Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

More than 70 organizations in several sectors aimed at Chinese Cyber ​​Spying Group

June 9, 2025

Two different botnets exploit the vulnerability of the WAZUH server to launch attacks based on peaceful

June 9, 2025

Think what your IDP or CASB covers the shadow? These 5 risks prove differently

June 9, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » Russian-linked hackers have targeted NGOs and media outlets in Eastern Europe
Global Security

Russian-linked hackers have targeted NGOs and media outlets in Eastern Europe

AdminBy AdminAugust 15, 2024No Comments3 Mins Read
European NGOs and Media
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


August 15, 2024Ravi LakshmananCyber ​​Attack / Social Engineering

European NGOs and mass media

Russian and Belarusian non-profit organizations, Russian independent media and international NGOs operating in Eastern Europe have been targeted by two separate phishing campaigns organized by threat actors whose interests align with those of the Russian government.

While one of the companies – named Fish River – was credited COLDRIVERby a controversial group linked to Russia’s Federal Security Service (FSB), a second series of attacks was recognized as the work of a previously undocumented threat cluster codenamed COLDWASTREL.

Cyber ​​security

According to a joint investigation by Access Now and Citizen Lab, the campaigns also targeted prominent Russian opposition figures in exile, officials and academics from US think tanks and policy space, as well as the former US ambassador to Ukraine.

“Both types of attacks were specifically configured to better deceive members of the targeted organizations,” Access Now said. “The most common attack pattern we observed was an email sent either from a compromised account or from an account that looked like a real account of someone the victim might know.”

River of Phish involves using personalized and highly plausible social engineering tactics to get victims to click on an embedded link in a decoy PDF document that redirects them to a credential collection page, but not before fingerprinting the infected hosts in a likely attempt to prevent automated tools from accessing the second stage infrastructure.

European NGOs and mass media

The emails are sent from Proton Mail email accounts impersonating organizations or individuals known or known to the victims.

“We have often seen an attacker not attach a PDF file to the initial message requesting to view the ‘attached’ file,” Citizen Lab said. said. “We believe this was intentional and intended to increase the credibility of the message, reduce the risk of detection, and select only those targets who responded to the initial approach (eg, indicating a lack of attachment).”

The links to COLDRIVER are reinforced by the fact that the attacks use PDF documents that appear to be encrypted and prompt victims to open them in Proton Drive by clicking on the link, a trick the threat actor has used in the past.

Cyber ​​security

Some of the social engineering elements also extend to COLDWASTREL, specifically the use of Proton Mail and Proton Drive to trick subjects into clicking a link and taking them to a fake login page (“protondrive(.)online” or “protondrive(. ) services”) for Proton. Attacks were first recorded in March 2023.

However, COLDWASTREL deviates from COLDRIVER when it comes to using similar domains to collect credentials and differences in PDF content and metadata. The activity has not been assigned to a specific actor at this stage.

“If the cost of detection remains low, phishing remains not only an effective technique, but also a way to continue global targeting while avoiding the disclosure of more sophisticated (and expensive) capabilities,” Citizen Lab said.

Did you find this article interesting? Follow us Twitter  and LinkedIn to read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

More than 70 organizations in several sectors aimed at Chinese Cyber ​​Spying Group

June 9, 2025

Two different botnets exploit the vulnerability of the WAZUH server to launch attacks based on peaceful

June 9, 2025

Think what your IDP or CASB covers the shadow? These 5 risks prove differently

June 9, 2025

Openai prohibits chatgpt accounts used by Russian, Iranian and Chinese hacking groups

June 9, 2025

Operation malicious network supply software gets to NPM and Pypi ecosystems, focusing on millions worldwide

June 8, 2025

Extension of the malicious browser has infected 722 users across Latin America since the beginning of 2025

June 8, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

More than 70 organizations in several sectors aimed at Chinese Cyber ​​Spying Group

June 9, 2025

Two different botnets exploit the vulnerability of the WAZUH server to launch attacks based on peaceful

June 9, 2025

Think what your IDP or CASB covers the shadow? These 5 risks prove differently

June 9, 2025

Openai prohibits chatgpt accounts used by Russian, Iranian and Chinese hacking groups

June 9, 2025

Operation malicious network supply software gets to NPM and Pypi ecosystems, focusing on millions worldwide

June 8, 2025

Extension of the malicious browser has infected 722 users across Latin America since the beginning of 2025

June 8, 2025

New company Atomic MacOS Campation Exploaits Clickfix to focus on Apple users

June 6, 2025

Microsoft helps CBI disassemble the Indian Centers for Japanese Technical Support

June 6, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

More than 70 organizations in several sectors aimed at Chinese Cyber ​​Spying Group

June 9, 2025

Two different botnets exploit the vulnerability of the WAZUH server to launch attacks based on peaceful

June 9, 2025

Think what your IDP or CASB covers the shadow? These 5 risks prove differently

June 9, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.