Fletch logo

Sign up for free

Google

Google

Microsoft

Microsoft

APT28

Mitigate zero-day exploits targeting governmental sectors by enhancing cyber defenses

mainstream

high

Featured

Fletch trends on APT28

Summary
Last updated 22 days ago

Mitigate zero-day exploits targeting governmental sectors by enhancing cyber defenses

Russian-linked threat actor UAC-0063, associated with APT28, has been conducting sophisticated cyber espionage campaigns targeting Kazakhstan and other Central Asian countries, as well as expanding operations to European nations including Germany, the UK, the Netherlands, Romania, and Georgia. [1] [2] [3] [4] The group employs a multi-stage infection chain dubbed "Double-Tap," which utilizes weaponized Microsoft Office documents, often containing legitimate content from government sources, to deliver malware such as HATVIBE, CHERRYSPY, and STILLARCH. [5] [6] [7] The malware suite employed by UAC-0063 includes HATVIBE (a loader…

Expert Advice

Select technologies you use to get accurate advice:

Communication
AI Beta

Who do you want to communicate with?

No audience selected

Select an audience from the list above to see tailored communication that you can share

Was this communication helpful?

Fletch AI See more details on this threat, including long term advice, communications templates, and how it impacts you. Then explore more threats. It's free to get started.