Technical Threat Report: Russian GRU Cyber Campaign Targeting Western Logistics and Technology Sectors

GRU

On May 21, 2025, CISA and international cybersecurity authorities issued CSA AA25-141A, attributing a sophisticated espionage campaign to GRU Unit 26165 (APT28/Fancy Bear). These operations have targeted logistics and IT support organizations involved in foreign aid to Ukraine.

Zeek Threat Intelligence Feed - Download


Summary of Threat Campaign

APT28 uses diverse tactics to infiltrate and persist in networks, combining spearphishing, zero-day exploitation, credential attacks, and post-exploitation frameworks to exfiltrate sensitive operational data.

Common Techniques Used:

Initial Access

  • Credential stuffing and brute-force attacks via Tor and commercial VPNs
  • Spearphishing with links to spoofed login pages
  • Exploitation of CVEs, including:
    • CVE-2023-23397 (Outlook NTLM hash leak)
    • CVE-2023-38831 (WinRAR exploit)
    • Roundcube CVEs: 2020-12641, 2020-35730, 2021-44026

Lateral Movement & Persistence

  • Deployment of OpenSSH for command/control
  • Use of native tools like Impacket, PsExec, Certipy, ADExplorer
  • Lateral RDP access and NTDS.dit extraction
  • Scheduled task creation with schtasks

Data Collection & Exfiltration

  • Abuse of mailbox permissions for persistent email exfiltration
  • Deletion of logs with wevtutil
  • Exfiltration using encrypted SSH tunnels

Indicators of Compromise (IOCs)

These indicators may no longer be under actor control or could involve shared infrastructure. Combine with behavioral heuristics for meaningful detection.

Known Exploited Email Accounts

  • md-shoeb@alfathdoor[.]com[.]sa
  • jayam@wizzsolutions[.]com
  • accounts@regencyservice[.]in
  • m.salim@tsc-me[.]com
  • vikram.anand@4ginfosource[.]com
  • mdelafuente@ukwwfze[.]com
  • sarah@cosmicgold469[.]co[.]za
  • franch1.lanka@bplanka[.]com
  • commerical@vanadrink[.]com
  • maint@goldenloaduae[.]com
  • karina@bhpcapital[.]com
  • tv@coastalareabank[.]com
  • ashoke.kumar@hbclife[.]in

IP Addresses Used for Brute Force or Infrastructure

  • 213.32.252.221, 124.168.91.178, 194.126.178.8, 159.196.128.120

Brute Forcing IPs (June - August 2024)

  • June: 192.162.174.94, 207.244.71.84, 31.135.199.145...
  • July: 79.184.25.198, 91.149.253.204, 103.97.203.29...
  • August: 91.149.254.75, 91.149.255.122, 91.149.255.195...

Common Webmail Domains:

  • portugalmail[.]pt
  • mail-online[.]dk
  • email[.]cz
  • seznam[.]cz

Known Malicious Archive Filenames

  • calc.war.zip
  • news_week_6.zip
  • Roadmap.zip
  • SEDE-PV-2023-10-09-1_EN.zip
  • Zeyilname.zip

Malicious Scripts & Living-off-the-Land (LOTL) Tactics

APT28 actors use legitimate tools in unauthorized ways. Organizations should monitor:

LOTL Binaries

  • ntdsutil, wevtutil, vssadmin, ADExplorer, schtasks, OpenSSH
  • whoami, tasklist, hostname, arp, systeminfo, net, wmic
  • cacls, icacls, ssh, reg

Malicious Scripts and Tools

  • Certipy – AD Certificate Services enumeration/abuse
  • Get-GPPPassword.py – Harvest insecure Group Policy creds
  • ldap-dump.py – AD user enumeration
  • Hikvision backdoor detection string: YWRtaW46MTEK

Suspicious Command Patterns

  • edge.exe "-headless-new -disable-gpu"
  • ntdsutil.exe "activate instance ntds" ifm "create full C:\\temp\\[a-z]{3}" quit quit
  • ssh -Nf
  • schtasks /create /xml

Heuristics and behavioral analytics should accompany rule-based detection to limit false positives from benign admin actions.


Recommended Actions

  • Patch all systems vulnerable to CVEs mentioned
  • Block and monitor IPs/IP ranges after vetting
  • Hunt for suspicious uses of LOTL binaries
  • Monitor archive extraction from email and webmail providers above
  • Implement alerting on suspicious command line behavior
  • Audit mailbox permissions for privilege abuse
  • Segment and monitor access to ICS/SCADA interfaces

References

  1. CISA Advisory AA25-141A
  2. MITRE ATT&CK: APT28
  3. Living Off the Land Guidance (CISA/NSA)
  4. Certipy GitHub
  5. Outlook CVE-2023-23397
  6. WinRAR CVE-2023-38831
  7. Roundcube CVEs

Critical Path Security continuously tracks advanced persistent threats and works with clients to build layered detection models that account for actor TTPs and subtle network deviations.

Reach out to our team for proactive assessments and defense-in-depth strategy engagements.