Cybersecurity News and Headlines
  • All Technology
  • AI
  • Autonomy
  • B2B Growth
  • Big Data
  • BioTech
  • ClimateTech
  • Consumer Tech
  • Crypto
  • Cybersecurity
  • DevOps
  • Digital Marketing
  • Ecommerce
  • EdTech
  • Enterprise
  • FinTech
  • GovTech
  • Hardware
  • HealthTech
  • HRTech
  • LegalTech
  • Nanotech
  • PropTech
  • Quantum
  • Robotics
  • SaaS
  • SpaceTech
AllNewsDealsSocialBlogsVideosPodcastsDigests

Cybersecurity Pulse

EMAIL DIGESTS

Daily

Every morning

Weekly

Sunday recap

NewsDealsSocialBlogsVideosPodcasts
CybersecurityNewsAPT28 Targeted European Entities Using Webhook-Based Macro Malware
APT28 Targeted European Entities Using Webhook-Based Macro Malware
CybersecurityDefense

APT28 Targeted European Entities Using Webhook-Based Macro Malware

•February 23, 2026
0
The Hacker News
The Hacker News•Feb 23, 2026

Why It Matters

Abusing ubiquitous webhook services for command‑and‑control and data exfiltration lowers detection thresholds, forcing European defenders to rethink trusted‑service abuse monitoring.

Key Takeaways

  • •APT28 used webhook-based macro malware targeting European entities.
  • •Campaign ran Sep 2025–Jan 2026, named Operation MacroMaze.
  • •Macros employ tracking-pixel webhook to confirm document opening.
  • •Evasion evolved: headless browser to off‑screen Edge with SendKeys.
  • •Data exfiltration via HTML form submission to webhook.site.

Pulse Analysis

The emergence of webhook‑driven macro attacks underscores a growing trend where sophisticated actors weaponize everyday internet services. APT28’s Operation MacroMaze leverages the simplicity of webhook.site—a free, globally accessible endpoint—to both confirm victim interaction and serve as a lightweight command‑and‑control channel. By embedding a URL in the document’s XML, the threat actor bypasses traditional network defenses that focus on malicious binaries, instead exploiting the trust placed in legitimate HTTP traffic. This approach mirrors other recent campaigns that co‑opt cloud storage, DNS, and social media platforms for stealthy communications.

Technically, the malicious macro initiates a multi‑stage payload chain that blends legacy scripting with modern browser automation. After the initial beacon, a VBScript creates a scheduled task for persistence, then launches Microsoft Edge either in headless mode or off‑screen, rendering a Base64‑encoded HTML page that pulls commands from the webhook and returns results via an HTML form submission. The evolution from headless execution to SendKeys‑based keyboard simulation reflects a deliberate effort to evade sandbox detection and user prompts. Additionally, the aggressive termination of competing Edge processes ensures a controlled environment, reducing the noise that could trigger behavioral analytics.

For security teams, the campaign highlights the need to broaden telemetry beyond file hashes and network signatures. Monitoring outbound HTTP requests to known webhook domains, correlating document‑opening events with subsequent process launches, and enforcing strict macro policies are essential countermeasures. Organizations should also consider implementing deception techniques that flag unexpected webhook traffic and employ endpoint detection solutions capable of recognizing headless browser activity. As threat actors continue to repurpose benign services for malicious ends, a proactive stance on trusted‑service abuse will be critical to safeguarding European enterprises.

APT28 Targeted European Entities Using Webhook-Based Macro Malware

Read Original Article
0

Comments

Want to join the conversation?

Loading comments...