TAG-110’s Sneaky Spyware Saga: APT28’s Comedic Malware Misadventure Unveiled
TAG-110’s latest espionage campaign uses HatVibe and CherrySpy malware to target eleven countries. Deploying through malicious documents and exploiting vulnerabilities, HatVibe and CherrySpy are designed for persistence and stealth. Researchers recommend using detection systems and strong security practices to combat these threats.

Hot Take:
When cyber spies get sneaky, it’s time to update your firewall and put on your detective hat. Who knew espionage could be so high-tech and yet still involve something as vintage as a Word document? TAG-110 is turning our digital world into a James Bond movie, complete with secret codes, elusive villains, and a plot that thickens with every click!
Key Points:
- TAG-110 is deploying two custom malware strains: HatVibe and CherrySpy.
- CherrySpy, a Python-based backdoor, is used for espionage, while HatVibe is its delivery system.
- This espionage campaign targets eleven countries, with a focus on Central Asia and Ukraine.
- TAG-110 is potentially linked to APT28, a notorious Russian state-sponsored group.
- Recorded Future suggests several mitigation measures to protect against these threats.
Already a member? Log in here