Russian GRU Hackers (APT28) Evolve Credential-Harvesting Tactics

GRU-Linked BlueDelta (APT28) Refines Credential-Harvesting Operations Against European and Eurasian Targets

HIGH
January 14, 2026
4m read
Threat ActorPhishingThreat Intelligence

Related Entities

Threat Actors

Organizations

Products & Tech

Webhook.sitengrok

Other

InfinityFreeByet Internet Services

Full Report

Executive Summary

Recorded Future's Insikt Group has released new intelligence on the evolving tactics of BlueDelta, a threat group linked to Russia's Main Directorate of the General Staff (GRU) and widely known as APT28 or Fancy Bear. The group conducted a series of sophisticated credential-harvesting campaigns between February and September 2025, focusing on targets of strategic interest to Russia. Victims included individuals at a Turkish energy agency, a North Macedonian military organization, and a European think tank. BlueDelta's updated tradecraft emphasizes stealth and operational efficiency, leveraging highly targeted spear-phishing, legitimate documents as lures, and a network of low-cost, disposable infrastructure (such as ngrok and InfinityFree) to capture credentials for services like Microsoft OWA and Sophos VPN.

Threat Overview

The campaign demonstrates a clear focus on intelligence gathering related to energy research, defense cooperation, and government policy in Europe and Eurasia. Rather than using complex malware, BlueDelta's success relies on meticulous social engineering and operational security.

The typical attack chain involves:

  1. Targeted Spear-Phishing: Attackers send carefully crafted emails, sometimes in the victim's native language, to build credibility (T1566.002).
  2. Lure Documents: The emails contain links to legitimate-looking PDF documents or websites relevant to the target's work, such as a real climate policy paper for energy researchers.
  3. Redirection: Upon clicking, the victim is passed through a multi-stage redirection chain, often using free URL shorteners or compromised sites to obfuscate the final destination.
  4. Credential Harvesting: The final destination is a convincing replica of a familiar login portal (e.g., Microsoft Outlook Web Access, Google, Sophos VPN). After the user enters their credentials, they are stolen and exfiltrated.
  5. Evasion: To avoid suspicion, the user is often redirected to the legitimate website they were expecting after their credentials have been harvested.

Technical Analysis

A key feature of BlueDelta's evolved methodology is its reliance on low-cost, disposable, and difficult-to-attribute infrastructure (T1583.006). The group consistently abuses free and legitimate online services, including:

  • Hosting Services: InfinityFree, Byet Internet Services
  • Web Request Services: Webhook[.]site
  • Tunneling Services: ngrok

Using these services allows the attackers to quickly set up and tear down their phishing pages and data exfiltration endpoints, making it difficult for defenders to block them based on traditional IP or domain reputation. The use of ngrok is particularly effective, as it tunnels malicious traffic through a legitimate, trusted service, often bypassing firewall rules.

Impact Assessment

The primary goal of these campaigns is espionage. By stealing credentials, BlueDelta gains long-term access to sensitive email accounts, internal networks, and cloud services. This access can be used to:

  • Exfiltrate sensitive documents, emails, and strategic plans.
  • Gain a foothold for more intrusive follow-on operations.
  • Use the compromised accounts to launch further phishing attacks against other targets, leveraging the trust associated with the victim's identity.

The targeting of energy and defense entities indicates a direct alignment with Russian state strategic interests, posing a national security risk to the affected countries.

Detection & Response

  • Network Traffic Analysis: Monitor for and alert on network connections to known abusive services like ngrok.io, *.infinityfreeapp.com, and webhook.site from within the corporate network, especially from user workstations. While these services have legitimate uses, their use in a corporate environment should be scrutinized. This is a core function of D3-NTA: Network Traffic Analysis.
  • Email Security: Deploy advanced email security gateways that can analyze URLs at time-of-click to detect malicious redirects and credential harvesting pages. Look for emails containing multiple layers of redirection.
  • User Training: Since the attack relies on tricking the user, continuous training on how to spot sophisticated phishing attempts is crucial. Users should be taught to manually verify the domain name of any login page before entering credentials.

Mitigation

  1. Multi-Factor Authentication (MFA): This is the single most effective mitigation against credential theft. Even if an attacker steals a user's password, they cannot access the account without the second factor. Enforce MFA on all external services, especially email and VPN. This is a direct implementation of D3-MFA: Multi-factor Authentication.
  2. Outbound Traffic Filtering: Block access to known-bad domains and categories of websites, including free hosting and dynamic DNS services, where possible. While this can be challenging due to their legitimate uses, a risk-based approach can be effective.
  3. Limit Access from Untrusted Networks: Configure conditional access policies to block or limit access to sensitive applications from networks or countries where your organization does not operate.

Timeline of Events

1
February 1, 2025
Start of observed credential harvesting campaign by BlueDelta.
2
September 30, 2025
End of observed credential harvesting campaign period analyzed by Recorded Future.
3
January 14, 2026
This article was published

MITRE ATT&CK Mitigations

The most effective defense against credential theft, as it prevents the use of stolen passwords.

Mapped D3FEND Techniques:

Training users to identify and report sophisticated phishing attempts is crucial for defense-in-depth.

Filtering outbound web traffic to block access to known malicious or high-risk services like free hosting and tunneling services can disrupt the attack chain.

Mapped D3FEND Techniques:

D3FEND Defensive Countermeasures

The single most effective countermeasure against the credential harvesting campaigns conducted by BlueDelta/APT28 is the mandatory enforcement of phishing-resistant Multi-Factor Authentication (MFA) on all internet-facing services. This includes email (like Microsoft OWA), VPNs (like the targeted Sophos VPN), and all cloud applications. Even when an attacker successfully tricks a user into submitting their password on a fake login page, MFA prevents them from using that stolen credential to gain access. Organizations should prioritize FIDO2/WebAuthn-based authenticators or number matching push notifications, as these are more resilient to adversary-in-the-middle (AitM) phishing attacks than simple SMS or one-time passcodes.

To disrupt BlueDelta's reliance on disposable infrastructure, organizations should implement strict outbound traffic filtering. This involves creating policies on web proxies and firewalls to block connections to services frequently abused by this actor. Specifically, create rules to block or alert on all traffic to domains associated with ngrok.io, infinityfreeapp.com, byet.org, and webhook.site. While some of these services may have legitimate uses, their presence in a corporate environment is often a red flag. A default-deny egress policy, where only explicitly allowed services and domains can be accessed, is the most secure posture, though it requires significant administrative overhead. At a minimum, logging all outbound connections to these services is essential for threat hunting.

Deploy an email security gateway with advanced URL analysis capabilities, often referred to as 'time-of-click' protection. This technology rewrites URLs in incoming emails to route them through a proxy. When a user clicks the link, the security service analyzes the destination website in real-time, following redirection chains to the final landing page. This is highly effective against BlueDelta's TTPs, as it can identify the malicious credential harvesting page at the end of the redirection chain and block the user from accessing it. This automated analysis is far more effective than relying solely on users to spot subtle differences in domain names.

Sources & References

GRU-Linked BlueDelta Evolves Credential Harvesting
Recorded Future (recordedfuture.com) January 14, 2026
State-linked Russians go on spear phishing spree
Computing (computing.co.uk) January 13, 2026
Russia's APT28 Targeting Energy Research, Defense Collaboration Entities
SecurityWeek (securityweek.com) January 12, 2026
Fancy Bear's Use Of Credential Theft
PCRisk (pcrisk.com) January 13, 2026

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

APT28Fancy BearBlueDeltaGRURussiaCredential HarvestingPhishingThreat Intelligence

📢 Share This Article

Help others stay informed about cybersecurity threats

Continue Reading