Russian BlueDelta hackers ran phishing campaign against Ukrainian webmail users

Russian state-backed hackers have run a months-long phishing campaign against users of UKR.NET, a popular Ukrainian webmail and news service, in an effort to harvest credentials and gather intelligence, cybersecurity researchers said.

The operation — active from June 2024 through April 2025 — was attributed to BlueDelta, also known as APT28, Fancy Bear or Forest Blizzard, according to a report published on Wednesday by Recorded Future’s Insikt Group. The Record is an editorially independent unit of Recorded Future.

Researchers said the campaign likely aimed to collect sensitive information from Ukrainian users in support of broader Russian intelligence objectives.

Insikt observed the hackers setting up multiple fake login pages designed to mimic UKR.NET’s authentication portal. Victims were lured through phishing emails containing PDF attachments with embedded links to the fraudulent pages — a tactic researchers said was likely intended to bypass automated email security filters.

Analysis of the phishing infrastructure revealed more than 20 linked PDF files, which researchers believe were distributed to targets as part of the campaign. The documents warned users of suspicious activity on their UKR.NET accounts and urged them to click a link to reset their passwords.

“BlueDelta’s continued abuse of free hosting and anonymized tunneling infrastructure likely reflects an adaptive response to Western-led infrastructure takedowns in early 2024,” the researchers said.

BlueDelta has carried out cyber-espionage and credential-harvesting operations for more than a decade, targeting government bodies, defence contractors, weapons suppliers, logistics firms and policy think tanks, Western governments and security firms say.

Insikt Group warned the activity was unlikely to stop soon.

“BlueDelta is likely to sustain credential-harvesting activity through 2025 and into 2026,” the report said, adding that future campaigns would probably rely on an even wider range of free hosting and redirection services to maintain operations amid ongoing law enforcement efforts.

Webmail services have become a frequent target for espionage-linked hacking groups over the past two years.

In a separate campaign in May, the group was observed exploiting cross-site scripting vulnerabilities to target webmail servers used by state entities and defence companies in Eastern Europe, primarily in Ukraine, Bulgaria and Romania, researchers said.

In 2023, another state-backed group, Winter Vivern, exploited a previously unknown flaw in Roundcube webmail software used by governments across Europe. That same year, APT28 targeted Ukrainian government bodies and a military aviation-related company by abusing multiple vulnerabilities in Roundcube, using Russia’s invasion of Ukraine as a lure to trick victims into opening malicious emails.

Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Daryna Antoniuk

Daryna Antoniuk

is a reporter for Recorded Future News based in Ukraine. She writes about cybersecurity startups, cyberattacks in Eastern Europe and the state of the cyberwar between Ukraine and Russia. She previously was a tech reporter for Forbes Ukraine. Her work has also been published at Sifted, The Kyiv Independent and The Kyiv Post.

 

Total
0
Shares
Previous Post

SonicWall Fixes Actively Exploited CVE-2025-40602 in SMA 100 Appliances

Next Post

FTC orders crypto platform Nomad to distribute $37.5 million after 2022 theft

Related Posts

Secure AI at Scale and Speed — Learn the Framework in this Free Webinar

AI is everywhere—and your company wants in. Faster products, smarter systems, fewer bottlenecks. But if you're in security, that excitement often comes with a sinking feeling. Because while everyone else is racing ahead, you're left trying to manage a growing web of AI agents you didn’t create, can’t fully see, and weren’t designed to control. Join our upcoming webinar and learn how to make AI
Read More

Google Identifies Three New Russian Malware Families Created by COLDRIVER Hackers

A new malware attributed to the Russia-linked hacking group known as COLDRIVER has undergone numerous developmental iterations since May 2025, suggesting an increased "operations tempo" from the threat actor. The findings come from Google Threat Intelligence Group (GTIG), which said the state-sponsored hacking crew has rapidly refined and retooled its malware arsenal merely five days following
Read More

Red Hat OpenShift AI Flaw Exposes Hybrid Cloud Infrastructure to Full Takeover

A severe security flaw has been disclosed in the Red Hat OpenShift AI service that could allow attackers to escalate privileges and take control of the complete infrastructure under certain conditions. OpenShift AI is a platform for managing the lifecycle of predictive and generative artificial intelligence (GenAI) models at scale and across hybrid cloud environments. It also facilitates data
Read More