APT29 Unleashes GRAPELOADER Malware Targeting European Diplomats Using Wine-Tasting Phishing Lures

jinia
By -

 


The notorious Russian state-sponsored hacking group APT29—also known as Cozy Bear or Midnight Blizzard—has launched a stealthy cyber campaign aimed at European diplomatic entities. The campaign leverages a newly identified malware loader dubbed GRAPELOADER, alongside an enhanced version of the previously known WINELOADER backdoor.


According to a technical analysis by Check Point Research, GRAPELOADER functions as an initial-stage loader designed for fingerprinting systems, maintaining persistence, and delivering payloads. While WINELOADER continues to serve as a modular backdoor, both malware strains share obfuscated codebases, anti-analysis tactics, and advanced string decryption techniques.


How APT29 Delivers GRAPELOADER: Wine-Themed Phishing Emails

The attack starts with spear-phishing emails masquerading as wine-tasting invitations from a European Ministry of Foreign Affairs. These fraudulent messages entice targets into downloading a malware-laced ZIP filewine.zip—from domains such as bakenhof[.]com and silry[.]com.


The ZIP archive contains:

A legitimate PowerPoint executable (wine.exe)
A DLL named AppvIsvSubsystems64.dll (used as a dependency)
A malicious DLL (ppcore.dll), side-loaded via wine.exe


This clever DLL sideloading technique enables GRAPELOADER to bypass detection and stealthily deploy the final payload.


GRAPELOADER: A Silent, Persistent Intruder

Once executed, GRAPELOADER modifies the Windows Registry to ensure persistence by launching wine.exe on every system reboot. The malware then:

Gathers host data (system and user info)
Communicates with a remote server
Downloads the next-stage shellcode, believed to be WINELOADER


Check Point’s analysis reveals that GRAPELOADER has replaced ROOTSAW, a former HTA downloader, confirming its role in the APT29 infection chain.


A Wider Campaign: Diplomats in Europe and the Middle East Targeted

The cyber espionage effort appears to primarily target:

Ministries of Foreign Affairs across Europe
Foreign embassies within Europe
Possible diplomatic missions in the Middle East


This indicates a broad geopolitical motive, aligning with Russia’s intelligence-gathering strategies.


Gamaredon Resurfaces with PteroLNK Malware Campaign

In parallel, the Gamaredon threat group, another actor tied to Russian cyber operations, has ramped up attacks using PteroLNK—a VBScript-based malware that infects USB drives with LNK and PowerShell scripts.


Key Findings by HarfangLab and ESET:

1. PteroLNK actively drops LNK files to all connected drives
2. Scripts are heavily obfuscated and execute every few minutes
3. The malware replaces common files (.pdf, .docx, .xlsx) with shortcut files that trigger malware execution
4. Designed for modularity, rapid deployment, and evasion


Symantec Threat Hunter identified similar payloads (NTUSER.DAT.TMContainer...) linked to the GammaSteel stealer. These findings highlight Gamaredon’s focus on impact over stealth, using aggressive and adaptive strategies to maintain persistent access.


Final Thoughts

APT29’s deployment of GRAPELOADER showcases the evolving sophistication of state-sponsored cyber espionage. By using seemingly harmless wine-tasting themes and stealthy sideloading techniques, these actors continue to bypass traditional defenses.


As threats grow more deceptive and multi-layered, organizations—especially those in diplomatic and government sectors—must bolster their defenses with behavioral detection, network segmentation, and ongoing threat intelligence monitoring.