APT28 Targets Diplomats with HeadLace Malware via Car Sale Phishing Lure

APT28 Targets Diplomats with HeadLace Malware via Car Sale Phishing Lure

August 2, 2024 at 12:42PM

A Russia-linked threat actor, APT28, has been using a car-for-sale phishing lure to deploy the HeadLace backdoor in a campaign targeting diplomats since March 2024. The attacks involve the use of a legitimate service called webhook[.]site to deliver malicious files and are linked to previous campaigns by APT28. The tactics align with past Fighting Ursa operations.

Key Takeaways from Meeting Notes:

1. A Russia-linked threat actor, identified as APT28 (also known as BlueDelta, Fancy Bear, and others), has been linked to a recent campaign using a car-for-sale phishing lure to distribute the HeadLace Windows backdoor.
2. The campaign primarily targeted diplomats and began in March 2024.
3. APT28 was previously implicated in targeting European networks with the HeadLace malware and credential-harvesting web pages in May.
4. The attacks are characterized by the use of legitimate services such as webhook[.]site and decoy images to deliver malicious files and execute them on Windows-based systems.
5. The HeadLace backdoor, used exclusively by APT28, involves tactics that align with their previously documented campaigns.

If you need further assistance or additional information, feel free to ask.

Full Article