Russian APTs Re-Exploiting Past Breaches for Renewed Attacks in Ukraine

CERT-UA: Russian Hackers Are Revisiting Old Breaches to Launch New Attacks

HIGH
April 4, 2026
4m read
Threat ActorCyberattackSecurity Operations

Related Entities

Threat Actors

APT28 Void Blizzard

Organizations

CERT-UA Ukrainian Armed ForcesUkrainian Government Institutions

Full Report

Executive Summary

Ukraine's Computer Emergency Response Team (CERT-UA) has reported a significant tactical shift by Russian state-sponsored threat actors, including APT28 (Fancy Bear) and Void Blizzard. In a report dated April 3, 2026, CERT-UA warns that these groups are no longer just conducting "steal-and-go" operations but are now systematically revisiting previously breached networks. This strategy aims to establish and maintain long-term persistence for future espionage, data exfiltration, or disruptive attacks. Concurrently, these APTs are refining their initial access methods, moving away from simple phishing emails to more sophisticated social engineering involving direct voice and video calls to build rapport with targets in the Ukrainian government and military before delivering malware.

Threat Overview

The core of the new strategy is persistence and re-exploitation. Russian hackers are methodically checking old footholds to see if:

  • Access backdoors are still active.
  • Vulnerabilities exploited in the initial breach were never patched.
  • Stolen credentials (e.g., usernames, passwords, tokens) are still valid.

When access is confirmed, the attackers leverage it for new campaigns, effectively saving the time and resources needed to establish a new beachhead. This indicates a strategic shift towards long-term intelligence gathering and maintaining a constant state of readiness to conduct operations against Ukrainian targets.

Furthermore, the initial access TTPs are evolving. Recognizing that awareness of phishing emails has increased, groups like APT28 are now engaging in highly personalized social engineering. They initiate contact with targets via phone or video chat applications, impersonating colleagues or officials to build trust. Only after establishing this rapport do they send a malicious file or link through a messaging app, dramatically increasing the probability of execution.

Technical Analysis

This campaign highlights a focus on the later stages of the attack lifecycle and a refinement of the initial stages.

  • Resource Development: T1588 - Obtain and Reuse. The core of the new tactic is reusing previously compromised infrastructure, credentials, and access.
  • Initial Access: T1566 - Phishing. While traditional phishing is still used, the evolution is towards multi-stage social engineering that combines voice/video (T1566.003 - Phishing: Voice) with subsequent malicious file delivery.
  • Persistence: The attackers' primary goal is to maintain persistence. This could involve various techniques, such as creating new accounts (T1136 - Create Account), installing backdoors, or leaving behind web shells (T1505.003 - Web Shell).
  • Command and Control: The long-term nature of these operations suggests the use of stealthy C2 channels that blend in with normal traffic to avoid detection over extended periods.

Impact Assessment

This tactical shift poses a severe and persistent threat to Ukrainian national security. By maintaining long-term access to government and military networks, Russian APTs can conduct continuous espionage, steal sensitive data at will, and potentially deploy destructive wiper malware or conduct sabotage at moments of strategic importance. The psychological impact is also significant, creating a constant sense of being under siege and forcing defenders to re-investigate old incidents. For organizations, it underscores that incident response is not complete until the root cause is fully remediated and all attacker artifacts are evicted; otherwise, the

Timeline of Events

1
April 4, 2026
This article was published

MITRE ATT&CK Mitigations

After an incident, ensure all potentially compromised accounts are disabled or have credentials rotated. Implement regular reviews of dormant accounts.

Ensure that vulnerabilities identified during an incident investigation are actually patched to prevent re-exploitation.

Train users to be aware of sophisticated social engineering tactics that go beyond email, including voice and video calls from unverified sources.

Audit

M1047enterprise

Continuously audit for the re-emergence of IOCs from past incidents. A detection for an old IOC should be treated as a new high-priority alert.

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

APT28Fancy BearVoid BlizzardRussiaUkrainecyberwarespionagesocial engineeringCERT-UA

📢 Share This Article

Help others stay informed about cybersecurity threats