{"id":3963,"date":"2025-07-26T08:48:42","date_gmt":"2025-07-26T08:48:42","guid":{"rendered":"https:\/\/lmntrix.com\/blog\/?p=3963"},"modified":"2025-07-26T08:48:44","modified_gmt":"2025-07-26T08:48:44","slug":"ncsc-uncovers-stealthy-outlook-malware-authentic-antics-linked-to-russian-state-actor","status":"publish","type":"post","link":"https:\/\/lmntrix.com\/blog\/ncsc-uncovers-stealthy-outlook-malware-authentic-antics-linked-to-russian-state-actor\/","title":{"rendered":"NCSC Uncovers Stealthy Outlook Malware \u201cAuthentic Antics\u201d Linked to Russian State Actor"},"content":{"rendered":"\n<figure class=\"wp-block-image size-large\"><img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"1024\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2025\/07\/authentication-antics-img-1024x1024.webp\" alt=\"\" class=\"wp-image-3964\" srcset=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2025\/07\/authentication-antics-img-1024x1024.webp 1024w, https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2025\/07\/authentication-antics-img-300x300.webp 300w, https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2025\/07\/authentication-antics-img-150x150.webp 150w, https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2025\/07\/authentication-antics-img-768x768.webp 768w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>The United Kingdom\u2019s National Cyber Security Centre (NCSC) has exposed a <a href=\"https:\/\/www.ncsc.gov.uk\/static-assets\/documents\/malware-analysis-reports\/authentic-antics\/ncsc-mar-authentic_antics.pdf\" target=\"_blank\" rel=\"noopener\">sophisticated cyberespionage campaign leveraging a highly targeted malware strain named \u201cAuthentic Antics\u201d<\/a>. This tool quietly embeds itself in Microsoft Outlook on Windows devices to harvest Office 365 credentials and OAuth 2.0 tokens, which are then used to discreetly access cloud services such as Exchange Online, SharePoint, and OneDrive.<\/p>\n\n\n\n<p>Discovered in 2023 and attributed to the Russian military intelligence group APT28, also known as Fancy Bear, Authentic Antics is designed for long-term stealth and control. According to a detailed malware analysis report published by the NCSC, the strain operates with surgical precision, inserting itself into the Outlook process and deploying highly convincing login prompts. These prompts capture both usernames and passwords as well as OAuth refresh tokens, which allow persistent access to Microsoft services without reauthentication.<\/p>\n\n\n\n<p>What makes Authentic Antics particularly dangerous is its ability to mimic legitimate Outlook behavior. Once the attacker obtains valid credentials and tokens, the malware uses the victim\u2019s own Outlook API to send stolen data\u2014encrypted and obfuscated\u2014to an attacker-controlled mailbox. These outbound emails do not appear in the Sent folder, eliminating many typical forensic traces. The malware doesn\u2019t use traditional command-and-control (C2) infrastructure, relying instead on trusted Microsoft endpoints, significantly complicating detection efforts.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Multi-Module Architecture and Stealth Engineering<\/h2>\n\n\n\n<p>Authentic Antics consists of three main components, each designed with stealth and persistence in mind:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Dropper \u2013 A C++\/.NET DLL that only activates its payload if specific environmental checks pass. This includes looking for known usernames, system identifiers, and other indicators of a targeted machine. The dropper determines when to deploy additional modules, ensuring minimal exposure to systems not targeted by threat actors.<br><\/li>\n\n\n\n<li>Stealer \u2013 A memory-only .NET library that never touches disk, making traditional detection nearly impossible. It displays fake login dialogs, steals credentials and OAuth tokens, and leverages Outlook APIs for exfiltration. Because it operates entirely in memory, signature-based tools cannot easily spot its presence.<br><\/li>\n\n\n\n<li>Fallback PowerShell Module \u2013 A scripted backup that performs similar token theft using hardcoded credentials. It acts as a failsafe should the primary stealer module be disrupted or unable to execute.<br><\/li>\n<\/ol>\n\n\n\n<p>The malware includes several advanced evasion techniques. It verifies that it is running inside the outlook.exe process and uses registry unhooking to strip away monitoring mechanisms placed by endpoint security tools. Execution is time-gated using a registry timestamp, ensuring the stealer module activates only every six days. Strings throughout the codebase are encrypted and reconstructed in memory to defeat static analysis.<\/p>\n\n\n\n<p>One particularly clever feature is environmental keying. The stealer DLL is encrypted with a key derived from system-specific data, such as a GUID or volume serial number. This makes the malware non-portable, as it will not execute outside its designated target environment, reducing the risk of unintended exposure or analysis.<\/p>\n\n\n\n<p>To evade code audits, the malware incorporates portions of Microsoft\u2019s official Authentication Library (MSAL) and appends malicious classes. This tactic lends a facade of legitimacy, allowing the malware to hide in plain sight during automated scans or cursory code reviews.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Exfiltration via Trusted Channels<\/h2>\n\n\n\n<p>Once credentials and OAuth tokens are captured, the malware compresses and encrypts the data using RSA keys embedded during deployment. The exfiltration mechanism stands out for its use of Microsoft\u2019s own infrastructure: a forged email is sent using the Outlook REST API (outlook.office.com\/api\/v2.0\/me\/sendMail). Because the API call uses the victim\u2019s token and sets \u201cSaveToSentItems\u201d to false, making the email practically invisible to the end user. No outbound connection to suspicious domains is made, making traditional traffic inspection techniques ineffective.<\/p>\n\n\n\n<p>The malware achieves persistence through COM hijacking. Specifically, it hijacks the InprocServer32 registry key associated with Outlook\u2019s COM component. While the dropper doesn\u2019t install this key directly, its presence implies prior compromise by a separate implant or delivery vector. Once hijacked, Outlook will load the malicious DLL every time it starts, ensuring repeat execution with minimal footprint.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Official Attribution to Fancy Bear<\/h2>\n\n\n\n<p>The <a href=\"https:\/\/www.ncsc.gov.uk\/news\/uk-call-out-russian-military-intelligence-use-espionage-tool\" target=\"_blank\" rel=\"noopener\">NCSC, in collaboration with Microsoft and incident response teams, has attributed Authentic Antics to the Russian GRU-affiliated group APT28 (Fancy Bear)<\/a>. According to the NCSC\u2019s joint advisory, this malware was used in a 2023 cyberespionage operation targeting high-value individuals and institutions aligned with the UK and its allies. The UK government has since imposed sanctions on 18 officers from the Russian GRU, and formally named the malware itself in diplomatic rebukes.<\/p>\n\n\n\n<p>Paul Chichester, Director of Operations at the NCSC, emphasized the malware\u2019s sophistication and urged public and private sector organizations to improve defenses. He recommended the use of multifactor authentication (MFA), monitoring of anomalous token usage, and strict adherence to NCSC&#8217;s published mitigation guidance. Foreign Secretary David Lammy added that these hybrid attacks will not \u201cbreak [the UK\u2019s] resolve\u201d and pledged continued cooperation with NATO and EU partners.<\/p>\n\n\n\n<p>The malware\u2019s emergence fits a broader pattern of GRU activity designed to destabilize European institutions, undermine democratic governments, and disrupt Ukraine\u2019s international support networks. These incidents mark a clear shift toward exploiting OAuth and cloud authentication infrastructure, in contrast to older credential theft techniques focused on passwords alone.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Implications for Microsoft Cloud Environments<\/h2>\n\n\n\n<p>Authentic Antics is unlikely to be used in large-scale, indiscriminate attacks. Its behavior indicates deliberate, targeted intrusions aimed at collecting sensitive intelligence from political, military, and corporate leadership. However, the malware\u2019s use of Microsoft cloud services, its stealthy approach, and token-based persistence make it highly concerning for any organization relying on the Microsoft 365 ecosystem.<\/p>\n\n\n\n<p>Security professionals should assume that traditional endpoint detection tools may fail to identify this threat. Defensive strategies should include:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Behavioral monitoring of OAuth token activity,<\/li>\n\n\n\n<li>Tracking token lifespan and refresh patterns,<\/li>\n\n\n\n<li>Applying Conditional Access Policies to restrict anomalous access locations or device types,<\/li>\n\n\n\n<li>Leveraging indicators of compromise (IOCs) shared by the NCSC.<br><\/li>\n<\/ul>\n\n\n\n<p>Authentic Antics exemplifies the evolution of nation-state cyber tools: leveraging legitimate APIs, evading disk-based detection, persisting invisibly, and using cloud-native mechanisms to stay under the radar. For defenders, its existence underscores the need to move beyond perimeter-based security models and adopt identity-first, behavior-aware threat detection strategies.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The United Kingdom&rsquo;s National Cyber Security Centre (NCSC) has exposed a sophisticated cyberespionage campaign leveraging a highly targeted malware strain named &ldquo;Authentic Antics&rdquo;. This tool quietly embeds itself in Microsoft Outlook on Windows devices to harvest Office 365 credentials and OAuth 2.0 tokens, which are then used to discreetly access cloud services such as Exchange [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":3964,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[],"class_list":["post-3963","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog"],"_links":{"self":[{"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/posts\/3963","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/comments?post=3963"}],"version-history":[{"count":1,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/posts\/3963\/revisions"}],"predecessor-version":[{"id":3965,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/posts\/3963\/revisions\/3965"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/media\/3964"}],"wp:attachment":[{"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/media?parent=3963"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/categories?post=3963"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/tags?post=3963"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}