Skip to content

Microsoft Uncovers Ongoing Russian Cyberespionage Campaign

Microsoft exposes a major Russian cyberespionage campaign. ApolloShadow malware targets diplomatic missions and sensitive organisations, posing a significant threat to those relying on local internet services.

There is an aircraft at the top side of the image, it seems like a moon on the right side.
There is an aircraft at the top side of the image, it seems like a moon on the right side.

Microsoft Uncovers Ongoing Russian Cyberespionage Campaign

Microsoft 365 has exposed a sophisticated cyberespionage operation, active since 2024, targeting diplomatic missions and sensitive organisations in Russia. The campaign, dubbed ApolloShadow, is linked to the Russia-linked APT group Secret Blizzard and poses a significant threat to those relying on local internet services in the country.

ApolloShadow malware is installed on victims' systems after they are tricked into downloading it through a fake captive portal mimicking a Windows connectivity check. Once installed, the malware prompts users to grant elevated privileges, enabling it to install root certificates, monitor email, and harvest credentials. If granted, ApolloShadow adapts its execution to make system-level changes.

Microsoft uncovered this campaign in February 2025 and published Indicators of Compromise (IoCs) to help organisations protect themselves. The malware can install a fake Kaspersky Anti-Virus trusted root certificate, providing long-term access for cyber espionage. Secret Blizzard uses an adversary-in-the-middle (AiTM) method at the ISP level to deploy the malware, with ER-Telecom, a Russian internet service provider, associated with the AiTM attack.

The ApolloShadow campaign, active since at least 2024 and ongoing, is a serious threat to diplomatic missions and sensitive organisations in Russia. Microsoft's discovery and publication of IoCs have provided crucial information to help protect potential targets. Organisations are advised to remain vigilant and follow best cybersecurity practices to mitigate the risk of infection.

Read also:

Latest