Fancy Bears Get Busy

The notorious Russian cyber-espionage gang known as Fancy Bear, also known as APT28, has increased its attacks against governments and military entities worldwide using new sophisticated cyber tools and technology. 

Fancy Bear is perhaps best known in the United States for its hack and leak of Democratic National Committee emails in the lead-up to the 2016 presidential election.

Now, eleven Western countries have accused the hacking group of targeting defence, transport and tech firms involved in helping Ukraine.

British Foreign Secretary David Lammy said the UK's National Cyber Security Centre had discovered a sophisticated digital espionage tool used to harvest login credentials from online Microsoft products. He accused Russia of conducting a "sustained campaign of malicious cyber activity" targeting governments and institutions across Europe, and linked the activity to the UK's continued support of Ukraine.

Spies from Russia's military intelligence agency, the GRU, were "running a campaign to destabilise Europe", Lammy added.

New Zealand is the latest  to join in international condemnation of cyber attacks by the Russian government and has imposed sanctions on more than 1,800 entities and individuals under the Russia Sanctions Act 2022, including the Head of the GRU and its cyber warfare units 74455 and 26165, known as Sandworm and Fancy Bear.

Active since 2007/8, this state-sponsored hacking gang has established itself as one of the most persistent and dangerous cyber adversaries, with a documented history of targeting high-value organisations across multiple continents including the United States, Ukraine, Germany, and France.

Since the beginning of the Russia-Ukraine war, the unit has increasingly turned its focus to collecting political and wartime intelligence from the conflict and using it. Recent intelligence indicates that Fancy Bear has significantly expanded its tactical capabilities, particularly focusing on entities connected to the Ukrainian conflict and Western logistics companies providing military support.

Fancy Bear has been developing its malware and attack methodologies to avoid detection, while maintaining access to critical infrastructure and sensitive government communications.

In a recent report from Cyfirma, analysts focused on the group’s latest campaign hitting Ukrainian government and military suppliers through highly sophisticated spear-phishing operations. These attacks leverage cross-site scripting vulnerabilities in widely-used webmail platforms including Roundcube, Horde, MDaemon, and Zimbra, allowing the attackers to deploy custom JavaScript malware payloads capable of exfiltrating sensitive data such as email messages, address books, and login credentials.

The group’s recent exploitation of CVE-2023-23397, CVE-2023-38831, and CVE-2023-20085 demonstrates their rapid adaptation to newly discovered vulnerabilities.

Their attack chains often begin with weaponised documents containing malicious macros that downgrade security settings and establish persistent backdoor access through malware families including HATVIBE and CHERRYSPY.  

Web-based email services are one of Fancy Bear's preferred targets. A typical compromise will consist of web-based email users receiving an email urgently requesting that they change their passwords to avoid being hacked. The email will contain a link to a spoof website that is designed to mimic a real webmail interface, users will attempt to login and their credentials will be stolen.

Fancy Bear’s attack work continues to evolvee and includes sophisticated anti-analysis techniques and data collection capabilities.

Cyfirma  |   Politico  |   Crowdstrike  |   Cybersecurity News  |  RNZ  |   Cyberscoop  |   Wikipedia

Image: Ideogram

You Might Also Read: 

Russia’s Nation-State Hackers: A Serious Threat To Global Security [extract]:


If you like this website and use the comprehensive 7,000-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible




 

« The New Face Of Phishing
Serious Security Problems With Microsoft’s SharePoint Servers »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Tevora

Tevora

Tevora is a specialized management consultancy focused on cyber security, risk, and compliance services.

Ksmartech

Ksmartech

Ksmartech provide services related to security and authentication in all areas where the connection of people to objects, and objects and objects is necessary.

BeyondTrust

BeyondTrust

BeyondTrust is a leader in Privileged Access Management, offering a seamless approach to preventing data breaches related to stolen credentials, misused privileges, and compromised remote access.

Cyber Pop-Up

Cyber Pop-Up

Cyber Pop-Up provide on-demand access to top security experts. No recruiting. No onboarding. No overhead costs.

689cloud

689cloud

689Cloud is a cloud content collaboration platform that allows users to protect, track, and control files AFTER they have been shared.

RevBits

RevBits

RevBits provides high-performance cybersecurity solutions including email security, endpoint security, deception technology and PAM solution to enterprise companies and public sector organizations.

Belcan

Belcan

Belcan is a global supplier of engineering, manufacturing & supply chain, workforce and government IT solutions to customers in the aerospace, defense, automotive, industrial, and private sector.

Infiot

Infiot

Infiot is a pioneer in enabling secure, reliable access with zero trust security, network optimization, edge-intelligence and AI driven operations for all remote users, devices, sites and cloud.

Splashtop

Splashtop

Splashtop’s cloud-based, secure, and easily managed remote access solution is increasingly replacing legacy approaches such as virtual private networks.

Gem Security

Gem Security

Gem is on a mission to help security operations evolve into the cloud era, and stop cloud threats before they become incidents.

PyNet Labs

PyNet Labs

PyNet Labs is a Training Company serving corporates as well as individuals across the world with ever-changing IT and technology training.

Invisily

Invisily

Invisily makes enterprise and cloud computing resources invisible to attackers with zero trust solutions, making them visible only when needed to only those who need them.

OrbiSky Systems

OrbiSky Systems

OrbiSky Systems is a British tech startup specializing in data management and cybersecurity solutions.

Longbow Security

Longbow Security

Longbow automates root cause for your application and cloud risks, enabling teams with intelligent remediation actions that reduce the most risk with the least effort.

SafeShark

SafeShark

SafeShark are Product Security and Telecommunications Infrastructure (PTSI) Act and Radio Equipment Directive (RED) compliance specialists.

Maze

Maze

At Maze, we’re dedicated to changing how security teams understand and act on vulnerabilities — especially in cloud and application environments.