Fancy Bear's Anatomy: Tactics, Techniques & Procedures

A recent report by the leading cyber threat intelligence firm, Cyfirma, provides an in-depth analysis of Fancy Bear, also known as APT28, a Russian state-sponsored cyberespionage group notorious for its sophisticated cyber attacks.

Active since 2007, Fancy Bear has targeted governments, military organisations, and high-value entities worldwide, driven by motives of espionage, political influence, and reputational damage.

The report, published on 16 July 2025, details the group’s tactics, techniques, and procedures (TTPs), highlighting their evolving strategies and ongoing focus on geopolitical objectives, particularly in relation to the war in Ukraine.

 A Prolific Threat Actor

Fancy Bear, also referred to by aliases such as APT28, Sofacy, Strontium, and Pawn Storm, is believed to be linked to Russia’s GRU (Main Intelligence Directorate), specifically units 26165 and 74455. The group has a long history of high-profile cyberattacks, including attempts to influence elections in the United States, France, and Germany.

Notably, Fancy Bear was implicated in the 2016 Democratic National Committee (DNC) hack, which aimed to disrupt the U.S. presidential election through the theft and dissemination of sensitive communications.

Their operations span multiple sectors, including aerospace, defence, energy, media, and critical infrastructure, targeting countries such as Afghanistan, Brazil, France, Germany, Ukraine, and the United States.

Sophisticated Tactics & Techniques

Fancy Bear’s TTPs align with the MITRE ATT&CK framework, showcasing their advanced capabilities. Their primary method of initial access is spear-phishing, using highly tailored emails with malicious attachments or links to spoofed login pages. These phishing campaigns often mimic legitimate sources, such as Ukrainian news outlets or government documents, to increase their effectiveness.

The group also exploits vulnerabilities in public-facing applications, such as webmail platforms like Roundcube and Zimbra, to execute malicious code. Additionally, Fancy Bear employs widespread password-spraying attacks, leveraging Kubernetes clusters to conduct brute-force attacks on weak passwords, particularly targeting Microsoft cloud services.

Malware Arsenal & Exploitation

Fancy Bear’s malware portfolio is extensive, including tools like Zebrocy, Sofacy, X-Agent, CHOPSTICK, Drovorub, and GooseEgg. These are often deployed to steal sensitive data, maintain persistent network access, and facilitate lateral movement. A notable recent campaign involved the exploitation of a Microsoft Outlook vulnerability (CVE-2023-23397) to steal NTLM hashes, enabling further network compromise. The group has also targeted the Windows Print Spooler service, deploying the GooseEgg malware to gain elevated privileges on systems, particularly those in governmental organisations, NGOs, and the education and transportation sectors across Ukraine, Western Europe, and North America.

Geopolitical Objectives & Disinformation

The group’s primary motivation remains intelligence gathering to support Russian geopolitical interests, with a particular focus on the ongoing war in Ukraine. Fancy Bear has targeted Ukrainian officials and military suppliers to gain insights into supply chains and broader conflict-related intelligence. Beyond espionage, the group is known for creating online personas, such as Guccifer 2.0 and Fancy Bears’ Hack Team, to disseminate stolen information and sow disinformation.

These efforts aim to deflect blame and manipulate public perception, aligning with Russia’s broader political agenda.

Recent Campaigns & Global Impact

Recent operations show Fancy Bear’s continued focus on Ukraine and Western entities supporting it. In 2025, the group intensified attacks on logistics and IT firms aiding Ukraine, using spear-phishing, credential-guessing, and exploits against Microsoft Exchange vulnerabilities.

A joint advisory from 21 intelligence agencies across 11 nations, including the UK and U.S., highlighted these attacks, noting Fancy Bear’s compromise of private IP cameras at border crossings and military installations to monitor material movements. Additionally, the group’s use of the Authentic Antics malware to target Microsoft 365 Outlook for credential theft underscores their evolving toolkit.

Defensive Measures & Recommendations

Cyfirma's report emphasises the need for robust cybersecurity measures to counter Fancy Bear’s threats. Organisations should prioritise endpoint detection and response (EDR), security information and event management (SIEM), and security orchestration, automation, and response (SOAR) systems. Regular patching, multi-factor authentication, and employee training to recognise phishing attempts are critical. The report also advocates for attack surface management and unified threat management strategies to mitigate risks from Fancy Bear’s sophisticated campaigns.

A Persistent Global Threat

Fancy Bear remains one of Russia’s most prolific cyber threats, with a track record of high-impact attacks and an ever-evolving arsenal.

As geopolitical tensions, particularly around Ukraine, continue to drive their operations, organisations worldwide must remain vigilant. Cyfirma’s insights emphasise the importance of proactive defence strategies to safeguard against this formidable adversary.

Cyfirma   |   Jeffrey Sam / Researchgate  |       Dark Reading  |   Forbes  |   CFR  |  Hunt & Hackett 

Image: Ideogram

You Might Also Read: 

The Impact Of Geopolitical Dynamics On The Evolving Cybersecurity Landscape:


If you like this website and use the comprehensive 8,000-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Major Data Breach Exposes Five Million Jobseekers
The Problem With Quantum »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Information Commissioner's Office (ICO) - UK

Information Commissioner's Office (ICO) - UK

The Information Commissioner's Office is an independent authority set up to uphold information rights in the public interest.

First National Technology Solutions (FNTS)

First National Technology Solutions (FNTS)

First National Technology Solutions is a leading provider of flexible, customized hosted and remote managed services including IT security and compliance.

AppSec Labs

AppSec Labs

AppSec Labs specialise in application security. Our mission is to raise awareness in the software development world to the importance of integrating software security across the development lifecycle.

Telecommunications Industry Association (TIA)

Telecommunications Industry Association (TIA)

TIA works to secure trust in networks by advocating public policy positions on the security of ICT equipment and services related to critical infrastructure, supply chain and information sharing.

VU Security

VU Security

VU is a specialist in Cybersecurity software development with a focus on the prevention of fraud and identity theft.

Appvisory

Appvisory

Appvisory by MediaTest Digital is the leading Mobile Application Management-Software in Europe and enables enterprises to work secure on smartphones and tablets.

Metro Systems

Metro Systems

Metro Systems offer fully integrated IT solutions & services covering Digital Transformation, Digital Infrastructure, Cyber Security and Training.

Sonda

Sonda

SONDA is the leading systems integrator and IT service provider in Latin America.

RIGCERT

RIGCERT

RIGCERT provides training, audit and certification services for multiple fields including Information Security.

Arkphire

Arkphire

Arkphire provide solutions across every aspect of IT to help your business perform better.

KSOC Labs

KSOC Labs

KSOC is an event-driven SaaS platform built to automatically remediate Kubernetes security risks.

Focus Digitech

Focus Digitech

Focus Digitech helps you with your digital transformation journey with our main core offerings of Cloud, Cybersecurity, Analytics and DevOps.

V3 Cybersecurity

V3 Cybersecurity

V3 Cybersecurity is a unique company focused on contextualization of security programs from a business perspective. Our mission is to provide enterprise IT Risk Management capabilities.

InfoSecTrain

InfoSecTrain

InfoSecTrain are a leading training and consulting organization dedicated to providing top-tier IT security training and information security services to organizations and individuals across the globe

Bearer

Bearer

Bearer helps modern teams ship trustworthy products with the help of our code security solution built for security, privacy and engineering teams.

Quantum Flagship

Quantum Flagship

Quantum Flagship's goal is to consolidate and expand European scientific leadership and excellence in the research area of quantum technology.