Self Assessment

APT PROFILE – FANCY BEAR

Published On : 2025-07-16
Share :
APT PROFILE – FANCY BEAR

Fancy Bear, also known as APT28, is a notorious Russian cyberespionage group with a long history of targeting governments, military entities, and other high-value organizations worldwide. Active since 2007, they are infamous for their stealthy and well-coordinated cyberattacks. Fancy Bear has been implicated in attempts to influence election processes in countries like the U.S., France, and Germany.

Alias:
APT 28, APT-28, APT28, Blue Athena, Blue Delta, FROZENLAKE, Fancy Bear, Fighting Ursa, Forest Blizzard, Group 74, GruesomeLarch, IRON TWILIGHT, ITG05, Pawn Storm, SIG40, STRONTIUM, Sednit, Sofacy, Sofacy Group, Strontium, Swallowtail, TA422, TAG-110, TG-4127, Threat Group-4127, Tsar Team, UAC-0001, UAC-0028, UAC-0063, Unit 26165, Unit 74455.

Motivation:
Financial, Reputational Damage, Espionage, Political Agenda

Target Technologies:
Office Suites Software, Operating Systems, Web Applications

Tools Used:
Forfiles, Computrace, Living off the Land, DealersChoice, Sedkit, Mimikatz.

Malware used by Fancy Bear:
STEELHOOK, HeadLace, Sedreco, Winexe, OCEANMAP, OLDBAIT, ProcDump, WinIDS, certutil, CHOPSTICK, HIDEDRV, SkinnyBoy, XAgentOSX, Drovorub, Fysbis, Downdelph, ADVSTORESHELL, Responder, GooseEgg, XTunnel, Sofacy, Cannon, USBStealer, Foozer, VPNFilter, Koadic, CORESHELL, Komplex, SlimAgent, JHUHUGIT, Seduploader, Zebrocy, PythocyDbg, BeardShell, PocoDown, MASEPIE, Nimcy, LoJax.

Targeted Country
Afghanistan, Brazil, Cambodia, France, Georgia, Germany, India, Indonesia, Kazakhstan, Malaysia, Moldova, Pakistan, Romania, Russia, South Africa, Syria, Thailand, Turkey, Ukraine, the United States, Vietnam, and Australia.

Targeted Industries

MITRE ATT&CK Techniques used by Fancy Bear

Reconnaissance Privilege Escalation Lateral Movement
T1598 T1068 T1210
T1595.002 T1037.001 T1550.002
T1589.001 T1078 T1021.002
T1598.003 T1078.004 T1550.001
Resource Development T1546.015 T1091
T1583.006 T1547.001 Collection
T1588.002 T1134.001 T1213
T1583.001 Defense Evasion T1005
T1586.002 T1027 T1025
Initial Access T1211 T1113
T1189 T1036 T1560
T1133 T1070.001 T1560.001
T1199 T1014 T1119
T1078 T1221 T1039
T1566.001 T1078 T1056.001
T1566.002 T1078.004 T1074.001
T1078.004 T1564.001 T1114.002
T1091 T1564.003 T1074.002
T1190 T1134.001 T1213.002
Execution T1218.011 Command and Control
T1203 T1542.003 T1573.001
T1059.003 T1036.005 T1071.001
T1204.001 T1550.002 T1102.002
T1059.001 T1550.001 T1090.003
T1204.002 T1140 T1071.003
T1559.002 T1070.004 T1090.002
Persistence T1070.006 T1092
T1505.003 Credential Access T1105
T1542.003 T1110.003 T1001.001
T1037.001 T1110.001 Exfiltration
T1133 T1003 T1048.002
T1078 T1110 T1030
T1078.004 T1040 T1567
T1137.002 T1528 Impact
T1546.015 T1003.003 T1498
T1098.002 T1003.001
T1547.001 T1056.001
Discovery
T1057
T1120
T1040
T1083

Attack Flow Diagram: APT Fancy Bear

Recently Exploited Vulnerabilities by Fancy Bear

CVE-2023-23397
CVE-2023-38831
CVE-2023-20085

Fancy Bear’s Recent Campaign Highlights and Trends

Recent Campaign Highlights

Fancy Bear has continued to demonstrate high activity, particularly in targeting entities related to the war in Ukraine and broader Western interests.

Targeting Ukrainian Officials and Military Suppliers:

  • Objective: To gain insight into the Ukrainian military’s supply chain and broader intelligence on the conflict.
  • Method: Spearphishing campaigns targeting email accounts of high-ranking Ukrainian officials and executives at defense contractors in other countries who supply weapons and equipment to Kyiv.
  • Exploits: They leveraged cross-site scripting (XSS) vulnerabilities in various webmail software products, including Roundcube, Horde, MDaemon, and Zimbra. They also exploited a more recent vulnerability in Roundcube, CVE-2023-43770.
  • Malware: Custom JavaScript malware payloads capable of exfiltrating data (email messages, address books, contacts, login history). In some cases, they could steal passwords and bypass 2FA by exploiting vulnerabilities that forced password re-entry on spoofed pages.

Targeting Western Logistics and Technology Companies:

  • Objective: Cyber espionage against companies facilitating foreign aid to Ukraine.
  • Method: This campaign has been broadly identified by a joint advisory from multiple intelligence agencies across North America, Europe, and Australia. Specific TTPs likely overlap with their general espionage methods.

Leveraging Real Government Documents as Lures:

  • Objective: To infect and spy on government officials in Central Asia (e.g., Kazakhstan, Kyrgyzstan, Mongolia) and other regions (Israel, India, parts of Europe). This aligns with Russia’s aim to maintain political alignment and counter competing influences in Central Asia.
  • Method: Spearphishing using seemingly legitimate documents from the Kazakhstan government (e.g., diplomatic statements, correspondence, internal notes) as lures.
  • Malware: Files laced with malware, including HATVIBE and CHERRYSPY. HATVIBE acts as a loader, fetching and executing CHERRYSPY, which provides persistent, clandestine backdoor access. The infection chain involved malicious macro files in Word that downgraded security settings and launched the malware. This activity shows overlap with ZEBROCY backdoor usage, also attributed to Fancy Bear.

Trends

  • Continued Focus on Geopolitical Objectives: Their primary motivation remains intelligence gathering to support Russian geopolitical interests, particularly in the context of the war in Ukraine.
  • Exploitation of Webmail Vulnerabilities: A persistent trend of exploiting vulnerabilities in widely used webmail clients to gain initial access and steal credentials.
  • Sophisticated Phishing and Social Engineering: Their phishing lures are highly tailored and often mimic legitimate sources (e.g., Ukrainian news outlets, government documents) to increase effectiveness. They understand their targets’ interests and leverage current events.
  • Adaptation and Evasion: Fancy Bear continuously updates its malware and TTPs to evade detection. This includes switching implants, changing command and control (C2) channels, modifying persistence methods, and using anti-analysis techniques like code obfuscation, adding junk data, and clearing event logs.
  • Credential Harvesting: A core component of their attacks, aiming to steal login information for persistent access.
  • Broad Victimology: While their primary focus remains specific geopolitical targets, their campaigns often ensnare a broader range of victims in various countries across Europe, Asia, and even Latin America.
  • Use of Legitimate Infrastructure: They have been known to relay C2 traffic through proxy networks of previously compromised victims and may abuse legitimate cloud services.
  • Disinformation and Persona Creation: While not always tied to a specific recent campaign, a historical trend for Fancy Bear (e.g., Guccifer 2.0, Fancy Bears’ Hack Team) is to create online personas to disseminate stolen information, sow disinformation, and deflect blame.

Tactics, Techniques, and Procedures (TTPs)

Fancy Bear’s TTPs align with the MITRE ATT&CK framework and demonstrate their advanced capabilities:

Initial Access:

  • Spear phishing Attachment/Link (T1566.001/002): The most common initial access vector.
  • Highly tailored emails with malicious attachments (e.g., weaponized documents with macros).
  • Emails containing links to spoofed login pages for webmail services or malware drop sites.
  • Exploitation of Public-Facing Applications (T1190): Leveraging vulnerabilities (e.g., XSS in webmail platforms like Roundcube, Horde, MDaemon, Zimbra) to execute malicious code.
  • Brute Force/Password Spraying (T1110.003): Historically used against web services, as seen in the Norwegian parliament hack.

Execution:

  • User Execution (T1204): Requires victims to open malicious documents or click on malicious links.
  • Command and Scripting Interpreter (T1059): Using JavaScript within browser contexts (XSS) or PowerShell for various tasks (e.g., downloading stages).
  • Scheduled Task/Job (T1053): Setting up tasks to run malware periodically (e.g., HATVIBE running every four minutes).
  • Malicious Macro (T1204.002): Embedded in documents to trigger infection chains.

Persistence:

  • Boot or Logon Autostart Execution (T1547): Using Startup folders for persistent execution of malware.
  • Account Manipulation (T1098): Stealing credentials to maintain access to accounts.
  • Scheduled Task/Job (T1053): Re-establishing execution of malware.

Defense Evasion:

  • Obfuscated Files or Information (T1027): Obfuscating code, adding junk data to encoded strings.
  • Indicator Removal (T1070): Clearing event logs (e.g., Security and System event registries) to hide activity.
  • Modify File Attributes (T1564.004): Resetting timestamps on files to hinder forensic analysis.
  • Proxy/C2 Channels (T1090): Routing C2 traffic through compromised victim networks.
  • Implant Switching: Frequently rotating implants to avoid detection.
  • Valid Accounts (T1078): Using stolen legitimate credentials.

Credential Access:

  • OS Credential Dumping (T1003): Stealing credentials/hashes from systems, potentially through exploits that capture inputs or by leveraging specific tools.
  • Phishing for Credentials (T1566.002): Direct harvesting of credentials via spoofed login pages.

Discovery:

  • System Information Discovery (T1082): Understanding the compromised environment.
  • Network Service Discovery (T1046): Mapping network drives.

Collection:

  • Data from Local System (T1005): Stealing email messages, address books, contacts, login histories.
  • Screen Capture (T1113): Taking screenshots of the victim’s machine.

Exfiltration:

  • Exfiltration Over C2 Channel (T1041): Sending collected data back to C2 servers.
  • Exfiltration to Cloud Storage (T1567.002): Known to use services like Google Drive for data exfiltration.

Command and Control (C2):

  • Standard Non-Application Layer Protocol (T1091): Using various protocols for C2 communication.
  • Web Protocols (T1071.001): Utilizing HTTP/HTTPS for C2.
  • Legitimate Services (T1102): Abusing legitimate cloud services for C2 communication.