Operation MacroMaze: New APT28 Campaign Using Basic Tooling and Legitimate Infrastructure
Operation MacroMaze, attributed to APT28 (Fancy Bear), targets entities in Western and Central Europe from September 2025 to January 2026. The campaign utilizes basic tools and legitimate services for infrastructure and data exfiltration. Multiple documents with varying macro variants act as droppers, establishing a foothold by creating files in the %USERPROFILE% folder. The attack chain involves VBScript execution, scheduled task creation for persistence, and a multi-stage process using batch files. Exfiltration is achieved through HTML-based techniques, leveraging webhook.site for data transmission. Despite its simplicity, the campaign demonstrates effective operational tradeoffs, making detection and attribution challenging.
AI Analysis
Technical Summary
Operation MacroMaze is a targeted cyber espionage campaign attributed to the Russian state-sponsored threat actor APT28, also known as Fancy Bear. Active from September 2025 through January 2026, it focuses on entities in Western and Central Europe, with confirmed targeting of Spain. The campaign employs relatively simple but effective attack methods, leveraging Microsoft Office documents embedded with various macro variants as droppers. These macros create files within the %USERPROFILE% folder to establish an initial foothold. The infection chain proceeds with VBScript execution and the creation of scheduled tasks (MITRE ATT&CK technique T1053.005) to maintain persistence on compromised systems. A multi-stage process involving batch files is used to execute additional payloads and maintain control. For data exfiltration, the attackers use HTML-based techniques that send stolen information to webhook.site, a legitimate web service, thereby blending malicious traffic with normal network activity and complicating detection. The campaign uses basic tooling and legitimate infrastructure, which reduces the attack footprint and hinders attribution efforts. The use of common scripting languages (VBScript, batch files) and standard Windows features (scheduled tasks, user profile directories) demonstrates an operational tradeoff favoring stealth and simplicity over complexity. Indicators of compromise include multiple file hashes associated with the droppers and scripts. The campaign’s tactics, techniques, and procedures (TTPs) align with known APT28 behaviors, including persistence, credential access, and command execution techniques. No known exploits or CVEs are associated with this campaign, and it does not rely on zero-day vulnerabilities, instead exploiting user interaction via malicious macros. The campaign’s medium severity reflects its moderate impact potential and reliance on social engineering and basic scripting rather than advanced exploits.
Potential Impact
For European organizations, especially those in Spain and neighboring Western and Central European countries, Operation MacroMaze poses a significant espionage risk. The campaign’s ability to establish persistence and exfiltrate data using legitimate infrastructure makes it difficult to detect and mitigate. Confidentiality is primarily at risk, as sensitive information can be stolen via covert exfiltration channels. Integrity and availability impacts are less pronounced but could occur if attackers escalate privileges or deploy additional payloads. The use of basic tooling means that even organizations with mature security postures could be vulnerable if macro execution policies and endpoint monitoring are insufficient. The campaign could affect government agencies, defense contractors, critical infrastructure, and private sector companies holding strategic or sensitive data. The stealthy nature of the campaign increases the likelihood of prolonged undetected presence, enabling extensive data collection and potential follow-on attacks. The use of legitimate services for exfiltration also complicates network-based detection and response efforts, increasing operational risk for targeted organizations.
Mitigation Recommendations
1. Enforce strict macro security policies by disabling macros by default and only allowing macros from trusted, signed sources. 2. Implement application whitelisting to prevent unauthorized execution of VBScript and batch files, especially those launched from user profile directories. 3. Monitor and audit scheduled tasks creation and modifications (T1053.005), alerting on unusual or unauthorized tasks. 4. Deploy endpoint detection and response (EDR) solutions capable of detecting script-based attacks and anomalous file creation in user directories. 5. Inspect outbound network traffic for connections to uncommon or suspicious web services such as webhook.site, and apply network segmentation to limit data exfiltration paths. 6. Conduct user awareness training focused on the risks of enabling macros in unsolicited documents. 7. Regularly update and patch systems to reduce the attack surface, even though this campaign does not exploit known vulnerabilities. 8. Use threat intelligence feeds to block known malicious file hashes and indicators associated with Operation MacroMaze. 9. Employ behavioral analytics to detect multi-stage attack chains involving scripting and persistence mechanisms. 10. Establish incident response plans that include rapid containment and forensic analysis of script-based intrusions.
Affected Countries
Spain, Germany, France, Italy, Poland, Belgium, Netherlands
Indicators of Compromise
- hash: c83ce20c9e000654dc66234772380a95
- hash: bcf2e5228263049910ca3d14dc55727a96c2ad51
- hash: 5486107244ecaa3a0824895fa432827cc12df69620ca94aaa4ad75f39ac79588
- hash: 58cfb8b9fee1caa94813c259901dc1baa96bae7d30d79b79a7d441d0ee4e577e
- hash: 9097d9cf5e6659e869bf2edf766741b687e3d8570036d853c0ca59ae72f9e9fc
- hash: b0f9f0a34ccab1337fbcca24b4f894de8d6d3a6f5db2e0463e2320215e4262e4
- hash: c3b617e0c6b8f01cf628a2b3db40e8d06ef20a3c71365ccc1799787119246010
- hash: df60fa6008b1a0b79c394b42d3ada6bab18b798f3c2ca1530a3e0cb4fbbbe9f6
- hash: ed8f20bbab18b39a67e4db9a03090e5af8dc8ec24fe1ddf3521b3f340a8318c1
Operation MacroMaze: New APT28 Campaign Using Basic Tooling and Legitimate Infrastructure
Description
Operation MacroMaze, attributed to APT28 (Fancy Bear), targets entities in Western and Central Europe from September 2025 to January 2026. The campaign utilizes basic tools and legitimate services for infrastructure and data exfiltration. Multiple documents with varying macro variants act as droppers, establishing a foothold by creating files in the %USERPROFILE% folder. The attack chain involves VBScript execution, scheduled task creation for persistence, and a multi-stage process using batch files. Exfiltration is achieved through HTML-based techniques, leveraging webhook.site for data transmission. Despite its simplicity, the campaign demonstrates effective operational tradeoffs, making detection and attribution challenging.
AI-Powered Analysis
Technical Analysis
Operation MacroMaze is a targeted cyber espionage campaign attributed to the Russian state-sponsored threat actor APT28, also known as Fancy Bear. Active from September 2025 through January 2026, it focuses on entities in Western and Central Europe, with confirmed targeting of Spain. The campaign employs relatively simple but effective attack methods, leveraging Microsoft Office documents embedded with various macro variants as droppers. These macros create files within the %USERPROFILE% folder to establish an initial foothold. The infection chain proceeds with VBScript execution and the creation of scheduled tasks (MITRE ATT&CK technique T1053.005) to maintain persistence on compromised systems. A multi-stage process involving batch files is used to execute additional payloads and maintain control. For data exfiltration, the attackers use HTML-based techniques that send stolen information to webhook.site, a legitimate web service, thereby blending malicious traffic with normal network activity and complicating detection. The campaign uses basic tooling and legitimate infrastructure, which reduces the attack footprint and hinders attribution efforts. The use of common scripting languages (VBScript, batch files) and standard Windows features (scheduled tasks, user profile directories) demonstrates an operational tradeoff favoring stealth and simplicity over complexity. Indicators of compromise include multiple file hashes associated with the droppers and scripts. The campaign’s tactics, techniques, and procedures (TTPs) align with known APT28 behaviors, including persistence, credential access, and command execution techniques. No known exploits or CVEs are associated with this campaign, and it does not rely on zero-day vulnerabilities, instead exploiting user interaction via malicious macros. The campaign’s medium severity reflects its moderate impact potential and reliance on social engineering and basic scripting rather than advanced exploits.
Potential Impact
For European organizations, especially those in Spain and neighboring Western and Central European countries, Operation MacroMaze poses a significant espionage risk. The campaign’s ability to establish persistence and exfiltrate data using legitimate infrastructure makes it difficult to detect and mitigate. Confidentiality is primarily at risk, as sensitive information can be stolen via covert exfiltration channels. Integrity and availability impacts are less pronounced but could occur if attackers escalate privileges or deploy additional payloads. The use of basic tooling means that even organizations with mature security postures could be vulnerable if macro execution policies and endpoint monitoring are insufficient. The campaign could affect government agencies, defense contractors, critical infrastructure, and private sector companies holding strategic or sensitive data. The stealthy nature of the campaign increases the likelihood of prolonged undetected presence, enabling extensive data collection and potential follow-on attacks. The use of legitimate services for exfiltration also complicates network-based detection and response efforts, increasing operational risk for targeted organizations.
Mitigation Recommendations
1. Enforce strict macro security policies by disabling macros by default and only allowing macros from trusted, signed sources. 2. Implement application whitelisting to prevent unauthorized execution of VBScript and batch files, especially those launched from user profile directories. 3. Monitor and audit scheduled tasks creation and modifications (T1053.005), alerting on unusual or unauthorized tasks. 4. Deploy endpoint detection and response (EDR) solutions capable of detecting script-based attacks and anomalous file creation in user directories. 5. Inspect outbound network traffic for connections to uncommon or suspicious web services such as webhook.site, and apply network segmentation to limit data exfiltration paths. 6. Conduct user awareness training focused on the risks of enabling macros in unsolicited documents. 7. Regularly update and patch systems to reduce the attack surface, even though this campaign does not exploit known vulnerabilities. 8. Use threat intelligence feeds to block known malicious file hashes and indicators associated with Operation MacroMaze. 9. Employ behavioral analytics to detect multi-stage attack chains involving scripting and persistence mechanisms. 10. Establish incident response plans that include rapid containment and forensic analysis of script-based intrusions.
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://lab52.io/blog/operation-macromaze-new-apt28-campaign-using-basic-tooling-and-legit-infrastructure"]
- Adversary
- APT28
- Pulse Id
- 699329aa6d09f10e6d85a92b
- Threat Score
- null
Indicators of Compromise
Hash
| Value | Description | Copy |
|---|---|---|
hashc83ce20c9e000654dc66234772380a95 | — | |
hashbcf2e5228263049910ca3d14dc55727a96c2ad51 | — | |
hash5486107244ecaa3a0824895fa432827cc12df69620ca94aaa4ad75f39ac79588 | — | |
hash58cfb8b9fee1caa94813c259901dc1baa96bae7d30d79b79a7d441d0ee4e577e | — | |
hash9097d9cf5e6659e869bf2edf766741b687e3d8570036d853c0ca59ae72f9e9fc | — | |
hashb0f9f0a34ccab1337fbcca24b4f894de8d6d3a6f5db2e0463e2320215e4262e4 | — | |
hashc3b617e0c6b8f01cf628a2b3db40e8d06ef20a3c71365ccc1799787119246010 | — | |
hashdf60fa6008b1a0b79c394b42d3ada6bab18b798f3c2ca1530a3e0cb4fbbbe9f6 | — | |
hashed8f20bbab18b39a67e4db9a03090e5af8dc8ec24fe1ddf3521b3f340a8318c1 | — |
Threat ID: 6994942680d747be20c10099
Added to database: 2/17/2026, 4:15:34 PM
Last enriched: 2/17/2026, 4:30:03 PM
Last updated: 2/21/2026, 12:13:54 AM
Views: 58
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
MIMICRAT: ClickFix Campaign Delivers Custom RAT via Compromised Legitimate Websites
MediumDNS Used to Hide Fake Investment Platform Schemes
MediumClickFix in action: how fake captcha can encrypt an entire company
MediumFake Homebrew Pages Deliver Cuckoo Stealer via ClickFix | macOS Threat Hunting Analysis
MediumThe Curious Case of the Triton Malware Fork
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.