🇷🇺

APT 28

APT Group Information theft and espionage 102 zero-day CVEs ETDA ✓

Also Known As 29 names

APT-C-20 ATK5 Blue Athena BlueDelta Fancy Bear FROZENLAKE Fighting Ursa Forest Blizzard G0007 Grey-Cloud Grizzly Steppe Group 74 Group-4127 GruesomeLarch IRON TWILIGHT ITG05 Pawn Storm SIG40 SNAKEMACKEREL STRONTIUM Sednit Sofacy Swallowtail T-APT-12 TA422 TG-4127 Tsar Team UAC-0028 APT 28

Target Countries 53

Countries highlighted in red

Afghanistan Armenia Australia Azerbaijan Belgium Bulgaria Brazil Belarus Canada Switzerland Chile China Cyprus Czech Republic Germany Spain France United Kingdom Georgia Greece Croatia Hungary Ireland India Iraq Islamic Republic of Iran Italy Jordan Japan Republic of Korea Kazakhstan Latvia Montenegro Mongolia Mexico Malaysia Netherlands Norway Peru Pakistan Poland Romania Saudi Arabia Sweden Slovakia Thailand Tajikistan Turkey Ukraine Uganda United States Uzbekistan South Africa

Details

Origin 🇷🇺 RU
Last Updated 24 Sep 2025

Malware Families 35

sakula_rat
evilquest
arguepatch
sedreco
havex_rat
fusiondrive
dreambot
computrace
snifula
pocodown
grunt
houdini
agent_tesla
agent_btz
zhmimikatz
ldr4
apk.rat_on
turla_ff_ext
stealler
pas
driveocean
eternal_petya
unidentified_078
nodejs_ransom
unidentified_114
saigon
zebrocy_au3
credomap
vawtrak
xagent
mocky_lnk
PhantomCard
dbatloader
gozi
seduploader

MITRE ATT&CK 262

G0007 T1001 - Data Obfuscation T1001.001 T1001.003 - Protocol Impersonation T1002 T1003 - OS Credential Dumping T1003.001 T1003.002 T1003.003 T1005 - Data from Local System T1006 T1012 - Query Registry T1014 - Rootkit T1016 - System Network Configuration Discovery T1016.002 T1018 - Remote System Discovery T1020 - Automated Exfiltration T1021 - Remote Services T1021.001 T1021.002 T1021.004 - SSH T1024 T1025 - Data from Removable Media T1027 - Obfuscated Files or Information T1027.013 T1030 - Data Transfer Size Limits T1033 - System Owner/User Discovery T1036 - Masquerading T1036.004 T1036.005 - Match Legitimate Name or Location T1037 - Boot or Logon Initialization Scripts T1037.001 T1039 - Data from Network Shared Drive T1040 - Network Sniffing T1041 - Exfiltration Over C2 Channel T1043 T1045 - Software Packing T1046 - Network Service Scanning T1047 - Windows Management Instrumentation T1048 - Exfiltration Over Alternative Protocol T1048.002 T1049 - System Network Connections Discovery T1053 - Scheduled Task/Job T1053.003 - Cron T1053.005 - Scheduled Task T1055 - Process Injection T1056 - Input Capture T1056.001 T1056.002 - GUI Input Capture T1056.003 - Web Portal Capture T1057 - Process Discovery T1059 - Command and Scripting Interpreter T1059.001 - PowerShell T1059.003 - Windows Command Shell T1059.005 - Visual Basic T1059.006 - Python T1059.007 - JavaScript T1060 - Registry Run Keys / Startup Folder T1064 - Scripting T1067 T1068 - Exploitation for Privilege Escalation T1069 - Permission Groups Discovery T1070 - Indicator Removal on Host T1070.001 T1070.004 - File Deletion T1070.006 T1071 - Application Layer Protocol T1071.001 - Web Protocols T1071.003 T1071.004 - DNS T1074 - Data Staged T1074.001 - Local Data Staging T1074.002 T1075 T1078 - Valid Accounts T1078.004 T1081 - Credentials in Files T1082 - System Information Discovery T1083 - File and Directory Discovery T1085 T1086 - PowerShell T1087 - Account Discovery T1087.003 - Email Account T1090 - Proxy T1090.001 T1090.002 T1090.003 T1091 - Replication Through Removable Media T1092 - Communication Through Removable Media T1095 - Non-Application Layer Protocol T1096 - NTFS File Attributes T1098 - Account Manipulation T1098.001 - Additional Cloud Credentials T1098.002 T1099 T1102 - Web Service T1102.001 - Dead Drop Resolver T1102.002 T1102.003 - One-Way Communication T1104 - Multi-Stage Channels T1105 - Ingress Tool Transfer T1106 - Native API T1107 - File Deletion T1110 - Brute Force T1110.001 T1110.003 - Password Spraying T1111 - Two-Factor Authentication Interception T1112 - Modify Registry T1113 - Screen Capture T1114 - Email Collection T1114.002 - Remote Email Collection T1114.003 - Email Forwarding Rule T1115 - Clipboard Data T1119 - Automated Collection T1120 - Peripheral Device Discovery T1122 T1124 T1127 - Trusted Developer Utilities Proxy Execution T1129 - Shared Modules T1132 - Data Encoding T1132.001 - Standard Encoding T1133 - External Remote Services T1134 - Access Token Manipulation T1134.001 T1136 T1137 - Office Application Startup T1137.001 - Office Template Macros T1137.002 T1140 - Deobfuscate/Decode Files or Information T1143 - Hidden Window T1158 - Hidden Files and Directories T1173 T1176 - Browser Extensions T1185 - Man in the Browser T1187 - Forced Authentication T1189 - Drive-by Compromise T1190 - Exploit Public-Facing Application T1192 - Spearphishing Link T1193 T1195 - Supply Chain Compromise T1199 - Trusted Relationship T1202 - Indirect Command Execution T1203 - Exploitation for Client Execution T1204 - User Execution T1204.001 - Malicious Link T1204.002 - Malicious File T1210 - Exploitation of Remote Services T1211 - Exploitation for Defense Evasion T1212 - Exploitation for Credential Access T1213 - Data from Information Repositories T1213.002 T1218 - Signed Binary Proxy Execution T1218.011 T1219 - Remote Access Software T1221 - Template Injection T1328 T1346 T1480 - Execution Guardrails T1482 - Domain Trust Discovery T1485 T1486 - Data Encrypted for Impact T1489 - Service Stop T1490 - Inhibit System Recovery T1497 - Virtualization/Sandbox Evasion T1497.001 - System Checks T1498 - Network Denial of Service T1505 - Server Software Component T1505.003 T1518 - Software Discovery T1527 T1528 - Steal Application Access Token T1529 T1530 - Data from Cloud Storage Object T1531 T1534 - Internal Spearphishing T1539 - Steal Web Session Cookie T1542 - Pre-OS Boot T1542.003 T1543 - Create or Modify System Process T1543.002 - Systemd Service T1546 - Event Triggered Execution T1546.015 T1547 - Boot or Logon Autostart Execution T1547.001 - Registry Run Keys / Startup Folder T1550 - Use Alternate Authentication Material T1550.001 T1550.002 T1552 T1553 - Subvert Trust Controls T1555 T1555.003 - Credentials from Web Browsers T1556 - Modify Authentication Process T1557 - Man-in-the-Middle T1557.004 T1559 - Inter-Process Communication T1559.002 T1560 - Archive Collected Data T1560.001 T1561 T1561.001 T1562 - Impair Defenses T1562.001 - Disable or Modify Tools T1562.004 T1564 - Hide Artifacts T1564.001 - Hidden Files and Directories T1564.003 - Hidden Window T1565 - Data Manipulation T1566 - Phishing T1566.001 - Spearphishing Attachment T1566.002 - Spearphishing Link T1567 - Exfiltration Over Web Service T1568 - Dynamic Resolution T1568.002 - Domain Generation Algorithms T1569 - System Services T1571 - Non-Standard Port T1573 - Encrypted Channel T1573.001 T1574 - Hijack Execution Flow T1574.002 - DLL Side-Loading T1583 - Acquire Infrastructure T1583.001 - Domains T1583.002 - DNS Server T1583.003 T1583.006 - Web Services T1584 - Compromise Infrastructure T1584.008 T1585 - Establish Accounts T1586 - Compromise Accounts T1586.002 - Email Accounts T1587 - Develop Capabilities T1588 - Obtain Capabilities T1588.002 T1588.007 T1589 - Gather Victim Identity Information T1589.001 T1591 T1592 - Gather Victim Host Information T1593 - Search Open Websites/Domains T1595 - Active Scanning T1595.002 T1596 T1598 - Phishing for Information T1598.003 T1608 - Stage Capabilities T1608.001 - Upload Malware T1608.005 - Link Target T1609 - Container Administration Command T1613 - Container and Resource Discovery T1669 T1684 T1684.001 T1685 T1685.005 T1686 T1686.003 TA0002 - Execution TA0003 - Persistence TA0004 - Privilege Escalation TA0005 - Defense Evasion TA0006 - Credential Access TA0007 - Discovery TA0011 - Command and Control

Related Zero-Days 102

CVE-2016-5195 CVE-2017-0199 CVE-2017-5638 CVE-2019-0708 CVE-2019-11510 CVE-2020-6418 CVE-2021-26855 CVE-2021-26857 CVE-2021-26858 CVE-2021-27065 CVE-2021-37973 CVE-2021-40449 CVE-2021-40539 CVE-2021-44228 CVE-2022-26134 CVE-2022-3236 CVE-2022-41128 CVE-2023-20198 CVE-2023-2033 CVE-2023-2136 CVE-2023-22515 CVE-2023-27350 CVE-2023-2868 CVE-2023-3079 CVE-2023-34048 CVE-2023-41991 CVE-2023-41992 CVE-2023-41993 CVE-2023-46604 CVE-2023-46805 CVE-2023-4762 CVE-2024-0012 CVE-2024-12356 CVE-2024-21287 CVE-2024-21412 CVE-2024-21887 CVE-2024-24919 CVE-2024-37079 CVE-2024-38112 CVE-2024-38178 CVE-2024-38193 CVE-2024-43461 CVE-2024-4610 CVE-2024-4671 CVE-2024-47575 CVE-2024-49039 CVE-2024-50623 CVE-2024-5274 CVE-2024-8963 CVE-2024-9680 CVE-2025-0282 CVE-2025-0283 CVE-2025-0994 CVE-2025-10035 CVE-2025-10585 CVE-2025-13223 CVE-2025-14174 CVE-2025-20333 CVE-2025-20337 CVE-2025-20362 CVE-2025-20363 CVE-2025-21043 CVE-2025-21391 CVE-2025-21418 CVE-2025-22224 CVE-2025-22225 CVE-2025-22226 CVE-2025-22457 CVE-2025-2783 CVE-2025-29824 CVE-2025-32709 CVE-2025-33053 CVE-2025-37164 CVE-2025-38352 CVE-2025-40551 CVE-2025-41244 CVE-2025-43300 CVE-2025-43529 CVE-2025-48543 CVE-2025-49704 CVE-2025-52691 CVE-2025-53770 CVE-2025-53771 CVE-2025-55182 CVE-2025-59287 CVE-2025-61757 CVE-2025-61932 CVE-2025-6218 CVE-2025-62221 CVE-2025-6554 CVE-2025-6558 CVE-2025-68645 CVE-2025-7775 CVE-2025-8088 CVE-2025-8110 CVE-2025-9491 CVE-2026-20045 CVE-2026-20805 CVE-2026-21509 CVE-2026-21513 CVE-2026-24423 CVE-2026-24858