Recorded Future's Insikt Group has released new intelligence on the evolving tactics of BlueDelta, a threat group linked to Russia's Main Directorate of the General Staff (GRU) and widely known as APT28 or Fancy Bear. The group conducted a series of sophisticated credential-harvesting campaigns between February and September 2025, focusing on targets of strategic interest to Russia. Victims included individuals at a Turkish energy agency, a North Macedonian military organization, and a European think tank. BlueDelta's updated tradecraft emphasizes stealth and operational efficiency, leveraging highly targeted spear-phishing, legitimate documents as lures, and a network of low-cost, disposable infrastructure (such as ngrok and InfinityFree) to capture credentials for services like Microsoft OWA and Sophos VPN.
The campaign demonstrates a clear focus on intelligence gathering related to energy research, defense cooperation, and government policy in Europe and Eurasia. Rather than using complex malware, BlueDelta's success relies on meticulous social engineering and operational security.
The typical attack chain involves:
T1566.002).A key feature of BlueDelta's evolved methodology is its reliance on low-cost, disposable, and difficult-to-attribute infrastructure (T1583.006). The group consistently abuses free and legitimate online services, including:
InfinityFree, Byet Internet ServicesWebhook[.]sitengrokUsing these services allows the attackers to quickly set up and tear down their phishing pages and data exfiltration endpoints, making it difficult for defenders to block them based on traditional IP or domain reputation. The use of ngrok is particularly effective, as it tunnels malicious traffic through a legitimate, trusted service, often bypassing firewall rules.
The primary goal of these campaigns is espionage. By stealing credentials, BlueDelta gains long-term access to sensitive email accounts, internal networks, and cloud services. This access can be used to:
The targeting of energy and defense entities indicates a direct alignment with Russian state strategic interests, posing a national security risk to the affected countries.
ngrok.io, *.infinityfreeapp.com, and webhook.site from within the corporate network, especially from user workstations. While these services have legitimate uses, their use in a corporate environment should be scrutinized. This is a core function of D3-NTA: Network Traffic Analysis.D3-MFA: Multi-factor Authentication.The most effective defense against credential theft, as it prevents the use of stolen passwords.
Mapped D3FEND Techniques:
Training users to identify and report sophisticated phishing attempts is crucial for defense-in-depth.
Filtering outbound web traffic to block access to known malicious or high-risk services like free hosting and tunneling services can disrupt the attack chain.
The single most effective countermeasure against the credential harvesting campaigns conducted by BlueDelta/APT28 is the mandatory enforcement of phishing-resistant Multi-Factor Authentication (MFA) on all internet-facing services. This includes email (like Microsoft OWA), VPNs (like the targeted Sophos VPN), and all cloud applications. Even when an attacker successfully tricks a user into submitting their password on a fake login page, MFA prevents them from using that stolen credential to gain access. Organizations should prioritize FIDO2/WebAuthn-based authenticators or number matching push notifications, as these are more resilient to adversary-in-the-middle (AitM) phishing attacks than simple SMS or one-time passcodes.
To disrupt BlueDelta's reliance on disposable infrastructure, organizations should implement strict outbound traffic filtering. This involves creating policies on web proxies and firewalls to block connections to services frequently abused by this actor. Specifically, create rules to block or alert on all traffic to domains associated with ngrok.io, infinityfreeapp.com, byet.org, and webhook.site. While some of these services may have legitimate uses, their presence in a corporate environment is often a red flag. A default-deny egress policy, where only explicitly allowed services and domains can be accessed, is the most secure posture, though it requires significant administrative overhead. At a minimum, logging all outbound connections to these services is essential for threat hunting.
Deploy an email security gateway with advanced URL analysis capabilities, often referred to as 'time-of-click' protection. This technology rewrites URLs in incoming emails to route them through a proxy. When a user clicks the link, the security service analyzes the destination website in real-time, following redirection chains to the final landing page. This is highly effective against BlueDelta's TTPs, as it can identify the malicious credential harvesting page at the end of the redirection chain and block the user from accessing it. This automated analysis is far more effective than relying solely on users to spot subtle differences in domain names.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats