Close Menu
Edu Expertise Hub
    Facebook X (Twitter) Instagram
    Saturday, July 19
    • About us
    • Contact
    • Submit Coupon
    Facebook X (Twitter) Instagram YouTube
    Edu Expertise Hub
    • Home
    • Udemy Coupons
    • Best Online Courses and Software Tools
      • Business & Investment
      • Computers & Internet
      • eBusiness and eMarketing
    • Reviews
    • Jobs
    • Latest News
    • Blog
    • Videos
    Edu Expertise Hub
    Home » Latest News » NCSC exposes Fancy Bear’s Authentic Antics malware attacks
    Latest News

    NCSC exposes Fancy Bear’s Authentic Antics malware attacks

    TeamBy TeamJuly 19, 2025No Comments4 Mins Read0 Views
    Facebook Twitter Pinterest LinkedIn Telegram Tumblr Email
    NCSC issues fresh alert over wave of Cozy Bear activity
    Share
    Facebook Twitter LinkedIn Pinterest Email


    The UK’s National Cyber Security Centre (NCSC) has issued a formal notice attributing a series of hostile cyber attacks using a variety of malware dubbed Authentic Antics to Russian-state operated advanced persistent threat (APT) group Fancy Bear.

    Authentic Antics is designed to steal login credentials and tokens for its victims email accounts, allowing Russian cyber spies to establish long-term access to their surveillance targets.

    Fancy Bear, which goes by APT28 in some threat matrices, is operated as part of the 85th Main Special Service Centre, Military Unit 26165, and ultimately answers to the GRU, a successor intelligence agency to the KGB of Cold War legend.

    “The use of Authentic Antics malware demonstrates the persistence and sophistication of the cyber threat posed by Russia’s GRU,” said NCSC operations director Paul Chichester.

    “NCSC investigations of GRU activities over many years show that network defenders should not take this threat for granted and that monitoring and protective action is essential for defending systems. 

    “We will continue to call out Russian malicious cyber activity and strongly encourage network defenders to follow advice available on the NCSC website,” said Chichester.

    Working with NCC Group, which provided samples of Authentic Antics, the NCSC’s experts have conducted a lengthy analysis of the malware – this can be read in full here – which blends in with everyday, legitimate activity to enable Fancy Bear to maintain persistent endpoint access to Microsoft cloud accounts.

    The malware has been widely used since about 2023, and runs within Microsoft Outlook processes where it displays malicious login prompts to its target in order to get them to enter their credentials, which are then intercepted along with OAuth 2.0 authentication tokens for various applications, likely including Exchange Online, SharePoint and OneDrive.

    The NCSC said it had been cleverly designed to exploit growing familiarity among end-users with genuine Microsoft authentication prompts, including generating prompts from within Outlook processes, and ensuring they do not display too frequently.

    Authentic Antics does not communicate with any command and control (C2) infrastructure and cannot receive additional tasking. It talks only to legitimate services, meaning that when it is active it is much harder to pick out – for example it exfiltrates its victims’ data by sending emails from the compromised account to an email address controlled by Fancy Bear – these sent emails do not show up in the victim’s sent items folder.

    The agency said that “significant thought” had gone into Authentic Antics’ design to ensure it blends in with normal activity. Among other things, its presence on disk is limited, it stores data in Outlook-specific registry locations, and its codebase includes genuine Microsoft authentication library code as an obfuscation method.

    “It is clear the intention of the malware is to gain persistent access to victim email accounts. This highlights the benefit of monitoring your tenant for suspicious logins,” said the NCSC’s analysts.

    Sanctions

    The attribution comes alongside the announcement of wider sanctions against three GRU Units – including Unit 26165 – and 18 officers and agents who allegedly run cyber and information interference operations in support of Russia’s geopolitical and military objectives.

    Among those sanctioned are GRU military intelligence officers who targeted and surveilled the device of Yulia Skripal, daughter of double agent Sergei Skripal, prior to the infamously botched Novichok poisoning attempt against them in 2018 that claimed the life of a British national, Dawn Sturgess.

    “GRU spies are running a campaign to destabilise Europe, undermine Ukraine’s sovereignty and threaten the safety of British citizens,” said foreign secretary David Lammy.

    “The Kremlin should be in no doubt: we see what they are trying to do in the shadows and we won’t tolerate it. That’s why we’re taking decisive action with sanctions against Russian spies.

    Speaking in support of the UK’s actions, a Nato spokesperson condemned Russia’s ongoing malicious cyber activities, noting other attributions made to Fancy Bear, which earlier this year was called out for targeting Western logistics and technology organisations involved in supporting the defence of Ukraine.

    “We call on Russia to stop its destabilising cyber and hybrid activities. These activities demonstrate Russia’s disregard for the United Nations framework for responsible state behaviour in cyberspace, which Russia claims to uphold,” a spokesperson said.

    “Russia’s actions will not deter Allies’ support to Ukraine, including cyber assistance through the Tallinn Mechanism and IT capability coalition. We will continue to use the lessons learned from the war against Ukraine in countering Russian malicious cyber activity.”

    This post is exclusively published on eduexpertisehub.com

    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Team

      Related Posts

      Data Shows More Discipline, Less College Prep for Students With Disabilities

      July 19, 2025

      What it really takes to lead successful grading reform

      July 18, 2025

      European cyber cops target NoName057(16) DDoS network

      July 18, 2025

      States Hope Fired Federal Workers Will Flock to Fill Teacher Vacancies

      July 17, 2025

      Savvy Cyber Kids Appoints New Members to Board of Directors

      July 17, 2025

      Co-op chief ‘incredibly sorry’ for theft of 6.5m members’ data

      July 16, 2025
      Courses and Software Tools

      Extreme Privacy: What It Takes to Disappear

      August 24, 202457 Views

      Modern C++ Programming Cookbook: Master Modern C++ with comprehensive solutions for C++23 and all previous standards

      September 18, 202428 Views

      Meebook E-Reader M7 | 6.8′ Eink Carta Screen | 300PPI Smart Light | Android 11 | Ouad Core Processor | Out Speaker | Support Google Play Store | 3GB+32GB Storage | Micro-SD Slot | Gray

      August 19, 202423 Views

      Coders at Work: Reflections on the Craft of Programming

      April 19, 202518 Views

      HR from the Outside In: Six Competencies for the Future of Human Resources

      May 20, 202517 Views
      Reviews

      Excel with Excel: Combining, Reordering and Analysis of Data | Udemy Coupons 2025

      July 19, 2025

      Python API Developer (Only W2) || 6 months || Irving, TX 75063 (5 days onsite)

      July 19, 2025

      Before you open that EBay store: What TikTok didn’t tell you : How I Lost My eBay Store and Came Back Stronger — So You Don’t Have To.

      July 19, 2025

      Handling Difficult Customers with Confidence | Udemy Coupons 2025

      July 19, 2025

      Fundamentals of the Insurance Business (Springer Texts in Business and Economics)

      July 19, 2025
      Stay In Touch
      • Facebook
      • YouTube
      • TikTok
      • WhatsApp
      • Twitter
      • Instagram
      Latest News

      NCSC exposes Fancy Bear’s Authentic Antics malware attacks

      July 19, 2025

      Data Shows More Discipline, Less College Prep for Students With Disabilities

      July 19, 2025

      What it really takes to lead successful grading reform

      July 18, 2025

      European cyber cops target NoName057(16) DDoS network

      July 18, 2025

      States Hope Fired Federal Workers Will Flock to Fill Teacher Vacancies

      July 17, 2025
      Latest Videos

      Cognizant hiring 2021 2022 2023 batch BCA BSC BBA BCOM freshers jobs

      July 17, 2025

      Top 5 Trending Job Career in 2025 | Simplilearn

      July 16, 2025

      Jumpstart Your Digital Marketing Career with Our Exclusive Workshop! | TICE India

      July 15, 2025

      ETHICAL HACKING Course

      July 14, 2025

      Top 10 Highest Paying Finance Jobs in 2025

      July 13, 2025
      Latest Jobs

      Python API Developer (Only W2) || 6 months || Irving, TX 75063 (5 days onsite)

      July 19, 2025

      Programmer 4 at MI

      July 19, 2025

      Product Writer & Reviewer – WIRED

      July 19, 2025

      Software Dev EngIII-AMZ9082634

      July 19, 2025

      KidStrong Coach Teacher Sports Coach Team Lead (part-time)

      July 19, 2025
      Legal
      • Home
      • Privacy Policy
      • Cookie Policy
      • Terms and Conditions
      • Disclaimer
      • Affiliate Disclosure
      • Amazon Affiliate Disclaimer
      Latest Udemy Coupons

      Mastering Maxon Cinema 4D 2024: Complete Tutorial Series | Udemy Coupons 2025

      August 22, 202435 Views

      Advanced Program in Human Resources Management | Udemy Coupons 2025

      April 5, 202531 Views

      Diploma in Aviation, Airlines, Air Transportation & Airports | Udemy Coupons 2025

      March 21, 202530 Views

      Python Development & Data Science: Variables and Data Types | Udemy Coupons 2025

      May 24, 202521 Views

      Time Management and Timeboxing in Business, Projects, Agile | Udemy Coupons 2025

      April 2, 202521 Views
      Blog

      How to Build a Marketing Team That Doesn’t Waste Time, Talent, or Budget

      July 18, 2025

      4 Ways To Keep Your Job Search Active This Summer

      July 16, 2025

      6 Life-Changing Benefits Of A Flexible Work Schedule

      July 9, 2025

      3 Ways To Network Over Summer Vacation And Grow Your Career

      July 3, 2025

      Why Community Is Your Most Valuable Career Asset In 2025

      June 28, 2025
      Facebook X (Twitter) Instagram Pinterest YouTube Dribbble
      © 2025 All rights reserved!

      Type above and press Enter to search. Press Esc to cancel.

      We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept”, you consent to the use of ALL the cookies.
      .
      SettingsAccept
      Privacy & Cookies Policy

      Privacy Overview

      This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
      Necessary
      Always Enabled
      Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
      Non-necessary
      Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
      SAVE & ACCEPT