UINAT
NewsRankingsCompaniesGuidesBreachesCompliance
TagsAbout
Home/Tags/APT28

APT28

5 articles tagged with "APT28".

APT28 Deploys LAMEHUG: First Known Malware Using LLMs in Live Operations

Russia's APT28 has deployed LAMEHUG and PROMPTSTEAL malware that queries large language models via Hugging Face to dynamically generate attack commands, marking the first confirmed use of AI-powered malware in active cyber operations.

February 4, 2026 APT28RussiaAI

APT28 Exploits Microsoft Office Zero-Day in Operation Neusploit Targeting Ukraine

Russia's APT28 weaponized CVE-2026-21509 within three days of Microsoft's disclosure, deploying MiniDoor email stealers and PixyNetLoader against Ukraine, Slovakia, and Romania.

February 3, 2026 APT28Russiazero-day

CISA Adds Five Vulnerabilities to KEV Catalog Including Microsoft Office Zero-Day

New additions include CVE-2026-21509 actively exploited by APT28, a Linux kernel flaw from 2018, and SmarterMail vulnerabilities. Federal agencies face February 16 remediation deadline.

January 26, 2026 CISAKEVvulnerabilities

Microsoft Patches Actively Exploited Office Zero-Day Used by APT28

CVE-2026-21509 bypasses OLE security mitigations in Microsoft Office. Russia-linked APT28 is exploiting it against targets in Ukraine and the EU. Emergency patches available.

January 26, 2026 Microsoftzero-dayvulnerability

Russia's Fancy Bear APT Runs Low-Cost Credential Harvesting Campaign Against Global Targets

APT28 targets energy, defense, and policy organizations in Turkey, the Balkans, and Central Asia with phishing campaigns using legitimate PDFs from real think tanks and free hosting infrastructure.

January 9, 2026 APTRussiaFancy Bear
SYS ONLINE
PAGES 963
UPDATED 2026-02-06
UINAT

Security news, vulnerability alerts, and expert resources for professionals who defend the perimeter.

// Sections

  • › News
  • › Rankings
  • › Companies
  • › Breaches

// Resources

  • › Guides
  • › Compliance
  • › Tags
  • › About

// Feeds

  • › All Content
  • › News Only
  • › Breaches Only

> © 2026 UINAT. All rights reserved.

[ DEFEND THE PERIMETER ]

Search