Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Critical GitLab Flaws Allow XSS and Unauthenticated Do
May 14, 2026
Hackers Exploit HWMonitor to Load Malicious Abuse Legitimate
May 14, 2026
Palo Alto PAN-OS 0-Day Exploited to Execute Arbitrary Code With
May 14, 2026
Home/Threats/BlueDelta Hackers Steal Logins from Attacking Microsoft
Threats

BlueDelta Hackers Steal Logins from Attacking Microsoft

BlueDelta, a Russian state-sponsored threat group affiliated with the GRU military intelligence agency, has significantly expanded its credential-stealing operations throughout 2025. Between February...

Jennifer sherman
Jennifer sherman
January 8, 2026 3 Min Read
15 0

BlueDelta, a Russian state-sponsored threat group affiliated with the GRU military intelligence agency, has significantly expanded its credential-stealing operations throughout 2025.

Between February and September, the group launched multiple phishing campaigns designed to deceive users of Microsoft Outlook Web Access, Google, and Sophos VPN services into surrendering their login information.

This evolving threat demonstrates the group’s commitment to harvesting credentials from government officials, energy sector workers, and research professionals across Europe and Eurasia.

The attacks represent a clear evolution of BlueDelta’s long-standing tradecraft, which has targeted sensitive organizations since the mid-2000s.

The group focuses primarily on institutions connected to energy research, defense cooperation, and government communication networks.

The recent campaigns show increased sophistication in how BlueDelta combines multiple attack stages, custom code, and authentic-looking lure documents to bypass security controls and boost victim confidence.

Recorded Future analysts identified the malware after the second deployment phase, uncovering the technical mechanisms behind each attack.

The researchers discovered that BlueDelta relies heavily on free hosting services like Webhook.site, InfinityFree, Byet Internet Services, and ngrok to host the fake login pages and automatically capture stolen credentials.

OWA login-themed credential-harvesting page (Source - Recorded Future)
OWA login-themed credential-harvesting page (Source – Recorded Future)

This infrastructure strategy keeps operational costs minimal while maintaining flexibility through disposable services.

Multi-Stage Credential Capture Mechanism

The infection mechanism BlueDelta employs follows a carefully orchestrated chain of redirections designed to collect user data while maintaining a veneer of legitimacy.

When a victim clicks a phishing link, they first encounter legitimate PDF documents from organizations like the Gulf Research Center.

Legitimate GRC PDF lure used by BlueDelta in credential harvesting (Source - Recorded Future)
Legitimate GRC PDF lure used by BlueDelta in credential harvesting (Source – Recorded Future)

These documents display for approximately two seconds before the page automatically redirects to a spoofed login portal that mirrors the appearance of authentic Microsoft, Google, or Sophos interfaces.

The malicious code uses JavaScript functions to capture victim information systematically.

The code extracts email addresses from the URL parameters and sends a “page-opened” beacon containing the victim’s email, IP address, and browser information back to BlueDelta’s command server.

When victims enter their credentials, additional JavaScript captures the username and password, then transmits this information via HTTP POST requests to the attacker-controlled endpoint.

What makes this particularly effective is BlueDelta’s modification of the browser’s displayed URL.

BlueDelta credential-harvesting infrastructure stages (Source - Recorded Future)
BlueDelta credential-harvesting infrastructure stages (Source – Recorded Future)

After credentials are submitted, the page changes from showing the phishing domain to displaying “/owa/” or “/pdfviewer?pdf=browser,” creating the impression of a legitimate application interface.

The page then redirects to the authentic PDF or a real login portal belonging to the targeted organization, making victims believe they completed a normal authentication process.

The group’s continuous refinement of these techniques illustrates a sophisticated understanding of user psychology and web browser behavior, allowing BlueDelta to maintain high success rates in credential harvesting while evading detection.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackHackerMalwarephishingSecurityThreat

Share Article

Jennifer sherman

Jennifer sherman

Jennifer is a cybersecurity news reporter covering data breaches, ransomware campaigns, and dark web markets. With a background in incident response, Jennifer provides unique insights into how organizations respond to cyber attacks and the evolving tactics of threat actors. Her reporting has covered major breaches affecting millions of users and has helped organizations understand emerging threats. Jennifer combines technical knowledge with investigative journalism to deliver in-depth coverage of cybersecurity incidents.

Previous Post

Malicious NPM Packages Attack Developers, Steal Three Attacking

Next Post

Ni8mare Vulnerability: Attackers Hij Hijack Servers

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
Packagist: Urgent Composer Update After GitHub Token Leak
May 14, 2026
Seedworm APT Abuses Fortemedia & SentinelOne Signed Binaries
May 14, 2026
Critical Windows DNS Client Flaw Allows Remote Code Execution
May 14, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Jennifer sherman
Jennifer sherman
Sarah simpson
Sarah simpson
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us