Site icon Secy247 – Technology, Cybersecurity & Business

APT28 Uses Fake Password Reset Pages to Steal Logins

Researchers uncovered a phishing setup that relies on a concealed HTML form element containing a webhook[.]site URL. JavaScript embedded in the page quietly sends a “page opened” signal, captures any credentials entered by the victim, and forwards them to the webhook endpoint. After the data is sent, the victim is redirected back to a PDF hosted on the legitimate website, reducing suspicion.

The threat group known as APT28, also tracked as BlueDelta, has been linked to several other credential-harvesting campaigns observed throughout 2025.

According to analysis from a Mastercard-owned security firm, BlueDelta’s repeated misuse of legitimate hosting and relay services highlights its ongoing dependence on disposable infrastructure to collect and transmit stolen credentials. The activity reflects the GRU’s continued focus on credential harvesting as a low-cost, effective way to gather intelligence in support of Russian strategic objectives.

Exit mobile version