page. The attackers hosted the credential harvester on InfinityFree, a free web hosting service.
September 2025: North Macedonia military personnel and an Uzbekistan IT integrator were targeted with fake password expiration warnings. The lures claimed passwords would expire and needed immediate renewal.
April 2025: A European think tank faced a campaign using fake Google password reset pages hosted on Byet Internet Services.
Across all campaigns, APT28 used legitimate PDF documents as decoys—publications from the Gulf Research Center on Iran-Israel relations and climate policy briefings from European think tanks. The decoys matched targets' professional interests, increasing the likelihood victims would engage with the phishing links.
Attack Chain
The attacks followed a consistent pattern:
- Target receives phishing email with shortened URL
- Click redirects through webhook[.]site, briefly displaying a legitimate decoy PDF
- After two seconds, victim lands on a spoofed login page (Sophos VPN, Google, or Microsoft OWA)
- Hidden HTML form captures credentials via JavaScript
- A "page opened" beacon notifies attackers of the view
- Victim redirects to the actual legitimate PDF
The brief decoy display serves a clever purpose: it provides plausible context for why the victim clicked the link while the credential harvesting happens in the background. Victims who successfully authenticate (or fail) end up viewing the expected document, reducing suspicion.
Infrastructure Choices
APT28 deliberately used commodity hosting services rather than dedicated infrastructure:
- InfinityFree (free hosting)
- Byet Internet Services
- webhook[.]site for redirects
- ngrok for tunneling
This approach trades operational sophistication for disposability. If defenders block one hosting provider, the attackers spin up new infrastructure within hours. The services are legitimate, making blanket blocking impractical.
Recorded Future noted this contrasts with APT28's more advanced capabilities. The group has previously exploited zero-days in Cisco routers and deployed custom malware like BRICKSTORM. Simple credential phishing apparently remains effective enough to warrant continued use.
Why Credentials Matter
Stolen VPN and email credentials provide initial access to target networks without triggering vulnerability-based detection. An attacker logging in with valid credentials looks identical to a legitimate user—at least until they start moving laterally or exfiltrating data.
APT28's target selection reflects Russian intelligence priorities: energy research, military cooperation, and government policy. Access to these organizations' email systems and VPNs enables follow-on espionage operations, potentially lasting months or years before detection.
Detection and Defense
Organizations in targeted sectors should:
- Implement phishing-resistant MFA - Hardware security keys or certificate-based authentication defeat credential phishing even when users fall for fake login pages
- Monitor authentication sources - Flag logins from unusual locations or infrastructure providers like InfinityFree
- Train staff on regional lures - APT28 used Turkish-language and region-specific content; generic phishing awareness doesn't cover targeted campaigns
- Review VPN access logs - Look for successful authentications from commodity VPN or hosting providers
The campaigns reinforce that sophisticated threat actors don't always use sophisticated techniques. When simple phishing works against high-value targets, there's no reason to burn zero-days.
Related Articles
Google Cloud Feature Weaponized in 9,000-Email Phishing Wave
Attackers abuse Google Cloud Application Integration to send phishing emails that bypass SPF, DKIM, and DMARC, targeting 3,200 organizations globally.
Jan 3, 2026Amazon Disrupts Multi-Year Russian GRU Campaign Targeting Energy Sector
Amazon's threat intelligence team exposes and disrupts Sandworm operations targeting Western critical infrastructure through misconfigured edge devices.
Dec 17, 2025Microsoft: Tycoon2FA Phishing Exploits Email Misconfigurations
Threat actors spoof organization domains by abusing complex mail routing and weak DMARC policies. Microsoft blocked 13 million malicious emails in October alone.
Jan 7, 2026Finland Arrests Ship Crew Over Baltic Cable Sabotage
Two crew members detained after cargo vessel's anchor allegedly severed Finland-Estonia telecommunications cable in suspected hybrid warfare operation.
Jan 4, 2026