Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Incidents

Russian APT28 Targeting French Networks

October 27, 2023
Reading Time: 7 mins read
in Incidents

France has reported that the Russian APT28 hacking group, also known as ‘Strontium’ or ‘Fancy Bear,’ has been conducting cyberattacks on critical networks in the country since the second half of 2021. APT28, believed to be linked to Russia’s military intelligence service GRU, was involved in exploiting vulnerabilities in WinRAR and Microsoft Outlook. The group has been targeting government entities, businesses, universities, research institutes, and think tanks. They are known to compromise peripheral devices on French organizations’ critical networks while moving away from using backdoors to avoid detection.

ANSSI, the French National Agency for the Security of Information Systems, published a report detailing APT28‘s tactics, techniques, and procedures (TTPs). The group employs techniques like brute-forcing and exploiting leaked databases to breach accounts and Ubiquiti routers on targeted networks. An example from April 2023 shows the attackers using a phishing campaign to trick victims into running PowerShell, revealing system configurations and other OS details. The group also exploited zero-day vulnerabilities, such as CVE-2023-23397, in Outlook and other known vulnerabilities in various applications.

As a cyber-espionage group, data access and exfiltration are central to APT28’s operations. They have been observed retrieving authentication information using native utilities and stealing emails with sensitive information. ANSSI noted that the attackers use legitimate cloud services like Microsoft OneDrive and Google Drive for their command and control server (C2) infrastructure, making their activities less likely to trigger alarms by traffic monitoring tools. The group employs various tools for data exfiltration, including the CredoMap implant, which targets web browser-stored information like authentication cookies, and services like Mockbin and the Pipedream service.

ANSSI recommends a comprehensive security approach to address the APT28 threat, with a strong focus on email security. Their key recommendations include ensuring the security and confidentiality of email exchanges, using secure exchange platforms to prevent email diversions or hijacks, minimizing the attack surface of webmail interfaces, and implementing capabilities to detect malicious emails. These measures aim to enhance overall security and protect against ongoing cyber threats.

References:

  • RAPPORT MENACES ET INCIDENTS DU CERT-FR
Tags: 2023APT28BackdoorCyber incidentCyber Incidents 2023CyberattackCybersecurityFancy BearFranceRussiaStrontiumVulnerabilitiesWinRAR
ADVERTISEMENT

Related Posts

Microsoft 365 Outage Hits Services

GitHub Copilot Chat Flaw Leaks Repo Data

October 10, 2025
Microsoft 365 Outage Hits Services

Crimson Collective Hits AWS Instances

October 10, 2025
Microsoft 365 Outage Hits Services

Microsoft 365 Outage Hits Services

October 10, 2025
BK Technologies Admits Cyber Breach

BK Technologies Admits Cyber Breach

October 10, 2025
BK Technologies Admits Cyber Breach

Dozens Hit in Oracle-Linked Hacks

October 10, 2025
BK Technologies Admits Cyber Breach

Chinese Hackers Hit Williams Connolly

October 10, 2025

Latest Alerts

BatShadow Unleashes Go Vampire Bot

Hackers Exploit Service Finder Flaw

FileFix Attack Evades Security Tools

Hackers Abuse WordPress for Phishing

Severe Framelink Figma MCP Code Flaw

Android Spyware ClayRat Imitates Apps

Subscribe to our newsletter

    Latest Incidents

    Crimson Collective Hits AWS Instances

    GitHub Copilot Chat Flaw Leaks Repo Data

    Microsoft 365 Outage Hits Services

    Dozens Hit in Oracle-Linked Hacks

    BK Technologies Admits Cyber Breach

    Chinese Hackers Hit Williams Connolly

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial