All Posts
Cyber Threat Intelligence
Malware
Research
ThreatStream
1
min read

A Timeline of APT28 Activity

Explore a timeline of APT28 (Fancy Bear) campaigns: DNC hacks, political espionage, recent Luge Federation leaks, and its stealthy alignment with Russian aims
Published on
February 22, 2018
Table of Contents
<p><strong>APT28</strong> (aka Fancy Bear, aka Pawn Storm, aka Sednit, aka Sofacy, aka Group 74, aka Sednit, aka Sofacy, aka Strontium, aka Threat Group-4127) finds its way into the news with some regularity. Most recently the group claimed to have released documents from the International Luge Federation. APT28 is probably best known for its attacks on the Democratic National Committee (DNC) and other political targets in 2016. The group has a reputation for being organized and stealthy in their campaigns. Their choice of targets often aligns with Russian geopolitical interests.</p><p>Below is an image that summarizes publicly known APT28 activity from 2014 to present:</p><p style="text-align: center;"><img alt="" src="https://cdn.filestackcontent.com/ietdH7dbRVSf05YW6MLD"/></p><p style="text-align: center;"><em>Summary of APT28 Malicious Activity</em></p><p>Activities from APT28 have been covered by a number of information security research teams since first being reported on by Trend Micro in 2014. This corpus of information on the group is spread amongst a number of sources. The Anomali Labs team has compiled a timeline of all publicly known APT28 activities and shared it in this informative <a href="https://forum.anomali.com/t/apt28-timeline-of-malicious-activity/2019" target="_blank">post in the </a><a href="https://forum.anomali.com/t/apt28-timeline-of-malicious-activity/2019" target="_blank">Anomali</a><a href="https://forum.anomali.com/t/apt28-timeline-of-malicious-activity/2019" target="_blank"> Forum</a>.</p>

FEATURED RESOURCES

March 24, 2026
Anomali Cyber Watch

Iran's Cyber War Enters Its Fourth Week: What CISOs Must Do Now

Read More
March 24, 2026
Public Sector
Anomali Cyber Watch

When Your Own Tools Become Weapons: A Convergent Threat Window Demands Immediate Action From State Government IT Leaders

Read More
March 23, 2026
Anomali Cyber Watch

Iran's Cyber War Enters a New Phase: State-directed Destruction, Synchronized Strikes, and the 24-Hour Reconstitution Problem

Read More
Explore All