NCSC Unveils Fancy Bear's Authentic Antics Malware Threats
The National Cyber Security Centre (NCSC) of the UK has officially linked a series of malicious cyber attacks to the Russian state-operated advanced persistent threat group known as Fancy Bear. This group is using a form of malware referred to as Authentic Antics.

Authentic Antics is engineered to steal login credentials and tokens from victim email accounts, enabling Russian cyber operatives to maintain long-term access to their targets. Fancy Bear, identified as APT28 in various threat matrices, operates under the 85th Main Special Service Centre, Military Unit 26165, and is ultimately accountable to the GRU, Russia's military intelligence agency.

Paul Chichester, the NCSC operations director, remarked, "The use of Authentic Antics reflects the continued sophistication of the cyber threats originating from Russia's GRU." He emphasized that organizations must not underestimate this threat and must implement monitoring and protective measures to safeguard their systems.
The malware has been prevalent since early 2023, functioning within Microsoft Outlook processes to display fake login prompts that trick users into revealing their credentials. This method complicates detection efforts, as the malware sends stolen data in a way that is difficult to trace.
In conjunction with the announcement, the NCSC detailed wider sanctions against three GRU units and 18 members involved in operations that support Russia's military and geopolitical strategies. David Lammy, the foreign secretary, asserted that the UK government would not tolerate these activities and would continue to take decisive action against Russian cyber threats.
In summary, the NCSC's latest findings underscore the critical importance of vigilance in the realm of cybersecurity amidst ongoing Russian cyber activities.