Russian-linked threat actor UAC-0063, associated with APT28, has been conducting sophisticated cyber espionage campaigns targeting Kazakhstan and other Central Asian countries, as well as expanding operations to European nations including Germany, the UK, the Netherlands, Romania, and Georgia. [1] [2] [3] [4] The group employs a multi-stage infection chain dubbed "Double-Tap," which utilizes weaponized Microsoft Office documents, often containing legitimate content from government sources, to deliver malware such as HATVIBE, CHERRYSPY, and STILLARCH. [5] [6] [7] The malware suite employed by UAC-0063 includes HATVIBE (a loader…
Welcome back to
Fletch
APT28
Mitigate zero-day exploits targeting governmental sectors by enhancing cyber defenses
mainstream
high
Fletch trends on APT28
re-emerged
41 d ago
emerged
Sep 26th 2022
evolved
21 d ago