Ukraine confirms suspected APT28 campaign targeting prosecutors, anti-corruption agencies
好,我现在需要帮用户总结这篇文章的内容,控制在100字以内。首先,我得通读整篇文章,抓住主要信息。 文章讲的是乌克兰的一些政府机构遭受了网络间谍活动的攻击,这些攻击被归咎于与俄罗斯有关的黑客组织。具体来说,涉及到了乌克兰的检察官和调查人员的邮箱被入侵,数量超过170个。攻击者利用了Roundcube邮件平台的漏洞,通过受害者打开邮件就能执行恶意代码,不需要点击链接或下载附件。 乌克兰方面已经确认了这些攻击,并指出这些活动可能属于一个更大的网络间谍活动的一部分。虽然泄露了一些信息,但官方表示没有涉及机密数据。此外,研究人员将此次攻击归因于俄罗斯的APT28组织,该组织也被称为Fancy Bear等。 最后,文章提到受影响的机构包括乌克兰的反腐败检察院和资产管理机构,但这些机构表示内部系统没有被入侵。 总结下来,关键点包括:乌克兰政府机构被攻击、超过170个邮箱被入侵、利用Roundcube漏洞、APT28组织负责、以及没有机密数据泄露。我需要把这些信息浓缩到100字以内,并且不使用“这篇文章”或“内容总结”这样的开头。 </think> 乌克兰多个政府机构遭俄罗斯关联黑客组织网络间谍活动攻击,超170个检察官和调查人员邮箱被入侵。攻击利用Roundcube平台漏洞,在用户打开邮件时植入恶意代码。乌方称部分信息泄露但无机密数据失窃。研究指此次行动由俄军方情报机构关联的APT28组织实施。 2026-4-17 14:19:58 Author: therecord.media(查看原文) 阅读量:14 收藏

A Ukrainian cyber official has confirmed that several local government agencies were targeted in a long-running cyber-espionage campaign attributed to a Russian state-linked hacker group.

Taras Dzyuba, head of the information communications department at Ukraine’s State Service of Special Communications and Information Protection (SSSCIP), told Recorded Future News that authorities are aware of the attacks, which Western researchers say compromised email accounts belonging to Ukrainian prosecutors and investigators.

Earlier this week, Reuters reported that hackers linked to Russia had broken into more than 170 email accounts belonging to prosecutors and investigators across Ukraine in recent months.

According to Dzyuba, the activity described by the Reuters report appears to be part of a broader campaign that Ukrainian authorities have been tracking since 2023. Ukraine’s computer emergency response team (CERT-UA) has identified three waves of attacks that likely form part of the same campaign.

The intrusions exploited vulnerabilities in the open-source Roundcube webmail platform that allow attackers to execute malicious code when a victim simply opens an email in their inbox — without needing to click on links or download attachments.

Dzyuba said some information allegedly stolen during these attacks from several Ukrainian state agencies was published online earlier in March, but he added that the leaked material was unlikely to contain confidential data.

He said Russia could use these cyber incidents as a basis for disinformation campaigns aimed at discrediting Ukrainian institutions.

Researchers at Ctrl-Alt-Intel, who were cited in the Reuters report, attributed the campaign to the hacking group APT28 — also known as Fancy Bear, BlueDelta or Forest Blizzard — which Western governments and cybersecurity firms widely believe is linked to Russia’s military intelligence agency, the GRU. 

Dzyuba confirmed that all indications point to this group. CERT-UA has previously reported several APT28 attacks exploiting Roundcube vulnerabilities.

According to a Ctrl-Alt-Intel report, most victims of the latest campaign were in Ukraine, although some compromised accounts were linked to neighboring NATO countries and the Balkans, including Romania, Bulgaria, Greece and Serbia.

Among the Ukrainian institutions reportedly affected were the Specialized Anti-Corruption Prosecutor’s Office (SAP) and the Asset Recovery and Management Agency (ARMA), which oversees assets seized from criminals and Russian collaborators.

ARMA’s acting head, Yaroslava Maksymenko, confirmed on Thursday that the agency’s employees had been targeted by a Russian cyberattack but said the hackers failed to access its internal systems.

“The review established that no access to internal information systems was obtained, and no data leak from databases or state information resources occurred,” Maksymenko said in a statement to the Interfax-Ukraine news agency.

SAP said earlier this week that it had launched a review following reports that Russian hackers had breached dozens of email accounts belonging to Ukrainian law enforcement officials, including those at the agency.

So far, investigators have found no evidence that data was stolen from SAP systems, though the review is ongoing.

Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

Recorded Future

No previous article

No new articles

Daryna Antoniuk

Daryna Antoniuk

is a reporter for Recorded Future News based in Ukraine. She writes about cybersecurity startups, cyberattacks in Eastern Europe and the state of the cyberwar between Ukraine and Russia. She previously was a tech reporter for Forbes Ukraine. Her work has also been published at Sifted, The Kyiv Independent and The Kyiv Post.


文章来源: https://therecord.media/ukraine-confirms-suspected-apt28-campaign-targeting-prosecutors
如有侵权请联系:admin#unsafe.sh