analyst@nohacky:~/threat-actors$
cat/threat-actors/apt28-fancy-bear
analyst@nohacky:~/apt28-fancy-bear.html
active threatprofile
typeNation-State
threat_levelCritical
statusActive
originRussia
last_updated2026-03-26
FB
apt28-fancy-bear

APT28 / Fancy Bear

also known as: Sofacy Strontium Forest Blizzard Pawn Storm Sednit IRON TWILIGHT

Russia's GRU Military Intelligence Unit 26165 — active for over two decades and responsible for some of the most consequential cyber operations in history, including the 2016 DNC breach, election interference campaigns across multiple countries, sustained NATO targeting, and in early 2026 the simultaneous exploitation of two unpatched Microsoft zero-days against European defense and government targets.

attributed originRussia
suspected sponsorGRU — Unit 26165 (85th GTsSS)
first observed~2004
primary motivationEspionage / political interference
primary targetsGovernment, Defense, Political
known campaigns20+ major confirmed
mitre att&ck groupG0007
target regionsEurope, USA, Ukraine (primary)
threat levelCRITICAL

Overview

APT28 is one of the most prolific, well-resourced, and technically sophisticated nation-state threat actors ever documented. Operated by Russia's GRU military intelligence directorate, the group has been conducting offensive cyber operations for over twenty years — predating most of the security frameworks now used to defend against them.

What distinguishes APT28 from comparable state-sponsored actors is the breadth of its operational objectives. Unlike groups focused narrowly on intelligence collection, APT28 simultaneously pursues espionage, political interference, disinformation support, and direct disruption of adversary systems. The group has attacked the French election, the German Bundestag, U.S. political campaigns, NATO member military networks, and Ukrainian critical infrastructure — often running multiple campaigns concurrently.

The group's technical tradecraft is particularly notable for its willingness to burn zero-days at scale. In early 2026, NoHacky documented APT28 simultaneously exploiting two unpatched Microsoft vulnerabilities — CVE-2026-21513 in MSHTML and CVE-2026-21509 in Microsoft Office — in a coordinated dual-vector campaign across Ukraine, Slovakia, and Romania. Operating dual zero-days simultaneously is a significant intelligence expenditure that signals high-priority targeting.

warning

APT28 is known to maintain long-term dormant access in compromised networks, activating implants months or years after initial intrusion. Detection of one implant does not indicate full eviction.

Target Profile

APT28's targeting reflects GRU intelligence priorities: Western governments, NATO military infrastructure, political institutions, and Ukrainian entities. The group consistently targets organizations where access yields strategic intelligence or enables information operations.

  • Government and diplomatic: Foreign ministries, embassies, and senior officials across Europe and North America. The German Bundestag breach (2015) compromised the IT systems of Parliament itself.
  • Defense and military: NATO member defense ministries, contractors, and military research institutions. Targeting aligns directly with GRU collection requirements for Western military capabilities.
  • Political parties and campaigns: DNC and Clinton campaign (2016), Macron's En Marche campaign (2017), multiple European political parties. Stolen data is typically leaked to maximize political damage.
  • Ukraine: Continuous, high-tempo operations against Ukrainian government, military, energy, and media infrastructure — particularly intensified since 2022.
  • Media and think tanks: Organizations that shape Western policy and public opinion. Access enables both intelligence collection and potential influence operations.
  • Eastern Europe (ongoing 2026): Ukraine, Slovakia, Romania confirmed in the dual zero-day campaign documented in March 2026.

Tactics, Techniques & Procedures

mitre idtechniquedescription
T1566.001Spear-phishing AttachmentHighly targeted emails with malicious Office documents or LNK files, customized with victim-relevant content and geopolitical lures. Primary initial access vector.
T1203Exploitation for Client ExecutionZero-day exploitation including simultaneous dual-vector campaigns (CVE-2026-21513 MSHTML + CVE-2026-21509 Office in early 2026). Willing to spend zero-days for high-priority targets.
T1055Process InjectionX-Agent, CHOPSTICK, and newer implants inject into legitimate processes to evade endpoint detection and appear as normal system activity.
T1071.001Web Protocols C2Command-and-control over HTTPS using compromised third-party websites as proxies, making C2 traffic blend with normal web browsing.
T1003OS Credential DumpingMimikatz and custom variants to harvest credentials for lateral movement. Harvested credentials are also exfiltrated for potential future use across other operations.
T1114Email CollectionSystematic collection of email archives from compromised accounts — a core collection objective given the group's information operations mission.
T1195Supply Chain CompromiseCompromise of software update mechanisms and trusted third-party services to deliver implants to downstream targets without direct phishing.
T1027Obfuscated FilesExtensive use of steganography (documented in the BadPaw/MeowMeow campaign) to hide payloads in image files, complicating detection and forensic analysis.

Known Campaigns

Dual Zero-Day Campaign — CVE-2026-21513 & CVE-2026-21509Early 2026

APT28 simultaneously exploited two unpatched Microsoft vulnerabilities — a MSHTML rendering engine flaw and a Microsoft Office zero-day — in a coordinated two-pronged campaign against government and defense targets in Ukraine, Slovakia, and Romania. Three distinct payload chains deployed including MiniDoor, PixyNetLoader, and BEARDSHELL. Operating dual zero-days simultaneously is a significant operational expenditure indicating high strategic priority.

Read NoHacky briefing
BadPaw / MeowMeow — Ukraine Espionage Campaign2026

ClearSky documented a sophisticated multi-stage espionage campaign deploying two previously undocumented malware families — BadPaw (.NET loader) and MeowMeow (backdoor) — against Ukrainian organizations. The operation used steganography to hide payloads in image files, implemented sandbox evasion, and used geopolitically tailored lures. Russian-language artifacts and targeting profile link the campaign to APT28 with high confidence.

Read NoHacky briefing
U.S. Election Interference — DNC / Podesta Breach2016

Compromised the Democratic National Committee and John Podesta's email through spear-phishing, exfiltrating thousands of emails subsequently released via WikiLeaks and DCLeaks. The operation was designed not just for intelligence collection but to influence the U.S. presidential election. Indicted by Mueller investigation (GRU Officers Indictment, July 2018).

Operation Sofacy — German Bundestag Breach2015

Compromised the IT systems of the German Parliament, exfiltrating approximately 16 gigabytes of data over several weeks. The breach required a complete system rebuild of Parliament's IT infrastructure. German authorities formally attributed the attack to APT28/GRU in 2020.

Olympic Destroyer / 2018 Winter Olympics2018

Destructive wiper malware deployed against the Winter Olympics opening ceremony in Pyeongchang, South Korea — deliberately designed to implicate other threat actors through false flag indicators pointing to North Korea and China. Ultimately attributed to GRU/Sandworm with APT28 involvement.

Tools & Malware

  • X-Agent (Sofacy): APT28's primary espionage implant, deployed across Windows, Linux, macOS, and mobile. Modular architecture for keylogging, file exfiltration, and remote command execution.
  • CHOPSTICK / X-Tunnel: Second-stage backdoor and encrypted tunneling tool used for persistent access and lateral movement after initial X-Agent deployment.
  • MiniDoor: Lightweight initial access backdoor used in the 2026 dual zero-day campaign for establishing persistence before deploying heavier tooling.
  • PixyNetLoader: Network-aware loader documented in the 2026 campaign, used to stage and deploy additional payloads while profiling victim network topology.
  • BEARDSHELL: Custom web shell deployed in the 2026 campaign for persistent server-side access in compromised environments.
  • BadPaw: Multi-stage .NET loader using steganography to hide encrypted payloads in image files. Implements sandbox detection before executing. Documented by ClearSky in 2026.
  • MeowMeow: Backdoor payload delivered by BadPaw. Communicates over encrypted channels, implements anti-analysis techniques, and self-terminates if it detects a monitored environment.
  • Zebrocy: Reconnaissance implant deployed in early-stage operations to profile victim systems before committing more sophisticated tooling.

Mitigation & Defense

  • Zero-day patch velocity: APT28 exploits zero-days immediately upon or before public disclosure. Establish emergency patching SLAs of 24–48 hours for critical Microsoft vulnerabilities, particularly in MSHTML, Office, and Outlook.
  • Email security hardening: Deploy advanced anti-phishing controls including sandboxed attachment detonation, disabling macros by default, and enforcing DMARC/DKIM/SPF across all domains. Spear-phishing remains APT28's primary initial access vector.
  • Credential protection: Deploy Windows Credential Guard, enforce LAPS for local admin accounts, and monitor for credential dumping tools (Mimikatz signatures). APT28 harvests credentials extensively for lateral movement.
  • Network segmentation: Isolate sensitive systems (political communications, classified data stores) on network segments with strict egress filtering. APT28 conducts broad lateral movement after initial compromise.
  • Threat intelligence integration: APT28 IOCs are among the most well-documented of any threat actor. Subscribe to threat intel feeds covering GRU/APT28 infrastructure — C2 IPs and domains are frequently burned and rotated but signature patterns remain consistent.
  • Steganography detection: Recent campaigns use image steganography (BadPaw) to exfiltrate and stage payloads. Consider DLP controls that inspect image file entropy anomalies in outbound traffic.
analyst note

APT28 operates in parallel with Sandworm (GRU Unit 74455). While APT28 focuses on intelligence collection and political interference, Sandworm specializes in destructive operations. Organizations in APT28's target profile should assess their Sandworm exposure simultaneously — the two groups share infrastructure and targeting in Ukrainian operations.

Sources & Further Reading

— end of profile