BlueDelta Launches Advanced Phishing Attacks Targeting Microsoft OWA, Google, and Sophos Users

BlueDelta’s Sophisticated Phishing Campaigns Target Microsoft OWA, Google, and Sophos VPN Users

In 2025, the Russian state-sponsored cyber group known as BlueDelta, linked to the GRU, intensified its credential-stealing operations. Between February and September, they orchestrated multiple phishing campaigns aimed at users of Microsoft Outlook Web Access (OWA), Google, and Sophos VPN services. These attacks primarily targeted government officials, energy sector employees, and research professionals across Europe and Eurasia, underscoring BlueDelta’s commitment to infiltrating sensitive sectors.

Evolution of BlueDelta’s Tactics

Since the mid-2000s, BlueDelta has been recognized for targeting organizations involved in energy research, defense cooperation, and government communications. The recent campaigns demonstrate an evolution in their methods, combining multi-stage attacks, custom code, and authentic-looking lure documents to bypass security measures and deceive victims.

Infrastructure and Execution

Recorded Future analysts identified that BlueDelta utilizes free hosting services such as Webhook.site, InfinityFree, Byet Internet Services, and ngrok to host counterfeit login pages and capture stolen credentials. This approach minimizes operational costs while providing flexibility through disposable services.

Multi-Stage Credential Capture Mechanism

The attack sequence is meticulously designed to appear legitimate:

1. Initial Contact: Victims receive phishing links leading to genuine PDF documents from reputable organizations like the Gulf Research Center.

2. Automatic Redirection: After approximately two seconds, the page redirects to a spoofed login portal resembling authentic Microsoft, Google, or Sophos interfaces.

3. Data Extraction: JavaScript functions extract the victim’s email address from URL parameters and send a page-opened beacon containing the email, IP address, and browser information to BlueDelta’s command server.

4. Credential Harvesting: When credentials are entered, additional JavaScript captures the username and password, transmitting this data via HTTP POST requests to attacker-controlled endpoints.

5. Deceptive Confirmation: Post-submission, the page alters the displayed URL to include /owa/ or /pdfviewer?pdf=browser, creating the illusion of a legitimate application interface. The victim is then redirected to the authentic PDF or the real login portal of the targeted organization, reinforcing the perception of a normal authentication process.

Implications and Recommendations

BlueDelta’s continuous refinement of these techniques highlights a sophisticated understanding of user psychology and security protocols. Organizations and individuals must remain vigilant against such advanced phishing tactics.

Preventive Measures:

– User Education: Regular training on recognizing phishing attempts and suspicious links.

– Multi-Factor Authentication (MFA): Implementing MFA to add an extra layer of security.

– Email Filtering: Utilizing advanced email filtering solutions to detect and block phishing emails.

– Regular Updates: Ensuring all systems and software are up-to-date to mitigate vulnerabilities.

By adopting these measures, organizations can enhance their defenses against sophisticated cyber threats like those posed by BlueDelta.