APT28 (Fancy Bear), the Russian state-sponsored threat actor linked to the GRU, has been conducting credential harvesting campaigns against organizations in Turkey, the Balkans, Middle East, and Central Asia using surprisingly simple techniques. Recorded Future’s Insikt Group observed the activity between February and September 2025.

Campaign overview

AttributeDetails
Threat actorAPT28 / Fancy Bear / BlueDelta
AttributionRussia’s GRU (Military Unit 26165)
Campaign periodFebruary - September 2025
DiscoveryRecorded Future Insikt Group
Target regionsTurkey, Balkans, Central Asia, Middle East
Target sectorsEnergy, nuclear, defense, government, academia
TechniqueCredential harvesting via phishing

Targets

RegionTarget organizations
TurkeyEnergy and nuclear research agency staff, renewable energy scientists
EuropeThink tank personnel
North MacedoniaGovernment-affiliated organizations, military
UzbekistanPolicy organizations, IT integrators

The targeting aligns with Russian intelligence priorities: energy infrastructure, defense policy, and regional political dynamics in areas of strategic interest.

Specific targeting observed

Target typeLure theme
Turkish scientistsClimate change, renewable energy
European researchersRegional policy analysis
North Macedonian militaryGovernment communications
Uzbek organizationsIT and policy

Attack chain

The campaign uses a multi-stage redirect to harvest credentials:

Stage 1: Phishing email

ElementDetails
LanguageNative language for each target region
ThemeMatched to victims’ professional interests
ContentContains shortened URL link
Sender spoofingAppears to come from relevant organizations

Stage 2: Redirect chain

StepAction
1Victim clicks shortened URL
2Redirects to webhook[.]site
3Displays legitimate decoy PDF for ~2 seconds
4Captures beacon data (IP, browser, timestamp)
5Redirects to credential harvesting page

Stage 3: Credential theft

ElementDetails
Page typeSpoofed Microsoft Outlook Web Access (OWA) login
CaptureUsername, password, and victim identifiers
Post-theftRedirects to legitimate site (avoids suspicion)
Data exfiltrationCredentials sent to attacker webhooks

Legitimate documents as lures

APT28 borrowed legitimacy by using real documents from credible sources:

Lure DocumentSourceTarget audience
Climate change policy briefGulf Research CenterTurkish renewable energy scientists
Regional policy analysisECCO (European Climate Foundation)European policy researchers
Government communicationsVariousNorth Macedonian officials

Using authentic documents from recognized think tanks increases victim trust and reduces suspicion. Attackers don’t create fake content—they use real, publicly available PDFs.

Infrastructure

APT28 relied on free and disposable services to minimize costs and complicate attribution:

ServicePurposeCost
Webhook[.]siteRedirect hosting, data exfiltrationFree
InfinityFreePhishing page hostingFree
Byet Internet ServicesCredential harvesting infrastructureFree
ngrokTunneling for phishing pagesFree tier

Infrastructure indicators

Recorded Future collected over a dozen phishing pages hosted on these services. The JavaScript on these pages:

FunctionPurpose
Capture credentialsUsername and password harvest
Record victim identifiersAttribution and targeting data
Send beacons to webhooksReal-time data exfiltration
Redirect to legitimate sitesAvoid victim suspicion

“BlueDelta’s consistent abuse of legitimate internet service infrastructure demonstrates the group’s continued reliance on disposable services to host and relay credential data.”

Why simple works

The campaign demonstrates that sophisticated technical capabilities aren’t necessary when social engineering succeeds:

FactorBenefit
Relevant contentDocuments match targets’ professional interests
Borrowed legitimacyReal PDFs from credible sources
Native languageEmails in targets’ languages increase trust
Minimal infrastructureFree services reduce operational costs
Clean redirectsPost-theft redirect to legitimate sites avoids detection
Professional themesVictims expect policy documents

Recorded Future characterized credential harvesting as “a low-cost, high-yield method of collecting information that supports Russian intelligence objectives.”

Attribution

APT28 is attributed to Russia’s GRU (Main Intelligence Directorate), specifically:

UnitRole
Military Unit 26165Primary attribution
85th Main Special Service Center (GTsSS)GRU cyber operations

Tracking names

TrackerName
CERT-UAUAC-0001
Recorded FutureBlueDelta
Industry standardFancy Bear
Alternative namesPawn Storm, Sofacy, Sednit
MicrosoftSTRONTIUM, Forest Blizzard
CrowdStrikeFancy Bear

The group has been active since at least 2004 and gained notoriety for attacks against Ukraine, US and European elections, and organizations involved in the Olympics.

Historical context

APT28’s current credential harvesting continues a long pattern of targeting:

Target categoryExamples
Political targetsGovernment officials, diplomats, political parties
Defense sectorContractors, military personnel, defense ministries
EnergyUtilities, nuclear research, renewable energy
MediaJournalists covering Russia, Eastern Europe
ResearchThink tanks, academic institutions
SportsOlympic officials, anti-doping agencies

Notable APT28 operations

YearOperationTarget
2015-2016US election interferenceDNC, political campaigns
2016WADA hackAnti-doping agency
2017Macron campaignFrench presidential election
2018Olympic targetingWinter Olympics organizations
2022-presentUkraine operationsGovernment, military, infrastructure
2025This campaignEnergy, defense, policy

Recommendations

For targeted organizations

PriorityAction
CriticalSecurity awareness training—focus on targeted phishing, not generic scams
CriticalPhishing-resistant MFA—hardware keys or passkeys (SMS/TOTP codes can be phished)
HighEmail authentication—implement DMARC, DKIM, SPF
HighURL filtering—block or warn on free hosting services used for phishing
HighCredential monitoring—watch for leaked credentials on dark web
MediumDomain monitoring—detect lookalike domains early

Detection indicators

IndicatorMeaning
Redirects through webhook[.]siteAPT28 infrastructure
OWA login pages on InfinityFree or Byet domainsCredential harvesting
PDF downloads followed by credential entry promptsAttack chain in progress
ngrok tunnel connections from corporate networksSuspicious tunneling
Policy document lures matching professional interestsTargeted phishing

Network-level detection

DetectionMethod
Webhook.site connectionsDNS/proxy logging
InfinityFree/Byet hostingURL reputation
ngrok tunnelsTraffic analysis
Credential submission to unknown sitesForm monitoring

Recommendations for security teams

PriorityAction
HighImplement phishing-resistant MFA for all users
HighTrain high-value targets on APT phishing techniques
HighMonitor for credential exposure on dark web
MediumBlock free hosting services at proxy/firewall
MediumDeploy email link protection/sandboxing
OngoingTrack APT28 TTPs and indicators

Context

APT28’s continued reliance on basic credential harvesting—despite having sophisticated malware capabilities—reflects a pragmatic approach: why develop expensive exploits when phishing works?

The campaign demonstrates that state-sponsored actors don’t always use zero-days and custom malware. Simple, low-cost techniques remain effective against organizations without adequate security awareness training and phishing-resistant authentication.

Organizations in energy, defense, and policy sectors should assume they are targets and implement defenses accordingly. The simplicity of these attacks means any organization can be targeted without significant attacker investment.

For defenders, the lesson is clear: stop credentials from being useful to attackers through phishing-resistant MFA, and train users to recognize targeted phishing that uses legitimate content as lures.