Back to Blog
Expert Intelligence & Analysis

Russian APT actor phishes the Baltics and the Balkans

Authors
StrikeReady Labs
PublishedDecember 15, 2025
Est. Read Time3 min read

A Russian APT has been targeting Spain, Lithuania, Bulgaria, and more, since at least 2023.

On December 5th, a Russian APT targeted Transnistria’s governing body with a credential phishing email attachment, spoofing the Pridnestrovian Moldavian Republic. The image below shows the email content translated.

The attachment, Распоряжение № 441рп.pdf .html (Order No. 441rp.pdf .html) , shows the decoy content when executed

The html loads the image in a DIV named bluer, which is a misspelling of “blur”. The CSS applies a blur filter, as seen below

One can see the blur effect when viewing the phish page in a browser

Upon entering credentials, it checks if the password complies with a complex regex that appears to be inspired by this blog.

If the password matches the regex, it is POSTed to formcarry.com. However, if the password does not match, it still steals the data, perhaps in an effort to gather secondary passwords that might be valid else where.

This campaign has been active since at least 2023 with spears such as 12th package of sanctions against Russia.pdf.html, based on identical regular expressions and javascript logic.

Other notable decoy images from this campaign are below.

There was one phish that did not follow the same pattern, and instead loaded unknown, but suspected malicious code, from an external server, timesyncwindows.com

Other files from this same campaign are below, along with the target, which is often embedded in the payload

LureAssessed Target
Cancellation of personal special economic and other restrictive measures.htmlUkraine DIB
Cyber Threats and NATO Horizon Scanning and Analysis.htmlGovernments of Bosnia and Herzegovina, Macedonia, Montenegro, Spain
Update of the List of Diplomatic Missions Accredited to EEAS.htmlGovernments of Ukraine, Lithuania
New Event Scheduling in Outlook on the Web.htmlMacedonia Government
NATO SCHOOL Course Catalogue 2024 update.htmlBulgaria Government
12th package of sanctions against Russia.pdf.htmlUkraine DIB
Protected Internal Reporting Regulations.htmlMacedonia Government
Secret Report Cyber Threats Security.htmlMoldova Government
Распоряжение № 441рп.pdf.htmlMoldova Government

Figure 10: Lures from this campaign

Because the phish lures often contain the direct target information, we are not providing the content as we normally do, however the IOCs are available on our github

Please get in touch at research@strikeready.com if you have question, corrections, or comments

Acknowledgements

The authors would like to thank the reviewers, as well as peer vendors, for their comments and corrections. Please get in touch at research@strikeready.com if you have corrections, would like us to use your group name, or would like to collaborate on research.

End of Intelligence Briefing

Share this PostRussian APT actor phishes the Baltics and the Balkans
0%