Redazione RHC : 4 September 2025 10:03
An advanced backdoor system associated with the notorious Russian cyberespionage group APT28 allows attackers to download data, upload files, and issue commands to infected PCs. This recently discovered, next-generation backdoor system focuses on Microsoft Outlook, allowing attackers to steal information and control the affected person’s computer.
The backdoor is designed to monitor the victim’s incoming emails for specific keywords, such as “Daily Report.” When an email containing the keyword is detected, the malware activates, allowing attackers to execute malicious commands. The name “NotDoor” was coined by researchers due to the use of the word “Nothing” in the malware’s code.
The malware cleverly exploits legitimate Outlook functionality to remain hidden and ensure its persistence. According to S2 Grupo, it uses event-based VBA triggers, such as Application_MAPILogonComplete, which fires when the Outlook application starts, and Application_NewMailEx, which fires when new emails arrive. The malware’s main features can be listed as follows:
The malware has been attributed to the Russian state-sponsored cyberthreat group APT28, also known as Fancy Bear. The findings were published by LAB52, the threat intelligence unit of the Spanish cybersecurity firm S2 Grupo.
NotDoor is stealth malware written in Visual Basic for Applications (VBA), the scripting language used to automate tasks in Microsoft Office applications. To evade detection by security software, NotDoor employs several sophisticated techniques:
Once active, the backdoor creates a hidden directory to store temporary files, which are then exfiltrated to an attacker-controlled email address before being deleted. The malware confirms its successful execution by sending callbacks to a webhook site.
APT28 is a notorious criminal groupwith ties to the Central Intelligence Directorate (GRU) of the Russian General Staff. Active for over a decade, the group is responsible for numerous high-profile cyberattacks, including the breach of the Democratic National Committee (DNC) during the 2016 US presidential election and intrusions into the World Anti-Doping Agency (WADA).
The recent introduction of this tool demonstrates the group’s constant evolution and its ability to develop innovative strategies to evade contemporary defense systems. The NotDoor malware, as reported by S2 Grupo, has already been widely used to jeopardize the security of multiple companies across various economic sectors within NATO member states.
To defend against this threat, security experts recommendthat organizations disable macros by default on their systems, carefully monitor any unusual activity in Outlook, and examine email-based triggers that could be exploited by this malware.