Cybersecurity Blogs and Articles
  • All Technology
  • AI
  • Autonomy
  • B2B Growth
  • Big Data
  • BioTech
  • ClimateTech
  • Consumer Tech
  • Crypto
  • Cybersecurity
  • DevOps
  • Digital Marketing
  • Ecommerce
  • EdTech
  • Enterprise
  • FinTech
  • GovTech
  • Hardware
  • HealthTech
  • HRTech
  • LegalTech
  • Nanotech
  • PropTech
  • Quantum
  • Robotics
  • SaaS
  • SpaceTech
AllNewsDealsSocialBlogsVideosPodcastsDigests

Cybersecurity Pulse

EMAIL DIGESTS

Daily

Every morning

Weekly

Sunday recap

NewsDealsSocialBlogsVideosPodcasts
CybersecurityBlogsOperation MacroMaze: APT28 Exploits Webhooks for Covert Data Exfiltration
Operation MacroMaze: APT28 Exploits Webhooks for Covert Data Exfiltration
CybersecurityDefense

Operation MacroMaze: APT28 Exploits Webhooks for Covert Data Exfiltration

•February 24, 2026
0
Security Affairs
Security Affairs•Feb 24, 2026

Why It Matters

The campaign proves that low‑tech, legitimate‑infrastructure‑based tools can achieve stealthy data exfiltration, forcing enterprises to rethink macro and webhook security controls.

Key Takeaways

  • •APT28 leveraged webhook.site for tracking and exfiltration.
  • •Macro drops six files with GUID-like names in user profile.
  • •HTML form auto-submits data via Edge, leaving no disk artifacts.
  • •Persistence achieved through scheduled task creation on compromised host.
  • •Campaign shows simple tooling can bypass modern defenses.

Pulse Analysis

The MacroMaze operation highlights a shift in APT28’s tradecraft toward minimalist, infrastructure‑agnostic techniques. By exploiting the INCLUDEPICTURE field, the group turns a harmless Word feature into a reliable beacon, allowing real‑time visibility into victim interaction without triggering traditional sandbox alerts. This approach sidesteps complex exploit chains, instead relying on publicly available webhook services that blend into normal network traffic, complicating threat‑intel attribution and incident response.

Beyond the initial beacon, the macro payload orchestrates a multi‑stage drop chain that writes six distinct scripts—VBS, BAT, CMD, HTM, XHTML—into the user’s profile with GUID‑style filenames. The scripts concatenate strings to obscure commands, spawn a VBScript launcher, and register a scheduled task for long‑term persistence. By employing Edge in headless mode, the final HTML payload auto‑submits a form containing command output directly to the webhook endpoint, leaving virtually no forensic footprint on disk. This browser‑based exfiltration leverages native HTML capabilities, rendering many endpoint detection solutions ineffective.

For security teams, MacroMaze underscores the necessity of macro hardening, webhook traffic monitoring, and behavioral analytics that flag anomalous Office document activity. Traditional signature‑based defenses may miss the benign‑looking webhook URLs, while the use of legitimate browsers for data exfiltration evades network‑level controls. Organizations should enforce strict macro policies, deploy sandboxing that emulates full Office rendering, and implement outbound webhook egress filtering to mitigate similar low‑tech yet highly effective espionage campaigns.

Operation MacroMaze: APT28 exploits webhooks for covert data exfiltration

Read Original Article
0

Comments

Want to join the conversation?

Loading comments...