Russian hackers attacked NATO and several armies in Eastern Europe, according to a Google report

Russian hackers have recently tried to penetrate the organization's networks and the armed forces of some countries, said the Google Threat Analysis Group

Guardar
Una persona utiliza un ordenador
Una persona utiliza un ordenador portátil, en una fotografía de archivo. EFE/Sascha Steinbach

Russian hackers have recently attempted to penetrate NATO networks and the armed forces of some Eastern European countries, the Google Threat Analysis Group (TAG) said in a report released Wednesday.

The report did not say which armies had been targeted in what Google described as “credential phishing campaigns” launched by a Russian-based group called Coldriver or Callisto.

“These campaigns were sent using newly created Gmail accounts to non-Google accounts, so the success rate of these campaigns is unknown,” the report says. He clarifies: “We haven't seen any successfully compromised Gmail accounts during these campaigns.”

“Coldriver, a Russian-based threat actor sometimes called Callisto, has launched credential phishing campaigns, targeting various US-based NGOs and think tanks, the army of a Balkan country and a Ukraine-based defense contractor. However, for the first time, TAG has observed campaigns aimed at the army of several Eastern European countries, as well as a NATO Center of Excellence,” he details.

Connected smartphones
“These campaigns were sent using newly created Gmail accounts to non-Google accounts” (Getty Images)

Russia, which is now under heavy Western economic sanctions following its decision to invade Ukraine on February 24, regularly denies allegations of cyber attacks against Western targets.

In 2019, Finnish cybersecurity firm F-Secure Labs described Callisto as an unidentified advanced threat actor “interested in collecting intelligence related to foreign and security policy” in Europe.

The group also targeted a NATO Center of Excellence, said Wednesday's Google report, without giving any further details.

In a statement, the center did not directly address Google's report, but said, “We see malicious cyber activity on a daily basis.”

The same Google report also warns that Curious Gorge, a group that the report attributes to China's PLA SSF, has campaigned against government and military organizations in Ukraine, Russia, Kazakhstan and Mongolia. “While this activity does not greatly affect Google products, we remain engaged and provide notifications to victim organizations,” he says.

On the other hand, Ghostwriter, a Belarusian threat actor, recently introduced a new capability in its credential phishing campaigns. In mid-March, a security researcher published a blog post detailing a 'browser-in-browser' phishing technique. “While TAG has previously noted that this technique is used by multiple government-backed actors, the media is revisiting this blog post and publishing several stories highlighting this phishing capability.”

(With information from REUTERS)

Keep reading: