Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

Safe Coding Vibe: Full New Guide

June 19, 2025

Bluenoroff Deepfake Zoom AFM Hits Crypto employee with malicious MacOS software

June 19, 2025

Discover the areas hiding in trusted instruments – find out how in this free expert session

June 19, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » Russian Star Blizzard is changing the tactic of using WhatsApp QR codes to collect credentials
Global Security

Russian Star Blizzard is changing the tactic of using WhatsApp QR codes to collect credentials

AdminBy AdminJanuary 16, 2025No Comments4 Mins Read
WhatsApp QR Codes
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


January 16, 2025Ravi LakshmananSpear Phishing / Threat Intelligence

WhatsApp QR Codes

A Russian threat known as Star Blizzard has been linked to a new phishing campaign targeting victims’ WhatsApp accounts, marking a move away from its long-time trade in a likely attempt to avoid detection.

“Star Blizzard’s targets are most often associated with government or diplomacy (both current and former), defense policy or international relations researchers whose work affects Russia, and sources of aid to Ukraine linked to the war with Russia,” Microsoft Threat. The intelligence group reported in a the report shared with The Hacker News.

Star Blizzard (formerly SEABORGIUM) is a Russian-linked threat group of course for their harvesting campaigns. Active since at least 2012, it is also tracked under the aliases Blue Callisto, BlueCharlie (or TAG-53), Calisto (alternately spelled Callisto), COLDRIVER, Dancing Salome, Gossamer Bear, Iron Frontier, TA446, and UNC4057.

Cyber ​​security

Chains of attacks have been observed before involved sending phishing emails to entities of interest, usually from a Proton account, attaching documents with embedded malicious links that redirect to an Evilginx page capable of harvesting credentials and two-factor authentication (2FA) codes via an adversary in-the-middle (AiTM ) attack.

Star Blizzard has also been linked to using email marketing platforms such as HubSpot and MailerLite to hide the true addresses of email senders and eliminate the need to include an actor-controlled domain infrastructure in email messages.

Late last year, Microsoft and the US Department of Justice (DoJ) announced seizure of more than 180 domains used by the threat actor to attack journalists, think tanks and non-governmental organizations (NGOs) between January 2023 and August 2024.

The tech giant estimated that the public disclosure of its activities may have forced the hacking team to change its tactics by compromising WhatsApp accounts. However, the campaign appears to have been limited and folded at the end of November 2024.

“The targets are primarily in the government and diplomatic sectors, including both current and former officials,” Sherrod Degrippa, director of threat intelligence strategy at Microsoft, told The Hacker News.

“In addition, targets include defense policymakers, international relations researchers who focus on Russia, and those who provide assistance to Ukraine in connection with the war with Russia.”

It all starts with a phishing email that purports to be from a US government official to give it the appearance of legitimacy and increase the likelihood that the victim will engage with it.

The message contains a quick response (QR) code urging recipients to join a purported WhatsApp group on “the latest non-governmental initiatives aimed at supporting non-governmental organizations in Ukraine.” The code, however, is deliberately broken to trigger a response from the victim.

When the recipient of the email replies, Star Blizzard sends a second message asking them to click on a (.)shortened link to join the WhatsApp group, apologizing for the inconvenience.

“When clicking on this link, the target is redirected to a web page asking them to scan a QR code to join the group,” Microsoft explained. “However, this QR code is actually used by WhatsApp to connect the account to a connected device and/or the WhatsApp Web Portal”.

Cyber ​​security

In case the target follows the instructions on the site (“aerofluidthermo(.)org”), this approach allows the threat actor to gain unauthorized access to their WhatsApp messages and even steal data through browser add-ons.

Individuals in the sectors targeted by Star Blizzard are advised to exercise caution when handling e-mails that link to external sources.

The company “marks a break in Star Blizzard’s longstanding TTPs and highlights the threat actor’s persistence in continuing phishing campaigns to gain access to sensitive information even in the face of repeated degradation.”

Did you find this article interesting? Follow us Twitter  and LinkedIn to read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

Safe Coding Vibe: Full New Guide

June 19, 2025

Bluenoroff Deepfake Zoom AFM Hits Crypto employee with malicious MacOS software

June 19, 2025

Discover the areas hiding in trusted instruments – find out how in this free expert session

June 19, 2025

Russian APT29 operates Gmail app passwords to get around 2FA in the target phishing campaign

June 19, 2025

Meta adds support to logy for Android and iOS users

June 19, 2025

Linux’s new drawbacks provide complete root access via PAM and Udisks in major distributions

June 19, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

Safe Coding Vibe: Full New Guide

June 19, 2025

Bluenoroff Deepfake Zoom AFM Hits Crypto employee with malicious MacOS software

June 19, 2025

Discover the areas hiding in trusted instruments – find out how in this free expert session

June 19, 2025

Russian APT29 operates Gmail app passwords to get around 2FA in the target phishing campaign

June 19, 2025

Meta adds support to logy for Android and iOS users

June 19, 2025

Linux’s new drawbacks provide complete root access via PAM and Udisks in major distributions

June 19, 2025

The new malicious company uses Cloudflare tunnels to deliver rats through phishing networks

June 18, 2025

1500+ Minecraft players infected with malicious Java software

June 18, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Safe Coding Vibe: Full New Guide

June 19, 2025

Bluenoroff Deepfake Zoom AFM Hits Crypto employee with malicious MacOS software

June 19, 2025

Discover the areas hiding in trusted instruments – find out how in this free expert session

June 19, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.