Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

Operation MacroMaze: New APT28 Campaign Using Basic Tooling and Legitimate Infrastructure

0
Medium
Published: Mon Feb 16 2026 (02/16/2026, 14:28:58 UTC)
Source: AlienVault OTX General

Description

Operation MacroMaze, attributed to APT28 (Fancy Bear), targets entities in Western and Central Europe from September 2025 to January 2026. The campaign utilizes basic tools and legitimate services for infrastructure and data exfiltration. Multiple documents with varying macro variants act as droppers, establishing a foothold by creating files in the %USERPROFILE% folder. The attack chain involves VBScript execution, scheduled task creation for persistence, and a multi-stage process using batch files. Exfiltration is achieved through HTML-based techniques, leveraging webhook.site for data transmission. Despite its simplicity, the campaign demonstrates effective operational tradeoffs, making detection and attribution challenging.

AI-Powered Analysis

AILast updated: 02/17/2026, 16:30:03 UTC

Technical Analysis

Operation MacroMaze is a targeted cyber espionage campaign attributed to the Russian state-sponsored threat actor APT28, also known as Fancy Bear. Active from September 2025 through January 2026, it focuses on entities in Western and Central Europe, with confirmed targeting of Spain. The campaign employs relatively simple but effective attack methods, leveraging Microsoft Office documents embedded with various macro variants as droppers. These macros create files within the %USERPROFILE% folder to establish an initial foothold. The infection chain proceeds with VBScript execution and the creation of scheduled tasks (MITRE ATT&CK technique T1053.005) to maintain persistence on compromised systems. A multi-stage process involving batch files is used to execute additional payloads and maintain control. For data exfiltration, the attackers use HTML-based techniques that send stolen information to webhook.site, a legitimate web service, thereby blending malicious traffic with normal network activity and complicating detection. The campaign uses basic tooling and legitimate infrastructure, which reduces the attack footprint and hinders attribution efforts. The use of common scripting languages (VBScript, batch files) and standard Windows features (scheduled tasks, user profile directories) demonstrates an operational tradeoff favoring stealth and simplicity over complexity. Indicators of compromise include multiple file hashes associated with the droppers and scripts. The campaign’s tactics, techniques, and procedures (TTPs) align with known APT28 behaviors, including persistence, credential access, and command execution techniques. No known exploits or CVEs are associated with this campaign, and it does not rely on zero-day vulnerabilities, instead exploiting user interaction via malicious macros. The campaign’s medium severity reflects its moderate impact potential and reliance on social engineering and basic scripting rather than advanced exploits.

Potential Impact

For European organizations, especially those in Spain and neighboring Western and Central European countries, Operation MacroMaze poses a significant espionage risk. The campaign’s ability to establish persistence and exfiltrate data using legitimate infrastructure makes it difficult to detect and mitigate. Confidentiality is primarily at risk, as sensitive information can be stolen via covert exfiltration channels. Integrity and availability impacts are less pronounced but could occur if attackers escalate privileges or deploy additional payloads. The use of basic tooling means that even organizations with mature security postures could be vulnerable if macro execution policies and endpoint monitoring are insufficient. The campaign could affect government agencies, defense contractors, critical infrastructure, and private sector companies holding strategic or sensitive data. The stealthy nature of the campaign increases the likelihood of prolonged undetected presence, enabling extensive data collection and potential follow-on attacks. The use of legitimate services for exfiltration also complicates network-based detection and response efforts, increasing operational risk for targeted organizations.

Mitigation Recommendations

1. Enforce strict macro security policies by disabling macros by default and only allowing macros from trusted, signed sources. 2. Implement application whitelisting to prevent unauthorized execution of VBScript and batch files, especially those launched from user profile directories. 3. Monitor and audit scheduled tasks creation and modifications (T1053.005), alerting on unusual or unauthorized tasks. 4. Deploy endpoint detection and response (EDR) solutions capable of detecting script-based attacks and anomalous file creation in user directories. 5. Inspect outbound network traffic for connections to uncommon or suspicious web services such as webhook.site, and apply network segmentation to limit data exfiltration paths. 6. Conduct user awareness training focused on the risks of enabling macros in unsolicited documents. 7. Regularly update and patch systems to reduce the attack surface, even though this campaign does not exploit known vulnerabilities. 8. Use threat intelligence feeds to block known malicious file hashes and indicators associated with Operation MacroMaze. 9. Employ behavioral analytics to detect multi-stage attack chains involving scripting and persistence mechanisms. 10. Establish incident response plans that include rapid containment and forensic analysis of script-based intrusions.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Author
AlienVault
Tlp
white
References
["https://lab52.io/blog/operation-macromaze-new-apt28-campaign-using-basic-tooling-and-legit-infrastructure"]
Adversary
APT28
Pulse Id
699329aa6d09f10e6d85a92b
Threat Score
null

Indicators of Compromise

Hash

ValueDescriptionCopy
hashc83ce20c9e000654dc66234772380a95
hashbcf2e5228263049910ca3d14dc55727a96c2ad51
hash5486107244ecaa3a0824895fa432827cc12df69620ca94aaa4ad75f39ac79588
hash58cfb8b9fee1caa94813c259901dc1baa96bae7d30d79b79a7d441d0ee4e577e
hash9097d9cf5e6659e869bf2edf766741b687e3d8570036d853c0ca59ae72f9e9fc
hashb0f9f0a34ccab1337fbcca24b4f894de8d6d3a6f5db2e0463e2320215e4262e4
hashc3b617e0c6b8f01cf628a2b3db40e8d06ef20a3c71365ccc1799787119246010
hashdf60fa6008b1a0b79c394b42d3ada6bab18b798f3c2ca1530a3e0cb4fbbbe9f6
hashed8f20bbab18b39a67e4db9a03090e5af8dc8ec24fe1ddf3521b3f340a8318c1

Threat ID: 6994942680d747be20c10099

Added to database: 2/17/2026, 4:15:34 PM

Last enriched: 2/17/2026, 4:30:03 PM

Last updated: 2/21/2026, 12:13:54 AM

Views: 58

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

External Links

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats