APT28 (Fancy Bear / Sofacy / Sednit / Forest Blizzard) – Threat Actor Profile

1. Executive Summary

APT28 is a long-running Russian state-aligned cyber espionage actor widely attributed to the GRU’s 85th Main Special Service Center (GTsSS), military unit 26165, active since at least 2004. (attack.mitre.org)
The group is assessed by multiple governments to conduct both intelligence collection and “hack-and-leak” influence activity, with sustained targeting of government, defence, logistics, media, and technology entities—particularly those connected to Ukraine and NATO interests. (GOV.UK)
Recent public reporting highlights continued operational focus on cloud identity compromise (credential theft, OAuth token theft, and password spraying), exploitation of known vulnerabilities, and living-off-the-land tradecraft to reduce detection. (microsoft.com)
Defenders should treat APT28 as a persistent, strategic threat capable of blending traditional endpoint compromise with cloud-native abuse (Microsoft 365/Exchange and webmail), frequently rotating infrastructure and leveraging legitimate services to mask activity.


2. Contextual Background

2.1 Nature of the threat

APT28 is commonly tracked under multiple vendor and community names (including Sofacy, Sednit, Pawn Storm, STRONTIUM/Forest Blizzard, and others). (attack.mitre.org)
MITRE ATT&CK attributes APT28 to the GRU’s unit 26165 and documents activity spanning credential theft, malware operations, and influence-linked intrusions. (attack.mitre.org)

2.2 Threat-actor attribution and confidence

Confidence: Confirmed (High).
Government and multi-agency reporting identify APT28/Unit 26165 as a GRU capability used for cyber espionage and hybrid operations, including documented sanctions/attributions and joint advisories. (GOV.UK)
The U.S. Department of Justice has publicly charged/indicted GRU officers for cyber operations linked to the 2016 U.S. election interference effort (often associated in CTI reporting with APT28/Unit 26165 activity). (Department of Justice)
France has also publicly attributed cyber activity to APT28 as a GRU-linked capability used against French interests since 2021, including entities linked to the 2024 Olympics, while additionally referencing operation from GRU Unit 20728 in some contexts—highlighting that “APT28” can be used as an operational label spanning multiple GRU elements in public discourse. (France Diplomacy)

2.3 Sector and geographic targeting

APT28’s targeting is consistently aligned to Russian military and foreign policy objectives—particularly Ukraine, European partners, NATO allies, and organisations supporting Ukrainian defence and logistics. (GOV.UK)
A May 2025 multi-agency advisory describes sustained targeting of Western logistics entities and technology companies involved in coordination and delivery of foreign assistance to Ukraine, including monitoring via compromised internet-connected cameras near border crossings and transport hubs.
ESET reporting on “Operation RoundPress” describes targets including Ukrainian government entities and defence companies in Eastern Europe, with additional observed targeting of governments in Africa, Europe, and South America. (ESET)


3. Technical Analysis

3.1 Core tradecraft and ATT&CK-aligned TTPs (high-level)

APT28 is repeatedly observed using a blend of:

  • Credential access and identity compromise: password spraying/brute force, phishing for credentials, mailbox permission abuse, and token theft.
  • Spearphishing and social engineering: malicious attachments/links and tailored lures; Unit 42 describes diplomat-focused lurecraft (e.g., “car for sale”) to deliver APT28-linked malware. (Unit 42)
  • Exploitation of vulnerabilities: leveraging known (and occasionally high-value) flaws for execution or privilege escalation, including Microsoft Outlook and Print Spooler exploitation described by Microsoft and Unit 42. (microsoft.com)
  • Living-off-the-land and stealth: use of built-in utilities and legitimate cloud APIs/services to reduce noisy C2 footprints.

MITRE’s APT28 entry provides extensive, technique-by-technique documentation across the lifecycle (initial access → persistence → credential access → exfiltration). (attack.mitre.org)

3.2 Initial access patterns

A) Password spraying / brute force (often at scale)
Microsoft describes Forest Blizzard (APT28) deploying automated password spray/brute force tooling, including routing through Tor. (microsoft.com)
A May 2025 multi-agency advisory also highlights reconstituted password spraying capabilities and provides brute forcing IP indicators observed in 2024.

B) Spearphishing
APT28 is repeatedly documented using spearphishing attachments and links for credential theft and malware delivery. (attack.mitre.org)

C) Webmail exploitation via XSS (RoundPress)
ESET reports “Operation RoundPress” using spearphishing emails that exploit XSS vulnerabilities in webmail products (Roundcube, Horde, MDaemon, Zimbra) to inject malicious JavaScript into the victim’s webmail session—stealing credentials and exfiltrating mailbox data. (ESET)

3.3 Post-compromise tooling and malware ecosystem (representative)

Public reporting links APT28 to a broad toolchain spanning downloaders, backdoors, credential theft tooling, and exfiltration utilities. A 2017 Google/Mandiant-authored report summarises a “malware suite” including tools such as CHOPSTICK and multiple downloader/credential-harvesting components.
Government reporting also references long-standing APT28-associated tooling including X-Agent and X-Tunnel within Unit 26165’s development capability. (GOV.UK)

Recent examples of capability evolution and specialisation include:

AUTHENTIC ANTICS (Microsoft 365 / Outlook-focused credential & token theft)
The UK NCSC’s malware analysis report describes AUTHENTIC ANTICS as an email-account persistence and credential/token theft capability, persisting via COM hijacking and stealing credentials/OAuth tokens, with network communications limited to legitimate services and exfiltration via the Outlook API.

GooseEgg (Print Spooler exploitation for credential access / privilege)
Microsoft reports Forest Blizzard using GooseEgg to exploit CVE-2022-38028 (Windows Print Spooler) to obtain SYSTEM-level privileges and support follow-on objectives. (microsoft.com)

HEADLACE (APT28-linked backdoor distribution via tailored lures)
Unit 42 describes HeadLace delivery in diplomat-themed lure campaigns and assesses continued reliance on public/free services for staging and delivery. (Unit 42)
The May 2025 multi-agency advisory includes hunting-focused YARA examples for HeadLace-related artefacts.

3.4 Exploitation status and notable vulnerabilities (selected, well-sourced)

CVE-2023-23397 (Microsoft Outlook, actively exploited / operationally significant)
Unit 42 reports APT28 (“Fighting Ursa”) leveraging CVE-2023-23397 over an extended period and targeting dozens of organisations across multiple nations. (Unit 42)
Microsoft published mitigation and investigation guidance for exploitation activity. (microsoft.com)

CVE-2022-38028 (Windows Print Spooler, leveraged via GooseEgg)
Microsoft links APT28-aligned activity to exploitation of CVE-2022-38028 in post-compromise operations. (microsoft.com)

CVE-2023-38831 (WinRAR, referenced in APT28 targeting chain)
The May 2025 multi-agency advisory explicitly references exploitation of a WinRAR vulnerability (CVE-2023-38831) as part of observed tradecraft.

CVE-2023-43770 (Roundcube XSS, used in webmail targeting context)
ESET notes Sednit/APT28 exploitation of Roundcube XSS vulnerabilities, including CVE-2023-43770, within Operation RoundPress-style webmail compromise. (ESET)

CVE-2024-11182 (MDaemon XSS, zero-day per ESET; added to KEV)
ESET reports a zero-day MDaemon vulnerability (CVE-2024-11182) “most likely discovered” by Sednit/APT28 and used in RoundPress targeting. (ESET)
CISA later added CVE-2024-11182 to its Known Exploited Vulnerabilities catalogue (evidence of exploitation). (cisa.gov)
MDaemon’s vendor update channel references CVE-2024-11182 remediation. (MDaemon Technologies, Ltd.)

CVE-2026-21509 (Microsoft Office security feature bypass, KEV-listed; actor-linked reporting varies)
NVD shows CVE-2026-21509 is KEV-listed and references Microsoft’s advisory. (nvd.nist.gov)
Several security publishers report active exploitation and associated phishing/document lures; attribution of specific intrusions to APT28 in open reporting should be treated cautiously unless corroborated by primary government/vendor reporting for each incident. (Cisco Talos Blog)


4. Impact Assessment

4.1 Severity and scope

APT28 intrusions are typically high-impact because they target strategic communications and identity systems (email, authentication, OAuth tokens, and directory services), enabling long-dwell espionage, lateral movement, and selective data theft.
In “hack-and-leak” contexts, stolen material can be operationalised for influence operations (e.g., timed releases and information operations), as described in U.S. government reporting on election interference-related compromises. (Department of Justice)

4.2 Victim profile

Observed victims commonly include:

  • Government ministries and agencies, including foreign affairs and defence-aligned entities.
  • Defence industry and logistics providers supporting Ukraine and allied supply chains.
  • Organisations dependent on Microsoft 365/Exchange/webmail for sensitive communications.

5. Indicators of Compromise (IOCs)

5.1 Selected, source-backed IOC table (representative)

Note: APT28 infrastructure and commodity artefacts rotate frequently. Treat these IOCs as time-bounded and prioritise behaviour-based detection.

TypeValueContext/NotesSource
Registry keyHKCU\Software\Microsoft\Office\16.0\Outlook\Logging\LocaleAUTHENTIC ANTICS: stores most recently stolen OAuth 2.0 refresh token
Registry keyHKCU\Software\Microsoft\Office\16.0\Outlook\Logging\CounterAUTHENTIC ANTICS: stores next scheduled run time for stealer
URL (legitimate, abused)http[:]//www[.]gstatic[.]com/generate_204Network connectivity check in AUTHENTIC ANTICS stealer stage
Webmail provider domain (legitimate)portugalmail[.]ptCommonly used webmail provider observed in APT28 targeting context
Webmail provider domain (legitimate)mail-online[.]dkCommonly used webmail provider observed in APT28 targeting context
Webmail provider domain (legitimate)email[.]czCommonly used webmail provider observed in APT28 targeting context
Webmail provider domain (legitimate)seznam[.]czCommonly used webmail provider observed in APT28 targeting context
File namecalc.war.zipMalicious archive filename tied to CVE-2023-38831 tradecraft (example list)
File nameRoadmap.zipMalicious archive filename tied to CVE-2023-38831 tradecraft (example list)
IP address70[.]34[.]253[.]247Brute forcing IP (observed Aug 2024 in advisory dataset)
IP address91[.]149[.]253[.]118Brute forcing IP (observed Aug 2024 in advisory dataset)
IP address212[.]127[.]78[.]170Brute forcing IP (observed Aug 2024 in advisory dataset)

5.2 Detection guidance (practical, defender-focused)

Cloud identity / Microsoft 365

  • Hunt for password spraying patterns (low-and-slow attempts across many accounts) and impossible travel style anomalies, especially where logins route through Tor/VPN egress. (microsoft.com)
  • Alert on mailbox permission tampering (e.g., suspicious delegate permissions / application impersonation) and unusual consent grants.

Endpoint / Outlook token theft

  • Monitor for COM hijacking persistence consistent with AUTHENTIC ANTICS and validate the presence/usage of the registry artefacts listed above.
  • Apply (or adapt) NCSC-published YARA rules to hunt for the AUTHENTIC ANTICS dropper/stealer patterns.

Phishing / archive exploitation

  • Implement attachment detonation and content disarm for archives and Office docs; track lure themes aligned to Ukraine/NATO logistics, diplomatic contexts, and “official” consultation/weather-style pretexts.

6. Incident Response Guidance

6.1 Containment, eradication, recovery

  • Contain identity first: force password resets, revoke refresh tokens, disable suspicious sessions, and rotate privileged credentials (especially service accounts and mailbox-delegated accounts). This is critical where OAuth token theft is suspected.
  • Neutralise persistence: validate Outlook COM registrations, autoruns, and scheduled execution paths; remove any unauthorised mailbox delegation and application impersonation permissions.
  • Scope lateral movement: inspect AD, NTDS access, SMB admin share usage, and remote service execution telemetry consistent with MITRE-documented APT28 behaviour. (attack.mitre.org)

6.2 Forensic artefacts to collect

  • Microsoft 365 unified audit logs (sign-in, consent, mailbox permission changes, OAuth token events where available), Exchange audit logs, and authentication telemetry.
  • Endpoint triage: persistence artefacts (registry, COM, startup), browser/email cache, and PowerShell/script execution logs. (attack.mitre.org)
  • Email gateway and web proxy logs for spearphishing and webmail compromise chains. (ESET)

6.3 Lessons learned (prevention)

  • Reduce credential exposure (MFA, phishing-resistant auth, legacy auth disabled), harden mailbox delegation governance, and enforce least privilege for cloud app consent.

7. Threat Intelligence Contextualisation

7.1 Relationship to broader GRU cyber and hybrid operations

Government reporting positions Unit 26165 (APT28) as a sophisticated GRU capability used for intelligence gathering and hack-and-leak, distinct from GRU elements more associated with destructive operations (e.g., Unit 74455/Sandworm). (GOV.UK)
Microsoft similarly differentiates Forest Blizzard’s intelligence focus from other GRU-linked groups tied to destructive activity. (microsoft.com)

7.2 MITRE ATT&CK mapping table (condensed but end-to-end)

TacticTechnique IDTechnique NameObserved behaviour (APT28 examples)
ReconnaissanceT1595.002Active Scanning: Vulnerability ScanningLarge-scale scanning for vulnerable services. (attack.mitre.org)
Initial AccessT1566.001Phishing: Spearphishing AttachmentMalicious Office/RAR attachments used in spearphishing. (attack.mitre.org)
Initial AccessT1566.003Phishing: Spearphishing LinkCredential harvesting links and staged lure infrastructure. (attack.mitre.org)
Initial AccessT1110.003Brute Force: Password SprayingLow-and-slow password spraying against public services; Tor/VPN routing reported. (attack.mitre.org)
Initial AccessT1190Exploit Public-Facing ApplicationExploitation of Exchange and other public-facing services in historical reporting. (attack.mitre.org)
ExecutionT1059.001PowerShellPowerShell used for execution and admin tasks. (attack.mitre.org)
PersistenceT1546.015Event Triggered Execution: COM HijackingAUTHENTIC ANTICS persistence via COM hijacking.
PersistenceT1098.002Account Manipulation: Additional Email Delegate PermissionsMailbox delegation / application impersonation style abuse. (attack.mitre.org)
Credential AccessT1557Adversary-in-the-MiddleAUTHENTIC ANTICS intercepts OAuth auth flows to capture codes/creds.
Credential AccessT1187Forced AuthenticationAUTHENTIC ANTICS triggers OAuth login prompts; Outlook/identity theft context.
Credential AccessT1003.003OS Credential Dumping: NTDSCredential dumping tradecraft documented for APT28. (attack.mitre.org)
Privilege EscalationT1068Exploitation for Privilege EscalationGooseEgg exploitation of CVE-2022-38028; broader exploit use in reporting. (microsoft.com)
DiscoveryT1083File and Directory DiscoveryTargeted discovery and collection on victim endpoints. (attack.mitre.org)
Lateral MovementT1021.002SMB/Windows Admin SharesSMB admin share usage is part of MITRE-documented behaviour set. (attack.mitre.org)
Lateral MovementT1021.001Remote Services: RDPRDP noted as part of remote services usage set. (attack.mitre.org)
CollectionT1074.001Data Staged: Local Data StagingLocal staging of data prior to exfiltration. (attack.mitre.org)
ExfiltrationT1567Exfiltration Over Web ServiceUse of web services for exfiltration and staging; also noted in advisories. (attack.mitre.org)

8. Mitigation Recommendations

8.1 Hardening and control improvements

  • Enforce phishing-resistant MFA for all users (especially privileged) and disable legacy authentication where possible; prioritise monitoring for password spraying and impossible-travel anomalies. (microsoft.com)
  • Implement strict governance for mailbox delegation and app impersonation rights; alert on suspicious permission changes.
  • Reduce macro/script execution pathways, constrain PowerShell, and centralise command-line telemetry for rapid hunting. (attack.mitre.org)

8.2 Patch management prioritisation (APT28-relevant examples)

Prioritise patching and mitigation of vulnerabilities repeatedly highlighted in APT28-linked reporting and/or KEV:


9. Historical Context & Related Vulnerabilities

APT28 has demonstrated sustained evolution in tooling and selective use of high-value exploits over time, including historical use of multiple (then) zero-days and staged delivery tooling described in Google/Mandiant reporting.
Government reporting frames Unit 26165 as a mature capability with distinct operational, development, and infrastructure functions supporting long-term hybrid objectives. (GOV.UK)


10. Future Outlook

Open reporting and recent advisories suggest APT28 will likely continue prioritising:

  • Cloud identity compromise (password spray, consent abuse, OAuth token theft) to reduce reliance on noisy bespoke C2. (microsoft.com)
  • Supply-chain-adjacent targeting (logistics, ports, transport tech, and border monitoring) aligned to Ukraine support and European security posture.
  • Webmail-focused exploitation where organisations retain vulnerable self-hosted or poorly patched webmail stacks. (ESET)

11. Further Reading (public, high-signal)

  • MITRE ATT&CK — APT28 group entry (techniques, software, and citations). (attack.mitre.org)
  • Multi-agency advisory — Russian GRU Unit 26165 targeting Western logistics and technology companies (May 2025).
  • UK government profile — GRU cyber and hybrid threat operations (Unit 26165 / APT28 context). (GOV.UK)
  • NCSC malware analysis report — AUTHENTIC ANTICS (token theft, COM hijacking, YARA).
  • Microsoft analysis — GooseEgg exploitation of CVE-2022-38028 by Forest Blizzard. (microsoft.com)
  • ESET reporting — Operation RoundPress (webmail XSS tradecraft; Sednit/APT28 “most likely”). (ESET)
  • Unit 42 reporting — exploitation of CVE-2023-23397 by “Fighting Ursa” (APT28). (Unit 42)