Russian APT28 army hackers used Microsoft Outlook zero-day exploits to focus on a number of European NATO member international locations, together with a NATO Fast Deployable Corps.
Researchers from Palo Alto Networks’ Unit 42 have noticed them exploiting the CVE-2023-23397 vulnerability over roughly 20 months in three campaigns towards at the very least 30 organizations throughout 14 nations deemed of possible strategic intelligence significance to Russia’s army and authorities.
The Russian hackers are additionally tracked as Combating Ursa, Fancy Bear, and Sofacy, and so they’ve been beforehand linked to Russia’s Predominant Intelligence Directorate (GRU), the nation’s army intelligence service.
They began utilizing the Outlook safety flaw as a zero-day in March 2022, three weeks after Russia invaded Ukraine, to focus on the State Migration Service of Ukraine.
Between mid-April and December 2022, they breached the networks of round 15 authorities, army, vitality, and transportation organizations in Europe to steal emails doubtlessly containing army intelligence to assist Russia’s invasion of Ukraine.
Despite the fact that Microsoft patched the zero-day one yr later, in March 2023, and linked to a Russian hacking group, APT28 operators continued utilizing the CVE-2023-23397 exploits to steal credentials that allowed them to maneuver laterally by compromised networks.
The assault floor elevated even additional in Might when a bypass (CVE-2023-29324) affecting all Outlook Home windows variations surfaced.

Targets on NATO Fast Deployable Corps
Right now, Unit 42 stated that among the many attacked European nations, all recognized international locations are present North Atlantic Treaty Group (NATO) members, excluding Ukraine.
Not less than one NATO Fast Deployable Corps (Excessive Readiness Power Headquarters able to swift deployment to command NATO forces) was additionally focused.
Moreover, past European Protection, International Affairs, and Inside Affairs companies, APT28’s focus prolonged to essential infrastructure organizations concerned in vitality manufacturing and distribution, pipeline infrastructure operations, and materials dealing with, personnel, and air transportation.
“Utilizing a zero-day exploit towards a goal signifies it’s of great worth. It additionally means that present entry and intelligence for that concentrate on had been inadequate on the time,” Unit 42 stated.
“Within the second and third campaigns, Combating Ursa continued to make use of a publicly recognized exploit that was already attributed to them, with out altering their strategies. This means that the entry and intelligence generated by these operations outweighed the ramifications of public outing and discovery.
“For these causes, the organizations focused in all three campaigns had been probably the next than regular precedence for Russian intelligence.”
In October, the French cybersecurity company (ANSSI) disclosed that Russian hackers used the Outlook safety flaw to assault authorities our bodies, firms, instructional establishments, analysis facilities, and suppose tanks throughout France.
This week, the UK and allies a part of the 5 Eyes intelligence alliance additionally linked a Russian menace group tracked as Callisto Group, Seaborgium, and Star Blizzard to Russia’s ‘Centre 18’ Federal Safety Service (FSB) division.
Microsoft’s menace analysts thwarted Callisto assaults aimed toward a number of European NATO nations by disabling Microsoft accounts utilized by the menace actors for surveillance and harvesting emails.
The U.S. authorities now gives a $10 million reward for data on Callisto’s members and their actions.