Russian BlueDelta hackers ran phishing campaign against Ukrainian webmail users

Russian state-backed hackers have run a months-long phishing campaign against users of UKR.NET, a popular Ukrainian webmail and news service, in an effort to harvest credentials and gather intelligence, cybersecurity researchers said.

The operation — active from June 2024 through April 2025 — was attributed to BlueDelta, also known as APT28, Fancy Bear or Forest Blizzard, according to a report published on Wednesday by Recorded Future’s Insikt Group. The Record is an editorially independent unit of Recorded Future.

Researchers said the campaign likely aimed to collect sensitive information from Ukrainian users in support of broader Russian intelligence objectives.

Insikt observed the hackers setting up multiple fake login pages designed to mimic UKR.NET’s authentication portal. Victims were lured through phishing emails containing PDF attachments with embedded links to the fraudulent pages — a tactic researchers said was likely intended to bypass automated email security filters.

Analysis of the phishing infrastructure revealed more than 20 linked PDF files, which researchers believe were distributed to targets as part of the campaign. The documents warned users of suspicious activity on their UKR.NET accounts and urged them to click a link to reset their passwords.

“BlueDelta’s continued abuse of free hosting and anonymized tunneling infrastructure likely reflects an adaptive response to Western-led infrastructure takedowns in early 2024,” the researchers said.

BlueDelta has carried out cyber-espionage and credential-harvesting operations for more than a decade, targeting government bodies, defence contractors, weapons suppliers, logistics firms and policy think tanks, Western governments and security firms say.

Insikt Group warned the activity was unlikely to stop soon.

“BlueDelta is likely to sustain credential-harvesting activity through 2025 and into 2026,” the report said, adding that future campaigns would probably rely on an even wider range of free hosting and redirection services to maintain operations amid ongoing law enforcement efforts.

Webmail services have become a frequent target for espionage-linked hacking groups over the past two years.

In a separate campaign in May, the group was observed exploiting cross-site scripting vulnerabilities to target webmail servers used by state entities and defence companies in Eastern Europe, primarily in Ukraine, Bulgaria and Romania, researchers said.

In 2023, another state-backed group, Winter Vivern, exploited a previously unknown flaw in Roundcube webmail software used by governments across Europe. That same year, APT28 targeted Ukrainian government bodies and a military aviation-related company by abusing multiple vulnerabilities in Roundcube, using Russia’s invasion of Ukraine as a lure to trick victims into opening malicious emails.

Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Daryna Antoniuk

Daryna Antoniuk

is a reporter for Recorded Future News based in Ukraine. She writes about cybersecurity startups, cyberattacks in Eastern Europe and the state of the cyberwar between Ukraine and Russia. She previously was a tech reporter for Forbes Ukraine. Her work has also been published at Sifted, The Kyiv Independent and The Kyiv Post.

 

Total
0
Shares
Previous Post

SonicWall Fixes Actively Exploited CVE-2025-40602 in SMA 100 Appliances

Next Post

FTC orders crypto platform Nomad to distribute $37.5 million after 2022 theft

Related Posts

Three Flaws in Anthropic MCP Git Server Enable File Access and Code Execution

A set of three security vulnerabilities has been disclosed in mcp-server-git, the official Git Model Context Protocol (MCP) server maintained by Anthropic, that could be exploited to read or delete arbitrary files and execute code under certain conditions. "These flaws can be exploited through prompt injection, meaning an attacker who can influence what an AI assistant reads (a malicious README,
Read More

Two Ivanti EPMM Zero-Day RCE Flaws Actively Exploited, Security Updates Released

Ivanti has rolled out security updates to address two security flaws impacting Ivanti Endpoint Manager Mobile (EPMM) that have been exploited in zero-day attacks, one of which has been added by the U.S. Cybersecurity and Infrastructure Security Agency (CISA) to its Known Exploited Vulnerabilities (KEV) catalog. The critical-severity vulnerabilities are listed below - CVE-2026-1281 (CVSS score:
Read More

Mustang Panda Uses Signed Kernel-Mode Rootkit to Load TONESHELL Backdoor

The Chinese hacking group known as Mustang Panda has leveraged a previously undocumented kernel-mode rootkit driver to deliver a new variant of backdoor dubbed TONESHELL in a cyber attack detected in mid-2025 targeting an unspecified entity in Asia. The findings come from Kaspersky, which observed the new backdoor variant in cyber espionage campaigns mounted by the hacking group targeting
Read More