APT28 Targets Users via Phishing Campaign

Overview of the APT28 Phishing Campaign

APT28 has launched a long-running credential phishing campaign targeting users. The campaign specifically focuses on users of UKR-net, a popular webmail and news service. Since mid-2024, the activity has continued steadily without major disruption. Therefore, the operation reflects a sustained and deliberate effort.

Security researchers observed this activity between June 2024 and April 2025. The campaign builds on earlier attacks identified in early 2024. Those earlier efforts targeted European networks using malware and phishing pages. As a result, the current activity represents an evolution rather than a new strategy.

Background of the Threat Actor

APT28 operates under several known aliases across the cybersecurity community. Analysts assess the group as state-sponsored and highly experienced. Therefore, its operations often align with long-term intelligence goals. The group has conducted espionage campaigns for nearly two decades.

Historically, APT28 has focused on credential theft. These stolen credentials often support intelligence collection and surveillance. Consequently, phishing remains a core tactic for the group. This consistency makes attribution and intent clearer.

How the Phishing Attacks Work

The attackers use fake UKR-net login pages to steal credentials. These pages closely resemble the legitimate service interface. Therefore, victims often fail to detect the deception. The pages also request two-factor authentication codes.

The phishing links arrive inside PDF documents sent through email. However, the emails appear legitimate and non-threatening. Attackers shorten the links using public URL services. As a result, users cannot easily preview the destination.

Multi-Layer Redirection Techniques

In some cases, attackers add extra redirection layers. For example, they host links on trusted blogging platforms. These links then redirect victims to the final phishing page. Therefore, security filters struggle to block the traffic.

The attackers also rely on free hosting services. This approach allows quick setup and removal of phishing infrastructure. Consequently, defenders face difficulty tracking long-lived indicators. The campaign benefits from constant infrastructure changes.

Shift in Infrastructure and Tactics

Previously, the group relied on compromised routers to relay stolen data. However, the attackers have changed tactics. They now use proxy tunneling services to capture credentials. Therefore, the infrastructure blends into legitimate traffic.

This shift likely responds to earlier infrastructure takedowns. Western-led disruptions forced the group to adapt quickly. As a result, the attackers increased their operational flexibility. The campaign continues despite defensive pressure.

Strategic Intent Behind the Campaign

Although researchers did not identify specific victims, the intent appears clear. The group historically targets sensitive information holders. Therefore, Ukrainian users likely represent intelligence value. Stolen credentials may enable broader access.

The campaign aligns with long-term intelligence priorities. It also coincides with ongoing geopolitical conflict. Consequently, credential theft supports strategic objectives beyond simple account access.

Broader Implications for Email Security

This campaign highlights ongoing risks to email users. Even familiar services can become attack vectors. Therefore, trust alone cannot ensure safety. Attackers increasingly exploit user habits.

Phishing techniques continue to evolve. They now include document-based delivery and layered redirection. As a result, detection requires more advanced monitoring. Simple filtering often proves insufficient.

How to Prevent Credential Phishing Attacks

Users should remain cautious with email attachments and login requests. However, organizational defenses play a critical role. Email threat detection systems can analyze document behavior and link redirection patterns. Therefore, attacks can be blocked before reaching users.

Security teams can also deploy identity monitoring and access anomaly detection. These solutions identify suspicious login attempts and credential misuse. By combining email protection with continuous authentication monitoring, organizations can significantly reduce phishing impact.

Sleep well, we got you covered.

Scroll to Top