Huseyin Can YUCEEL | 12 MIN READ

LAST UPDATED ON MAY 23, 2025

Russian Unit 26165 Targets Western Logistics and Technology Companies

On May 21, 2025, the Cybersecurity and Infrastructure Security Agency (CISA) released a joint advisory on the Russian state-sponsored APT group Unit 26165 [1]. The group has intensified its operations against Western logistics providers and technology companies since 2022. Their aim is not random disruption but targeted espionage, gathering intelligence on supply routes and infrastructure that support Ukraine. Unit 26165 is also known by names like APT28, Fancy Bear, Forest Blizzard, and BlueDelta.

In this blog post, we explain the Tactics, Techniques, and Procedures (TTPs) used by Unit 26165 and how organizations can defend themselves against state-sponsored APT attacks.

Simulate APT Attacks with 14-Day Free Trial of Picus Platform

Unit 26165: Russian State-sponsored APT Group

Unit 26165 is a cyber espionage unit within the 85th Main Special Service Center (GTsSS) of the GRU, Russia’s military intelligence service. This group has operated under multiple names, most notably APT28 and Fancy Bear. Over the years, Unit 26165 has built a reputation for targeting political institutions, defense contractors, media organizations, and now, with increased focus, logistics and IT infrastructure. Their main objective is to collect sensitive intelligence that can support Russian military and political objectives.

The group gained notoriety for its alleged interference in the 2016 U.S. elections but has since pivoted its efforts to operationally significant targets related to the war in Ukraine. Specifically, they have sought access to companies and technologies involved in transporting Western military and humanitarian aid to Ukraine. This includes rail operators, air traffic control entities, maritime logistics providers, and industrial control system (ICS) component manufacturers.

Unit 26165’s campaigns are characterized by persistence, strategic reconnaissance, and a deep understanding of enterprise IT environments. Their operations reflect a shift from one-off cyberattacks to sustained espionage efforts targeting the logistical lifeblood of Ukraine’s warfighting capabilities and the tech infrastructure that supports them.

Unit 26165’s Modus Operandi and MITRE ATT&CK TTPs

Unit 26165, also known as APT28 or Fancy Bear, leverages a broad and evolving toolkit aligned with MITRE ATT&CK techniques across multiple stages of the attack lifecycle.

Initial Access

T1190 Exploit Public Facing Applications

Unit 26165 actively exploits known vulnerabilities in internet-facing systems, including VPNs, email servers, and webmail platforms. Organizations are advised to apply patches promptly to mitigate this risk.

Affected Product

Vulnerability

CVSS Score

RARLAB WinRAR

CVE-2023-38831

7.8 (High)

Microsoft Outlook

CVE-2023-23397

9.8 (Critical)

Roundcube Webmail

CVE-2021-44026

9.8 (Critical)

Roundcube Webmail

CVE-2020-35730

6.1 (Medium)

Roundcube Webmail

CVE-2020-12641

9.8 (Critical)

T1566 Phishing

Spearphishing remains a preferred entry vector for Unit 26165. The group sends highly targeted emails in the recipient's local language, often themed around business or logistics. These emails include malicious links or attachments designed to steal credentials or deliver malware. Redirectors are used to filter victims by IP geolocation and browser fingerprint before delivering the payload or redirecting to legitimate websites to avoid suspicion.

T1199 Trusted Relationship

Unit 26165 exploits trusted relationships between organizations to extend their access beyond initially compromised networks. After breaching a primary target in the logistics or technology sector, the group identifies connected entities such as vendors or subcontractors and uses those relationships to move laterally. This may involve harvesting shared credentials, exploiting VPN access, or manipulating email forwarding rules. Because these relationships often involve pre-established trust and communication, attacks delivered through them are less likely to raise suspicion.

T1133 External Remote Services

Unit 26165 frequently targets internet-facing remote access services, including VPNs, to gain an initial foothold. By exploiting weak credentials or unpatched vulnerabilities, the group can authenticate into corporate environments without triggering immediate alerts.

T1659 Content Injection

Unit 26165 uses content injection to deliver malware embedded in archive files, exploiting vulnerabilities like CVE-2023-38831 in WinRAR. By manipulating the contents of ZIP files, they create misleading file structures where clicking a seemingly safe file actually triggers malicious code. 

Execution

T1204 User Execution

Unit 26165 tricks users into launching malicious files or scripts embedded in attachments or links. These files install initial-stage malware or drop payloads such as HEADLACE and MASEPIE, enabling the following malicious actions.

  • HEADLACE: A backdoor used for credential harvesting and system enumeration. Its deployment often begins with a malicious shortcut (.LNK) file, followed by scripts that prompt users for credentials using fake dialog boxes.

  • MASEPIE: A Python-based script used to interact with compromised machines. It supports file upload/download, command execution, and maintains persistence.

T1574.001 DLL Search Order Hijacking

Unit 26165 places a malicious DLL in a directory where a trusted application will load it instead of the legitimate one. This allows their malware, such as HEADLACE, to run without launching new processes, helping avoid detection. Because the technique hijacks normal system behavior, it blends in easily and bypasses many security tools.

T1547.009 Shortcut Modification

Unit 26165 places malicious .LNK files in Windows startup folders. These shortcuts automatically execute malware each time a user logs in. This method ensures the attacker’s code runs without user interaction and blends into normal system behavior. It is an effective way to trigger additional payloads on boot and helps the group retain long-term access while evading basic endpoint detection tools.

T1059 Command and Scripting Interpreter

Unit 26165 uses PowerShell, VBScript, and Python for downloading files, exfiltrating data, executing reconnaissance commands, and launching malware like HEADLACE or Certipy.

Persistence

T1053 Scheduled Tasks and T1547.001 Run Keys/Startup Folder

Unit 26165 uses scheduled tasks to run malware automatically at system startup or user login, ensuring persistent access without user interaction. These tasks blend in with legitimate system processes, making detection difficult. They also employ autostart execution by modifying Windows registry run keys and placing malicious .LNK files in startup folders.

T1098 Account Manipulation

Unit 26165 manipulates account settings to establish long-term access and facilitate data collection. The group modifies Microsoft Exchange mailbox permissions, allowing the attackers to monitor emails without needing repeated logins. They also change folder permissions and MFA configurations to make compromised accounts appear legitimate.

T1556.006 Modify Authentication Process: Multi-Factor Authentication

After gaining access to a user account, Unit 26165 modifies the account’s multi-factor authentication settings. They enroll compromised accounts into MFA using methods such as mobile push notifications or alternate tokens. This tactic increases the perceived legitimacy of the account and makes future logins less suspicious to defenders. 

Defense Evasion

T1070 Indicator Removal on Host

To evade detection and complicate forensic analysis, Unit 26165 deletes evidence of their activity. They use wevtutil to clear event logs, erasing records of their intrusion, and del or PowerShell to remove artifacts such as dropped malware, staging scripts, and temporary data.

Credential Access

T1110 Brute Force

Unit 26165 performs password guessing and spraying attacks against login portals, particularly targeting VPNs, webmail, and administrative interfaces. These attacks are routed through anonymizing services like Tor or compromised routers to hide their origin. They also frequently rotate IP addresses to bypass account lockout thresholds and use TLS encryption to evade detection by network monitoring tools.

T1111 Multi-Factor Authentication Interception

To bypass MFA, Unit 26165 sets up phishing pages that mimic legitimate login portals. These fake sites capture credentials and relay MFA challenges in real time, often using tools that simulate CAPTCHA and MFA interfaces. This allows attackers to capture session tokens or authentication responses before redirecting victims to actual login pages. 

T1056 Input Capture

Unit 26165 collects credentials and other sensitive data directly from the victim’s device. They use a PowerShell script that presents a fake login prompt to users, capturing their entered username and password.

T1187 Forced Authentication

Unit 26165 abuses Microsoft Outlook CVE-2023-23397 vulnerability to trigger forced authentication. By sending specially crafted calendar invites, they cause the victim’s Outlook client to automatically attempt to connect to an attacker-controlled server, leaking the user’s NTLMv2 hash in the process. These hashes can then be relayed or cracked to gain access to other systems.

T1003 OS Credential Dumping

Unit 26165 frequently targets the Active Directory database (NTDS.dit) using ntdsutil, allowing them to extract hashed passwords of domain users. In some cases, they also use tools like Certipy to interact with certificate services and extract additional credentials.

T1552.006 Unsecured Credentials: Group Policy Preferences

Unit 26165 uses the Get-GPPPassword.py script to extract plaintext passwords stored in Group Policy Preferences (GPP). These passwords are often tied to administrative accounts and may be left behind due to poor configuration hygiene. By retrieving and decrypting these credentials, the group gains high-level access to systems or domains without needing to exploit vulnerabilities or guess passwords.

Discovery

T1087.002 Account Discovery: Domain Account

Once inside a network, Unit 26165 conducts extensive account enumeration to understand the environment and identify high-value targets. They use tools like ldap-dump.py to query Active Directory and retrieve lists of domain accounts, including usernames, group memberships, and administrative privileges.

Command and Control (C2)

T1665 Hide Infrastructure

Unit 26165 routes their operations through compromised infrastructure, particularly small office/home office (SOHO) routers. These devices are often located geographically close to the target and serve as proxies, masking the attacker’s real IP address and blending traffic with legitimate network activity. By hijacking devices that are already trusted on the internet, the group avoids detection and makes tracing attacks back to their command-and-control servers more difficult.

T1090 Proxy

Unit 26165 uses external proxies including compromised devices and third-party services like commercial VPNs to relay traffic between victims and their command-and-control servers. In some cases, their malware initiates connections through multiple layers of proxies, creating a multi-hop route that hides the final destination. They also use proxy networks to host phishing infrastructure and credential harvesting sites. These proxies allow attackers to evade geographic IP filtering and maintain operational continuity even if a proxy node is taken down or blocked.

T1573 Encrypted Channel

Unit 26165 typically communicates with C2 servers over encrypted channels, such as TLS, to make their traffic appear legitimate and difficult to inspect. They also encrypt data during exfiltration to further obscure its contents. By using standard encryption protocols and blending into regular web traffic, they reduce the effectiveness of traditional network monitoring tools.

T1104 Multi-Stage Channels

The group employs multi-stage channels during phishing and data exfiltration. In their phishing operations, users are initially directed to redirector sites that assess IP geolocation and browser fingerprinting before serving the final malicious page. These redirectors act as filters, ensuring that only intended targets are exposed to the attack. Multi-stage channels also add resilience, allowing them to quickly change payload delivery infrastructure without altering the phishing lure or primary URL.

Lateral Movement

T1021.001 Remote Services: Remote Desktop Protocol

Unit 26165 frequently uses Remote Desktop Protocol (RDP) to move laterally within networks. RDP provides full interactive access to systems, allowing attackers to perform actions manually or deploy additional tools. They may use RDP to connect to domain controllers, access administrative shares, or explore systems storing logistics or shipment data. To avoid detection, they may tunnel RDP through compromised VPNs or proxies. 

Collection

T1114 Email Collection

Unit 26165 manipulates Exchange mailbox permissions to enable silent monitoring of user accounts, allowing long-term access without triggering user alerts. They then collect emails using protocols like Exchange Web Services (EWS) or IMAP. In some cases, this data includes aid shipment manifests, transport routes, and recipient details.

T1119 Automated Collection

Unit 26165 sets up automated collection routines like scheduled EWS queries to reduce their operational footprint and minimizes the risk of triggering security alerts. This hands-off approach also enables persistent data harvesting over extended periods, particularly useful for tracking changes in logistics operations or identifying new targets based on evolving email content.

T1125 Video Capture

Unit 26165 has conducted large-scale campaigns targeting IP cameras, especially those located near Ukrainian border crossings and critical infrastructure. They send crafted RTSP requests to access live video feeds. Successful exploitation allows them to view and capture footage of aid shipments, troop movements, and facility operations.

T1560 Archive Collected Data

Before exfiltration, the group typically archives collected data into .zip files. This includes stolen credentials, documents, and email files. Tools like PowerShell or Python are used to compress the data, often with minimal or no encryption to reduce detection risk. Archiving also helps them bundle multiple data sources for more efficient exfiltration. These archives are typically stored in temporary directories before being sent to remote servers. This step is key to organizing stolen information and ensuring it can be transmitted with minimal overhead.

T1048: Exfiltration Over Alternative Protocol

Unit 26165 uses alternative protocols like SSH for data exfiltration to avoid detection. They drop custom OpenSSH binaries on infected machines and configure them to send archived data to remote C2 servers. This allows them to bypass common monitoring rules focused on HTTP or FTP traffic. Using protocols like SSH also enables secure transmission, hiding the contents of the data from inspection. This method is especially useful in tightly monitored environments where traditional exfiltration channels might raise alarms.

T1029: Scheduled Transfer

For long-term operations, the group automates data exfiltration using scheduled tasks. These tasks run periodically, collecting new data—especially emails—and sending it to attacker-controlled infrastructure. This method ensures continuous access to updated intelligence with minimal manual effort. Scheduled transfer is combined with automated collection to create a fully autonomous data harvesting pipeline. It enables persistent surveillance while reducing the risk of triggering alerts through frequent or large-volume data transmissions. This tactic reflects the group’s emphasis on maintaining stealth and efficiency.

How Picus Helps Simulate Unit 26165 Attacks?

We also strongly suggest simulating Unit 26165 attacks to test the effectiveness of your security controls against real-life cyber attacks using the Picus Security Validation Platform. You can also test your defenses against hundreds of other ransomware variants, such as Lazarus, MuddyWater, and Salt Typhoon, within minutes with a 14-day free trial of the Picus Platform.

Picus Threat Library includes the following threats for Unit 26165 aka APT28

Threat ID

Threat Name

Attack Module

76649

Russian GRU Threat Group Campaign

Windows Endpoint

26499

APT28 Threat Group Campaign Malware Download Threat

Network Infiltration

52129

APT28 Threat Group Campaign Malware Email Threat

Email Infiltration (Phishing)

36675

MASEPIE Backdoor Malware Download Threat

Network Infiltration

38590

MASEPIE Backdoor Malware Email Threat

Email Infiltration (Phishing)

35182

OCEANMAP Backdoor Malware Download Threat

Network Infiltration

37631

OCEANMAP Backdoor Malware Email Threat 

Email Infiltration (Phishing)

Picus also provides actionable mitigation content. Picus Mitigation Library includes prevention signatures to address Unit 26165 aka APT28 and APT attacks in preventive security controls. Currently, Picus Labs validated the following signatures for Unit 26165 aka APT28:

Security Control

Signature ID

Signature Name

Check Point NGFW

0C308E4AE

Generic.Win32.Generic.TC.bc43wKrd

Cisco FirePower

 

Auto.ECC580.211859.in02

Forcepoint NGFW

 

File_Malware-Blocked 

Fortigate AV

7024603

Malware_Generic.P0

Fortigate AV

58991

W32/PossibleThreat

Palo Alto

218819673

Trojan/Win32.fqkm.d

Trellix

0x4840c900

MALWARE: Malicious File Detected by GTI

Start simulating emerging threats today and get actionable mitigation insights with a  14-day free trialof the Picus Security Validation Platform.

References

[1] "Russian GRU Targeting Western Logistics Entities and Technology Companies," Cybersecurity and Infrastructure Security Agency CISA. Available: https://www.cisa.gov/news-events/cybersecurity-advisories/aa25-141a

 

Table of Contents