Close Menu
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    • Blogging
    • SEO & Digital Marketing
    • WiFi / Internet & Networking
    • Cybersecurity
    • Tech Tools & Mobile / Apps
    • Privacy & Online Earning
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    Home»Cybersecurity»Russia’s ‘Fancy Bear’ APT Continues Its Global Onslaught
    Cybersecurity

    Russia’s ‘Fancy Bear’ APT Continues Its Global Onslaught

    adminBy adminApril 11, 2026No Comments6 Mins Read
    Facebook Twitter LinkedIn Telegram Pinterest Tumblr Reddit WhatsApp Email
    Russia's 'Fancy Bear' APT Continues Its Global Onslaught
    Share
    Facebook Twitter LinkedIn Pinterest Email

    New research from Trend Micro highlights the immense reach of Fancy Bear, also known as APT28 and Forest Blizzard.

    Fancy Bear is a cyber-espionage group believed to be operating at the behest of Russian military intelligence. The group has been operating since the mid-2000s, targeting a wide range of governments and organizations in line with Russian geopolitical interests. Fancy Bear has previously been accused of destructive attacks against Ukrainian critical infrastructure as well as other foreign government targets. It was also attributed to US election interference in 2016. 

    The group is known for tried-and-true initial access campaigns involving social engineering and phishing as well as sophisticated credential theft campaigns involving critical vulnerabilities, including zero-days. 

    Trend Micro published two pieces of research relating to the threat group in recent weeks. On March 26, the security vendor said the actor (which it refers to as Pawn Storm), has been using a collection of malware components known as “Prismex” to target the defense supply-chain of Ukraine and its allies including the Czech Republic, Poland, Romania, Slovakia, Slovenia, and Turkey.

    Related:FINRA Launches Financial Intelligence Fusion Center to Combat Cybersecurity and Fraud Threats

    The security vendor followed this up with another blog post on April 3, dedicated to Pawn Storm’s use of NTLMv2 hash relay attacks through different methods against a wide range of global targets between April 2022 and November 2023. In these attacks, Pawn Storm intercepted and forwarded authentication credentials between a target system and the victim in order to capture a login without needing the user’s exact password. 

    Between these campaigns and APT28’s alleged router attacks reported by governments around the world, APT28’s influence remains unmistakable. While many threat clusters come and go — or at least morph — Fancy Bear has remained relevant over the past 10 years.

    Two Fancy Bear Campaigns

    Prismex leverages multiple Windows vulnerabilities, Trend Micro said in its late March blog post, including “a confirmed Windows zero-day” in CVE-2026-21513 as well as Microsoft Office bug CVE-2026-21509. The campaign described in the blog went at least as far back as September 2025 but picked up steam in January of this year. 

    “Prismex combines advanced steganography, component object model (COM) hijacking, and legitimate cloud service abuse for command and control,” the blog read. The special malware includes both espionage and sabotage capabilities, with the latter including wiper commands. This matches the more recent MO of APT28, which has included both espionage and more destructive threat activity. 

    Related:Russia’s Forest Blizzard Nabs Rafts of Logins via SOHO Routers

    Both espionage and potential sabotage functionality were observed, including wiper commands. 

    Then there’s the NTLMv2 hash relay attacks. For these, APT28 leveraged critical (patched) Outlook vulnerability CVE-2023-23397. The attacker would send a malicious calendar invite via a .msg file, which would trigger the vulnerable API endpoint. “When the victim connects to the attacker’s SMB server, the connection to the remote server sends the user’s NTLM protocol negotiation message containing the user’s Net-NTLMv2 hash, which the attacker can use for authentication against other systems that support NTLM authentication,” Trend Micro said. 

    Later in 2023, APT28 engaged in credential-targeting phishing campaigns against European government entities. It has also been observed engaging in other spear-phishing and brute force credential attacks. To anonymize itself, APT28 leveraged VPNs, Tor, data center IP addresses, and compromised EdgeOS routers. 

    Feike Hacquebord, principal threat researcher at TrendAI, tells Dark Reading that although the research is based on findings from 2024, what is relevant to defenders today is that Pawn Storm’s old methodologies remain effective today. The DNS hijacking network technique, for example, is more than 20 years old.

    Related:Storm-1175 Deploys Medusa Ransomware at ‘High Velocity’

    “It tells us that Pawn Storm doesn’t shy away from old techniques when they are still effective,” Hacquebord says. “Another lesson here is that Pawn Storm targets not only high-profile entities like NATO and the ministries of defense of Western countries but also targets that might be perceived as smaller fish, such as local governments, governments of developing countries, or even smaller companies.”

    On the heels of these two research reports, the FBI on Tuesday warned that Russia’s GRU, via Fancy Bear, has been exploiting routers to steal credentials from organizations worldwide. The agency singled out TP-Link routers compromised via CVE-2023-50224. Since at least 2024, GRU actors changed device settings to introduce attacker-controlled DNS resolvers and set up adversary-in-the-middle attacks against encrypted traffic if users navigated through a certificate error warning.

    As part of this warning, the FBI said that in tandem with the US Department of Justice, it “recently disrupted a GRU network of compromised small-office home-office (SOHO) routers used to facilitate malicious DNS hijacking operations.”

    The UK’s National Cyber Security Centre (NCSC) and other global partners shared similar warnings.

    How Can a Defender Keep Up?

    Some targets in these campaigns included European and South American military, defense industry organizations around the world including North America, energy sector organizations, and other critical global orgs. 

    “Although Pawn Storm has been active for two decades, it still retains its aggressiveness and determination to break into the networks and emails of high-profile targets around the world,” Trend Micro’s blog post read.

    The big question then is, how is a defender supposed to get ahead? Whether they’re a small organization or even a reasonably resourced government, it’s hard to match a 20-year APT leveraging the full weight of the GRU.

    Denis Calderone, CTO and principal of Suzu Labs, tells Dark Reading that such a question assumes one has to match APT28’s level of sophistication, and the answer is, he says, “You don’t.” It’s worth remembering that much of the actor’s sophistication lies in what happens post-initial access, Calderone adds. Before that, it’s much of the same trickery security professionals see from anyone: phishing emails, ClickFix prompts, exploiting weak credentials, and so on. He advises  focusing on the basics.

    Multifactor authentication “stops password spraying. Patching [Microsoft] Office stops CVE-2026-21509. Updating router firmware and changing default credentials stops FrostArmada. Training users that a real CAPTCHA never asks you to open system tools stops ClickFix.” Calderone says. “Those are all achievable at any budget. The honest caveat is that if those basics fail and APT28 gets inside, a small org without dedicated security operations is going to have a very hard time catching them. That’s where managed detection services or sector-specific ISACs become critical.”

    Vishal Agarwal, chief technology officer (CTO) of Averlon, says that even if a threat actor like Fancy Bear gets in, zero trust, least-privilege access, strong identity controls, and just-in-time access can limit how far and fast an attacker can move. 

    Echoing Calderone, Seemant Sehgal, founder and CEO of BreachLock, argued in favor of denying Fancy Bear the easy wins. 

    “Fancy Bear’s success isn’t magic; it’s built on exploiting exposed services, weak identity controls, and gaps that most organizations already know exist,” Sehgal says. “The organizations that hold up best aren’t necessarily the biggest or the best funded, but rather those that continuously reduce attack surface, enforce strong identity, and most importantly, wake up every morning assuming they’re already a target.”

    Don’t miss the latest Dark Reading Confidential podcast, Security Bosses Are All in on AI: Here’s Why, where Reddit CISO Frederick Lee and Omdia analyst Dave Gruber discuss AI and machine learning in the SOC, how successful deployments have (or haven’t) been, and what the future holds for AI security products. Listen now!

    APT Bear continues fancy Global Onslaught Russias
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email
    Previous ArticleWhat 400 Sites Reveal About Organic Traffic Gains
    Next Article US EV sales dropped in early 2026 for nearly everyone except Tesla
    admin
    • Website

    Related Posts

    n8n Webhooks Abused Since October 2025 to Deliver Malware via Phishing Emails

    April 15, 2026

    Broadcom introduces zero-trust runtime for scalable AI agents

    April 15, 2026

    FCC exempts Netgear from foreign router ban

    April 15, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Search Blog
    About
    About

    At WifiPortal.tech, we share simple, easy-to-follow guides on cybersecurity, online privacy, and digital opportunities. Our goal is to help everyday users browse safely, protect personal data, and explore smart ways to earn online. Whether you’re new to the digital world or looking to strengthen your online knowledge, our content is here to keep you informed and secure.

    Trending Blogs

    Walmart: Shopping & Savings 26.14 APK Download by Walmart

    April 15, 2026

    n8n Webhooks Abused Since October 2025 to Deliver Malware via Phishing Emails

    April 15, 2026

    Google rolls out worldwide agentic restaurant booking via AI Mode

    April 15, 2026

    Spotify, Bookshop expand to US, and ‘Page Match’ gets huge language support

    April 15, 2026
    Categories
    • Blogging (63)
    • Cybersecurity (1,333)
    • Privacy & Online Earning (168)
    • SEO & Digital Marketing (817)
    • Tech Tools & Mobile / Apps (1,595)
    • WiFi / Internet & Networking (224)

    Subscribe to Updates

    Stay updated with the latest tips on cybersecurity, online privacy, and digital opportunities straight to your inbox.

    WifiPortal.tech is a blogging platform focused on cybersecurity, online privacy, and digital opportunities. We share easy-to-follow guides, tips, and resources to help you stay safe online and explore new ways of working in the digital world.

    Our Picks

    Walmart: Shopping & Savings 26.14 APK Download by Walmart

    April 15, 2026

    n8n Webhooks Abused Since October 2025 to Deliver Malware via Phishing Emails

    April 15, 2026

    Google rolls out worldwide agentic restaurant booking via AI Mode

    April 15, 2026
    Most Popular
    • Walmart: Shopping & Savings 26.14 APK Download by Walmart
    • n8n Webhooks Abused Since October 2025 to Deliver Malware via Phishing Emails
    • Google rolls out worldwide agentic restaurant booking via AI Mode
    • Spotify, Bookshop expand to US, and ‘Page Match’ gets huge language support
    • Broadcom introduces zero-trust runtime for scalable AI agents
    • Large solar farms in the UAE may accidentally create rainstorms that could reshape how deserts manage water shortages
    • FCC exempts Netgear from foreign router ban
    • Google Is Replacing Dynamic Search Ads With AI Max
    © 2026 WifiPortal.tech. Designed by WifiPortal.tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer

    Type above and press Enter to search. Press Esc to cancel.