{"id":43882,"date":"2026-02-24T11:54:39","date_gmt":"2026-02-24T03:54:39","guid":{"rendered":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/2026\/02\/24\/apt28-targeted-european-entities-using-webhook-based-macro-malware\/"},"modified":"2026-02-24T11:54:39","modified_gmt":"2026-02-24T03:54:39","slug":"apt28-targeted-european-entities-using-webhook-based-macro-malware","status":"publish","type":"post","link":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/2026\/02\/24\/apt28-targeted-european-entities-using-webhook-based-macro-malware\/","title":{"rendered":"APT28 Targeted European Entities Using Webhook-Based Macro Malware"},"content":{"rendered":"<div style=\"clear: both;\"><a href=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjSwbKDzax_Hh_RHSU7qEInhqGvzoEncnUbB3WgxiRorJPzrvWGo2GCCC0_94YDAdaIs3gBMgO8N4iM4FoMzMiaM1icI-NX2qTf5Dflmv25XR66ni1JEcMl0HxwApTpA5W48R9KLgF5oo7uB8FAjoUrI3h7FxPgoER_FCPPgJ2gHZQyk3BR4kZkt-tU6CFG\/s1600\/malware-attack-eu.jpg\" style=\"display: block; padding: 1em 0; text-align: center; clear: left; float: left;\"><img decoding=\"async\" border=\"0\" data-original-height=\"470\" data-original-width=\"900\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjSwbKDzax_Hh_RHSU7qEInhqGvzoEncnUbB3WgxiRorJPzrvWGo2GCCC0_94YDAdaIs3gBMgO8N4iM4FoMzMiaM1icI-NX2qTf5Dflmv25XR66ni1JEcMl0HxwApTpA5W48R9KLgF5oo7uB8FAjoUrI3h7FxPgoER_FCPPgJ2gHZQyk3BR4kZkt-tU6CFG\/s1600\/malware-attack-eu.jpg\" alt=\"APT28 Targeted European Entities Using Webhook-Based Macro Malware\"\/><\/a><\/div>\n<p>The Russia-linked <a href=\"https:\/\/thehackernews.com\/2025\/09\/russian-apt28-deploys-notdoor-outlook.html\" rel=\"noopener\" target=\"_blank\">state-sponsored threat actor<\/a> tracked as <a href=\"https:\/\/thehackernews.com\/2026\/02\/apt28-uses-microsoft-office-cve-2026.html\" rel=\"noopener\" target=\"_blank\">APT28<\/a> has been attributed to a new campaign targeting specific entities in Western and Central Europe.<\/p>\n<p>The activity, per S2 Grupo&#8217;s LAB52 threat intelligence team, was active between September 2025 and January 2026. It has been codenamed <strong>Operation MacroMaze<\/strong>. &#8220;The campaign relies on basic tooling and the exploitation of legitimate services for infrastructure and data exfiltration,&#8221; the cybersecurity company <a href=\"https:\/\/lab52.io\/blog\/operation-macromaze-new-apt28-campaign-using-basic-tooling-and-legit-infrastructure\/\" rel=\"noopener\" target=\"_blank\">said<\/a>.<\/p>\n<p>The attack chains employ spear-phishing emails as a starting point to distribute lure documents that contain a common structural element within their XML, a field named &#8220;INCLUDEPICTURE&#8221; that points to a webhook[.]site URL that hosts a JPG image. This, in turn, causes the image file to be fetched from the remote server when the document is opened.<\/p>\n<p>Put differently, this mechanism acts as a beaconing mechanism akin to a tracking pixel that triggers an outbound HTTP request to the webhook[.]site URL upon opening the document. The server operator can log metadata associated with the request, confirming that the document was indeed opened by the recipient.<\/p>\n<p>LAB52 said it identified multiple documents with slightly tweaked macros between late September 2025 and January 2026, all of which function as a dropper to establish a foothold on the compromised host and deliver additional payloads.<\/p>\n<p>&#8220;While the core logic of all the macros detected remains consistent, the scripts show an evolution in evasion techniques, ranging from &#8216;headless&#8217; browser execution in the older version to the use of keyboard simulation (SendKeys) in the newer versions to potentially bypass security prompts,&#8221; the Spanish cybersecurity company explained.<\/p>\n<p>The macro is designed to execute a Visual Basic Script (VBScript) to move the infection to the next stage. The script, for its part, runs a CMD file to establish persistence via scheduled tasks and launch a batch script for rendering a small Base64-encoded HTML payload in Microsoft Edge in headless mode to evade detection, retrieve a command from the webhook[.]site endpoint, execute it, capture its out, and exfiltrate it to another webhook[.]site instance in the form of an HTML file.<\/p>\n<p>A second variant of the batch script has been found to eschew headless execution in favor of moving the browser window off-screen, followed by aggressively terminating all other Edge browser processes to ensure a controlled environment.<\/p>\n<p>&#8220;When the resulting HTML file is rendered by Microsoft Edge, the form is submitted, causing the collected command output to be exfiltrated to the remote webhook endpoint without user interaction,&#8221; LAB52 said. &#8220;This browser-based exfiltration technique leverages standard HTML functionality to transmit data while minimizing detectable artifacts on disk.&#8221;<\/p>\n<p>&#8220;This campaign proves that simplicity can be powerful. The attacker uses very basic tools (batch files, tiny VBS launchers and simple HTML) but arranges them with care to maximise stealth: Moving operations into hidden or off-screen browser sessions, cleaning up artifacts, and outsourcing both payload delivery and data exfiltration to widely used webhook services.&#8221;<\/p>\n<div><\/div>\n<div>Found this article interesting?  Follow us on <a href='https:\/\/news.google.com\/publications\/CAAqLQgKIidDQklTRndnTWFoTUtFWFJvWldoaFkydGxjbTVsZDNNdVkyOXRLQUFQAQ' rel='noopener' target='_blank'>Google News<\/a>, <a href='https:\/\/twitter.com\/thehackersnews' rel='noopener' target='_blank'>Twitter<\/a> and <a href='https:\/\/www.linkedin.com\/company\/thehackernews\/' rel='noopener' target='_blank'>LinkedIn<\/a> to read more exclusive content we post.<\/div>\n","protected":false},"excerpt":{"rendered":"<p>The Russia-linked state-sponsored threat actor tracked as APT28 has been attributed to a new campaign targeting specific entities in Western and Central Europe.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6],"tags":[],"class_list":["post-43882","post","type-post","status-publish","format-standard","hentry","category-thehackernews"],"_links":{"self":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts\/43882","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/comments?post=43882"}],"version-history":[{"count":0,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts\/43882\/revisions"}],"wp:attachment":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/media?parent=43882"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/categories?post=43882"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/tags?post=43882"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}