NATO target of phishing campaign

Share on facebook
Share on twitter
Share on linkedin
Share on reddit

NATO target of phishing campaign

Since the outbreak of the war in Ukraine, the number of phishing and malware campaigns has increased significantly. NATO and the armed forces of various Eastern European countries are the targets. State hackers from China, Iran, North Korea, and Russia are behind these practices.

Google’s Threat Analysis Group (TAG) reports this in a blog.

Financial motives

The attackers respond to current events. They are exploiting the war in Ukraine to trick unsuspecting victims into opening fake emails with malicious links. As an example, TAG cites a man posing as a soldier to raise money to save relatives left behind in Ukraine. In this case, scammers try to make a financial profit from the misery in Ukraine. The consequences of such a scam campaign may be limited.

Not all scams are so harmless, Google warns. Several hacker groups are actively trying to damage military organizations and government services. The Chinese hacker group Curious Gorge has conducted campaigns against the armed forces in Ukraine, Russia, Kazakhstan, and Mongolia. Google does not provide details about the attacks of this group.

NATO target of Russian hackers

Another hacker collective that is active is COLDRIVER . Also known as Calisto, this group consists of Russian hackers who have launched phishing campaigns to obtain login credentials. Its members mainly target non-governmental organizations (NGOs), think tanks, and the armed forces in the Balkans. A Ukrainian defense contractor was also targeted by Russian hackers. The group has been active since 2015.

For the first time, COLDRIVER has set its sights on the military in multiple

Read more

Explore the site

More from the blog

Latest News