National Cyber Warfare Foundation (NCWF)

Who is Fancy Bear (APT28) and What Do They Do?


0 user ratings
2025-07-24 12:35:10
milo
Red Team (CNA)

Welcome back, aspiring cyberwarriors! Understanding Advanced Persistent Threats (APTs) is essential for anyone working in cybersecurity, as they represent some of the most sophisticated and stealthy attacks in the digital world. Among these threats, APT28—also known as Fancy Bear, Sednit, or Sofacy—stands out as one of the most skilled and persistent hacking groups in the […]


The post Who is Fancy Bear (APT28) and What Do They Do? first appeared on Hackers Arise.



Welcome back, aspiring cyberwarriors!





Understanding Advanced Persistent Threats (APTs) is essential for anyone working in cybersecurity, as they represent some of the most sophisticated and stealthy attacks in the digital world.





Among these threats, APT28—also known as Fancy Bear, Sednit, or Sofacy—stands out as one of the most skilled and persistent hacking groups in the world. Whether you’re defending against real-world attacks or testing your systems against red team simulations, understanding how APT28 operates is key.





In this article, you’ll learn about APT28’s methods, objectives, and the techniques they use to infiltrate networks, maintain access, escalate privileges, move laterally and exfiltrate data.





Who is APT28?









APT28 is a prominent Russian cyber espionage group linked to the military intelligence agency the GRU. Active since at least 2004, this group focuses on gathering intelligence and executing cyber operations that align with the Russian government’s strategic interests. Their specific military unit, GRU Unit 26165, is tasked with carrying out these operations. Fancy Bear is classified as an advanced persistent threat (APT), which means it employs sophisticated methods to infiltrate its targets. It uses a mix of tactics, including zero-day exploits, spear-phishing, and custom malware, to gain unauthorised access to sensitive information.





Since at least 2004, APT28 has set its sights on government, military, and security organizations, particularly those in NATO-aligned countries and the Transcaucasian region.





Motivations





APT28’s motivations are complex but primarily revolve around cyber espionage. Their main objective is to collect sensitive information that supports Russia’s strategic interests. This includes tracking military developments, political activities, and public opinion in targeted countries.





Beyond intelligence gathering, APT28 also seeks to create disruption and influence political outcomes. Their involvement in the 2016 U.S. presidential election demonstrated how cyberoperations can be used to undermine democratic processes and sow distrust.





APT28’s Hack Timeline





Known for their cunning and sophisticated methods, APT28 has executed a series of high-profile cyber operations. Let’s take a closer look at some of them.





YearNotable APT28 Activity & TargetsDescription & Techniques
2004-2007Earliest suspected activityBased on malware compile times, APT28 likely began operations targeting Georgian political and military entities, intelligence gathering.
2008Cyber espionage against Georgian Ministry of DefenseSpear-phishing, customized malware payloads targeting Georgian government infrastructure.
2014High-profile infiltrations of NATO, EU agencies, German Parliament, Ukrainian militaryUse of zero-day exploits (Windows, Adobe Flash), spear-phishing with malicious Word documents, and credential harvesting.
2015Democratic National Committee (DNC) hack and influence operations during U.S. presidential electionComplex phishing campaigns with weaponized Office documents; deployment of X-Agent malware; covert data exfiltration aligned with Moscow time zones.
2016Olympic doping disclosures targeting World Anti-Doping Agency (WADA) and International Olympic Committee (IOC)“Fancy Bears Hack Team” persona leaked stolen emails as retaliation for Russian athlete bans. Likely initial access by phishing.
2017Expansion to hospitality sector and new spear-phishing campaigns across EuropeUse of DDE (Dynamic Data Exchange) techniques in phishing docs; targeting New York through thematic lures; rapid malware redeployment (e.g., Seduploader).
2018Ongoing targeting of French ministries, regional governments, Olympic-related IT contractorsContinued enhanced spear-phishing campaigns; exploitation of vulnerabilities in publicly facing webmail and VPN infrastructure.
2021Intensification of pan-European spear-phishing against ministries, defense industries, and critical infrastructureAdoption of stealthy, non-persistent malware like HeadLace and zero-day exploits (e.g., CVE-2023-23397 in Microsoft Outlook) to harvest NTLM hashes and facilitate privilege escalation.
2023-2025Active cyber-espionage against European military support organizations, energy firms, and research institutionsUse of multi-vector zero-days, webmail zero-days, OAuth token theft, custom malware (X-Agent variants) with encrypted C2 tunnels (X-Tunnel); sophisticated persistence with rootkits and living-off-the-land tools; near real-time adaptive malware recompilation and redeployment to evade detection.





Countries Targeted by APT28 (Fancy Bear) – Updated Through 2022 (Brandefense)




Initial Access Techniques Used by APT28





APT28’s initial access methods form the foundation of their long-term, stealthy intrusions. Here’s a breakdown of their main tactics:





1. Spear-Phishing





APT28’s hallmark tactic is highly personalized spear-phishing, crafted using detailed reconnaissance. They leverage OSINT, social media, breached credentials, and prior compromises to profile targets and tailor phishing emails to their roles and interests.






  • Malicious Attachments: Typically weaponized Microsoft Office files (Word, Excel, PowerPoint) embedded with zero-day or known vulnerabilities (e.g., CVE-2023-23397, CVE-2021-40444). These documents exploit macros, ActiveX, or template injection to silently execute malicious code.






Example document and parts of the deobfuscated macro code (Provided by CERT-UA)





  • Embedded Macros and Scripts: Upon execution, these scripts deliver payloads such as Sofacy, X-Agent, or other custom malware.




  • Malicious Links: Some emails use links instead of attachments, directing users to spoofed SSO (Single Sign-On) or webmail portals. These either harvest credentials or exploit browser vulnerabilities to deploy drive-by malware.





2. Credential Harvesting





APT28 has leveraged stolen valid credentials for initial access to European political entities, enabling them to gain access to networks effectively. Using credentials obtained from phishing attacks and the dark web, they targeted various government agencies and political organisations through stealthy measures.





3. Zero-Day Exploits





APT28 has demonstrated a strong capability to leverage zero-day vulnerabilities to maximise its effectiveness in cyber attacks. For example:





CVE-2015-3043:
APT28 exploited this Adobe Flash Player vulnerability, a buffer overflow that allows remote code execution. When victims visit a malicious website, the Flash exploit executes shellcode that downloads and installs additional malware.





CVE-2015-1701:
After gaining initial access via the Flash exploit, APT28 uses this unpatched local privilege escalation vulnerability in the Windows kernel. It enables them to elevate privileges to the System level, granting full control over the compromised device.





4. Exploitation of Public Facing Applications





Though spear-phishing dominates, APT28 opportunistically exploits externally facing services when the opportunity arises:






  • VPN and Webmail Infrastructure: They have targeted vulnerabilities and misconfigurations in popular webmail applications (e.g., Roundcube, MDaemon) and VPN appliances to gain initial system entry.




  • Router and Network Device Exploits: Weak SNMP community strings, default credentials, or unpatched vulnerabilities in perimeter devices have been leveraged to pivot inside networks.





Persistence Techniques of APT28





APT28’s persistence techniques reveal why they are so difficult to evict once inside a network. Their goal is to maintain long-term, stealthy footholds that survive reboots, antivirus cleans, and incident response efforts, all while avoiding detection.





At the core of APT28’s persistence are their custom malware families—notably Sofacy (Sednit), X-Agent, and the newer BEARDSHELL and COVENANT toolkits.






  • Dropper and Loader Modules: These initial components install the full malware payload and use advanced obfuscation to avoid AV detection. They typically write themselves into well-known autorun locations, ensuring execution on system startup.






Persistence Mechanism Example for the BEARDSHELL Backdoor Loader
(Provided by CERT-UA)





  • Registry Modifications:APT28 implants frequently modify Windows Registry autorun keys (such as HKCU\Software\Microsoft\Windows\CurrentVersion\Run) to auto-launch payload DLLs or scripts on user login or file explorer startup.




  • Scheduled Tasks:They create scheduled tasks that execute malicious payloads regularly, providing resilience even if some components are removed.




  • Rootkit and Bootkit Techniques:Notably, APT28 has deployed UEFI rootkits like LoJax, a firmware-level implant ensuring malware persists even after OS reinstall or disk wipe. This is one of the few publicly disclosed uses of firmware rootkits in cyber espionage, showing their sophistication.




  • Living-off-the-Land Binaries (LOLBins):To minimize detection, APT28 leverages legitimate Windows tools (PowerShell, WMI, rundll32.exe) to perform persistence actions and execute code, blending in with normal system behavior.





Privilege Escalation Techniques of APT28





Once an APT is inside the network, the next logical step is to elevate their privileges to gain deeper control over the system. APT28, like many advanced threat actors, often leverages system misconfigurations to escalate privileges.





Weak Service Permissions





Weak service permissions represent a critical misconfiguration that APT28 often exploits. When a service is configured with overly permissive access controls, attackers can modify its settings to point to their own malicious binaries. This enables them to control the service’s behavior—such as when it starts or stops—and ensures their malware runs with elevated privileges.





Such vulnerabilities typically arise when services aren’t properly secured or when default permissions are left unchanged during deployment. Without strict access controls, adversaries can leverage these weaknesses to establish persistence and maintain control within a compromised system.





Unquoted Service Paths





Unquoted service paths are a common misconfiguration that APT28 can exploit to gain elevated privileges. When a Windows service is configured with an unquoted path containing spaces, the system may misinterpret the path and execute the first matching executable it finds.





Attackers can take advantage of this by placing a malicious executable in a directory along the vulnerable path. If successful, their code will be executed with the same privileges as the service—often SYSTEM-level, giving them full control over the compromised machine.





Credential-Based Privilege Escalation





APT28 frequently achieves privilege escalation by stealing and abusing credentials across compromised environments. Their methods include:






  • Credential Dumping Tools: Tools like Mimikatz and custom variants are used to extract plaintext passwords, hashes, and authentication tokens from memory and local storage.




  • Pass-the-Hash / Pass-the-Ticket Attacks: By leveraging stolen NTLM hashes or Kerberos tickets, APT28 can impersonate privileged users and move laterally—without needing the actual plaintext passwords.




  • Password Spraying and Brute Force: APT28 exploits weak or reused credentials across the network through brute-force attempts and password spraying, often targeting administrator accounts.




  • Kerberos Token Manipulation: In some cases, APT28 has used PowerShell cmdlets to assign roles such as ApplicationImpersonation to compromised accounts—particularly within Exchange environments—to escalate privileges and maintain access.





Lateral Movement Techniques of APT28





Once threat actors gain elevated privileges within a target system, their next objective is often lateral movement – expanding their access to other systems within the network. To move between machines, APT28 exploits legitimate Windows administration tools and protocols including Remote Desktop Protocol (RDP), PsExec, Windows Management Instrumentation (WMI), and PowerShell remoting. This “living off the land” approach lets them execute code and transfer payloads without deploying new binaries, reducing their forensic footprint and bypassing many detection methods. They also utilize administrative network shares (like C$ and ADMIN$) to spread laterally by copying malware or creating scheduled tasks for persistent execution.





The group takes advantage of network misconfigurations and exploits vulnerabilities in remote services to jump across devices, including routers, VPN appliances, and third-party or partner networks—an “island hopping” strategy that extends their reach indirectly. For air-gapped or segmented environments, they leverage infected USB drives programmed to spread malware when connected, enabling lateral movement into isolated systems.





APT28 also layers their lateral pivots with advanced obfuscation: compromised machines serve as proxy nodes for traffic routing, and encrypted custom tunnels like X-Tunnel shield their communications even within segmented networks. They actively maintain redundant persistence by deploying multiple backdoors and re-infection mechanisms to restore access if detected and removed.





Collection and Data Exfiltration Techniques of APT28





APT28 is known for meticulously searching through compromised systems to collect valuable intelligence, such as emails, documents, credentials, and network configurations. They often target file shares, databases, and communications for critical data. Once the data is gathered, APT28 focuses on hiding the exfiltration process, using legitimate services and encrypted channels to avoid detection. APT28’s data collection and exfiltration techniques focus on gathering high-value information that can serve their long-term espionage goals.





APT28 employs several advanced tools to collect and exfiltrate sensitive data from targeted systems, focusing on stealth and efficiency. Here’s a breakdown of some of their key tools and how they use them:





CategoryTechnique / ToolPurposeEvasion / Obfuscation Strategy
Tunneling & C2 ChannelsX-Tunnel (custom encrypted C2 tunnel)Secure, encrypted data exfil and remote controlMimics SSL/HTTPS traffic, routes through proxies, operates at off-hours

Proxy chaining via infected intermediate hostsObfuscate source of communicationAdds hops to delay tracing; proxies may shift dynamically

Domain fronting using cloud CDN services (AWS, Azure, GCP)Hides C2 inside legitimate cloud trafficBlends with common cloud domains; bypasses domain-based firewalls
Modular MalwareX-Agent / CHOPSTICKCaptures keystrokes, screenshots, file systemsUses modular architecture; executes in-memory through process injection

Sofacy loaderStages dynamic payloads and collects local dataFrequently refreshed, packed, or encrypted to evade static detection
Data Packaging & StagingLocal staging (zip/compress)Organize & reduce footprint before extractionCompresses in temp folders, often mimics legit archive activity

Chunked transferReduce volume-based detectionSends data in small packets or bursts

Throttling exfil speedAvoids bandwidth anomaly detectionBlends with regular network noise; operates off-hours
Cloud-Based & App AbuseOAuth token theft (Microsoft 365, Google Workspace)Persistent cloud session access—bypass endpointAvoids local residence; sidesteps MFA and logs onto cloud remotely

Legit cloud services (Dropbox, OneDrive)Use as storage or relay for stolen filesHard to block; uses authorized services to stage or exfil files

Compromised Outlook Web Access (OWA)Access mailboxes and attachmentsUses legit webmail login portal, often without triggering alerts
Credential / Info TheftCredoMap stealerSteals browser session tokens, passwords, and cloud cookiesSends stolen data pre-encrypted via HTTPS or DNS tunneling

Keyloggers, clipboard stealers, screen capture modulesCollect sensitive inputs and visualsFileless versions used for stealth; avoids I/O-heavy footprints
Fileless / Stealth MethodsDLL injection & in-memory loadersRun exfil modules without leaving file tracesFileless execution limits forensic evidence

Abuse of PowerShell, WMI, certutil (LOLBins)Run payloads irregularlyExecutes via legit Windows tools—evades signature-based detection
Timing-Based StrategiesOff-hours data transfer (nights, weekends)Avoid human detection / alertsMatches low-traffic periods – reduces spike anomalies

Delayed or beacon-style C2Maintain low profile between activityResponds only after polling or triggers
Cleanup & Anti-ForensicsDeletes logs, temp files, malware traces post-exfilEliminate forensic evidenceScripting ensures removal after success, or on failover

Polymorphic packers / encryption layersEvade static detection and signature scansEach infection is uniquely configured (machine-bound payloads)




Summary





This group is a textbook example of a modern APT – patient, stealthy, and adaptive, with strong ties to nation-state goals, making them one of the most dangerous threats today.





To explore more on APT tactics, techniques, and procedures, consider becoming a Subscriber Pro — our premium 3-year program offering unlimited access to expert resources, tools, and exclusive content to support your continued growth in cybersecurity.





The post Who is Fancy Bear (APT28) and What Do They Do? first appeared on Hackers Arise.



Source: HackersArise
Source Link: https://hackers-arise.com/who-is-fancy-bear-apt28-and-what-do-they-do/


Comments
new comment
Nobody has commented yet. Will you be the first?
 
Forum
Red Team (CNA)



Copyright 2012 through 2025 - National Cyber Warfare Foundation - All rights reserved worldwide.