Ukraine's Computer Emergency Response Team (CERT-UA) has reported a significant tactical shift by Russian state-sponsored threat actors, including APT28 (Fancy Bear) and Void Blizzard. In a report dated April 3, 2026, CERT-UA warns that these groups are no longer just conducting "steal-and-go" operations but are now systematically revisiting previously breached networks. This strategy aims to establish and maintain long-term persistence for future espionage, data exfiltration, or disruptive attacks. Concurrently, these APTs are refining their initial access methods, moving away from simple phishing emails to more sophisticated social engineering involving direct voice and video calls to build rapport with targets in the Ukrainian government and military before delivering malware.
The core of the new strategy is persistence and re-exploitation. Russian hackers are methodically checking old footholds to see if:
When access is confirmed, the attackers leverage it for new campaigns, effectively saving the time and resources needed to establish a new beachhead. This indicates a strategic shift towards long-term intelligence gathering and maintaining a constant state of readiness to conduct operations against Ukrainian targets.
Furthermore, the initial access TTPs are evolving. Recognizing that awareness of phishing emails has increased, groups like APT28 are now engaging in highly personalized social engineering. They initiate contact with targets via phone or video chat applications, impersonating colleagues or officials to build trust. Only after establishing this rapport do they send a malicious file or link through a messaging app, dramatically increasing the probability of execution.
This campaign highlights a focus on the later stages of the attack lifecycle and a refinement of the initial stages.
T1588 - Obtain and Reuse. The core of the new tactic is reusing previously compromised infrastructure, credentials, and access.T1566 - Phishing. While traditional phishing is still used, the evolution is towards multi-stage social engineering that combines voice/video (T1566.003 - Phishing: Voice) with subsequent malicious file delivery.T1136 - Create Account), installing backdoors, or leaving behind web shells (T1505.003 - Web Shell).This tactical shift poses a severe and persistent threat to Ukrainian national security. By maintaining long-term access to government and military networks, Russian APTs can conduct continuous espionage, steal sensitive data at will, and potentially deploy destructive wiper malware or conduct sabotage at moments of strategic importance. The psychological impact is also significant, creating a constant sense of being under siege and forcing defenders to re-investigate old incidents. For organizations, it underscores that incident response is not complete until the root cause is fully remediated and all attacker artifacts are evicted; otherwise, the
After an incident, ensure all potentially compromised accounts are disabled or have credentials rotated. Implement regular reviews of dormant accounts.
Ensure that vulnerabilities identified during an incident investigation are actually patched to prevent re-exploitation.
Train users to be aware of sophisticated social engineering tactics that go beyond email, including voice and video calls from unverified sources.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats