All Posts
Cyber Threat Intelligence
Malware
Research
ThreatStream
1
min read

A Timeline of APT28 Activity

Explore a timeline of APT28 (Fancy Bear) campaigns: DNC hacks, political espionage, recent Luge Federation leaks, and its stealthy alignment with Russian aims
Published on
February 22, 2018
Table of Contents
<p><strong>APT28</strong> (aka Fancy Bear, aka Pawn Storm, aka Sednit, aka Sofacy, aka Group 74, aka Sednit, aka Sofacy, aka Strontium, aka Threat Group-4127) finds its way into the news with some regularity. Most recently the group claimed to have released documents from the International Luge Federation. APT28 is probably best known for its attacks on the Democratic National Committee (DNC) and other political targets in 2016. The group has a reputation for being organized and stealthy in their campaigns. Their choice of targets often aligns with Russian geopolitical interests.</p><p>Below is an image that summarizes publicly known APT28 activity from 2014 to present:</p><p style="text-align: center;"><img alt="" src="https://cdn.filestackcontent.com/ietdH7dbRVSf05YW6MLD"/></p><p style="text-align: center;"><em>Summary of APT28 Malicious Activity</em></p><p>Activities from APT28 have been covered by a number of information security research teams since first being reported on by Trend Micro in 2014. This corpus of information on the group is spread amongst a number of sources. The Anomali Labs team has compiled a timeline of all publicly known APT28 activities and shared it in this informative <a href="https://forum.anomali.com/t/apt28-timeline-of-malicious-activity/2019" target="_blank">post in the </a><a href="https://forum.anomali.com/t/apt28-timeline-of-malicious-activity/2019" target="_blank">Anomali</a><a href="https://forum.anomali.com/t/apt28-timeline-of-malicious-activity/2019" target="_blank"> Forum</a>.</p>

FEATURED RESOURCES

April 13, 2026
Anomali Cyber Watch

Iran’s Cyber War Enters Its Most Dangerous Phase: Active ICS Exploitation, Geographic Expansion, and Two Critical Zero-Days

Read More
April 13, 2026
Anomali Cyber Watch
Public Sector

The Attack Surface Is Accelerating: AI-Augmented Intrusions, Actively Exploited Zero-Days, and What State Government IT Leaders Must Do This Week

Read More
April 13, 2026
Cyber Threat Intelligence
Security Operations

The Real Threat Intelligence Gap Is Execution

Read More
Explore All