top of page

APT28 Targeted European Entities Using Webhook-Based Macro Malware

  • Feb 24
  • 1 min read

Background


The Russia-linked state-sponsored threat actor tracked as APT28 has been attributed to a new campaign targeting specific entities in Western and Central Europe. The activity, per S2 Grupo's LAB52 threat intelligence team, was active between September 2025 and January 2026. It has been codenamed Operation MacroMaze.


Key Findings


  • The campaign relies on basic tooling and the exploitation of legitimate services for infrastructure and data exfiltration.

  • The attack chains employ spear-phishing emails as a starting point to distribute lure documents that contain a common structural element within their XML, a field named "INCLUDEPICTURE" that points to a webhook[.]site URL that hosts a JPG image.

  • This mechanism acts as a beaconing mechanism akin to a tracking pixel that triggers an outbound HTTP request to the webhook[.]site URL upon opening the document.

  • The macro is designed to execute a Visual Basic Script (VBScript) to move the infection to the next stage, which establishes persistence via scheduled tasks and launches a batch script for rendering a small Base64-encoded HTML payload in Microsoft Edge in headless mode to evade detection.

  • A second variant of the batch script has been found to eschew headless execution in favor of moving the browser window off-screen, followed by aggressively terminating all other Edge browser processes to ensure a controlled environment.

  • The browser-based exfiltration technique leverages standard HTML functionality to transmit data while minimizing detectable artifacts on disk.


MITRE ATT&CK Techniques


  • T1059.005 - Command and Scripting Interpreter: Visual Basic

  • T1053.005 - Scheduled Task/Job: Scheduled Task

  • T1218.005 - Signed Binary Proxy Execution: Mshta

  • T1204.002 - User Execution: Malicious File


IOCs Mentioned


  • webhook[.]site


Sources


  • https://thehackernews.com/2026/02/apt28-targeted-european-entities-using.html

  • https://www.socdefenders.ai/item/3e8113e4-98f4-4c3b-8834-c6c0de7618ee

  • https://www.linkedin.com/posts/cyber-news-live_apt28-targeted-european-entities-using-webhook-based-activity-7431915921801211904-kQLd

  • https://x.com/Dinosn/status/2026144611249336767

Recent Posts

See All

Comments


  • Youtube

© 2025 by Explain IT Again. Powered and secured by Wix

bottom of page