4 min read

Operation “AUTHENTIC ANTICS” — GRU Espionage Tool Targeting Western Infrastructure

Operation “AUTHENTIC ANTICS” — GRU Espionage Tool Targeting Western Infrastructure

July 20, 2025

In July 2025, the United Kingdom publicly exposed a covert cyber espionage operation attributed to Russia’s military intelligence service, the GRU. At the heart of this campaign is a newly identified malware tool—AUTHENTIC ANTICS—developed and deployed by the notorious hacking group APT28 (also known as Fancy Bear or Forest Blizzard). The malware is engineered to silently infiltrate Microsoft cloud environments, stealing credentials and authentication tokens to enable long-term access to email accounts and sensitive cloud services.

 This attribution marks a significant escalation in the UK’s confrontation with Russian hybrid threats. It follows a joint investigation by Microsoft and the NCC Group and coincides with a sweeping round of British government sanctions against multiple GRU units and officers. These developments underscore the evolving nature of cyber conflict: silent, persistent, state-directed, and increasingly integrated into broader geopolitical campaigns.

 The following unstructured report compiles all available intelligence surrounding AUTHENTIC ANTICS, its discovery, capabilities, attribution, and implications for national and organizational cybersecurity. It reflects the broader strategic confrontation between democratic states and state-sponsored cyber operations, and the ongoing need to defend against persistent, well-resourced actors operating in the grey zone of international conflict.

This post is for paying subscribers only