Copyright © 2024 Euromaidanpress.com

The work of Euromaidan Press is supported by the International Renaissance Foundation

When referencing our materials, please include an active hyperlink to the Euromaidan Press material and a maximum 500-character extract of the story. To reprint anything longer, written permission must be acquired from [email protected].

Privacy and Cookie Policies.

Reuters: Russian intelligence hackers targets Kremlin critics worldwide

The attacks, which began in 2022, have also targeted individuals still in Russia, placing them at significant risk, as hackers seek to infiltrate extensive networks of contacts.
hacker attack
Credit: Freepik
Reuters: Russian intelligence hackers targets Kremlin critics worldwide

Hackers linked to Russian intelligence are targeting the Kremlin’s critics around the globe with phishing emails, finds new research by digital rights groups Citizen Lab and Access Now, according to Reuters.

The email hacks, which began around 2022, have targeted high-profile Russian opposition figures in exile, former US experts, academics, and staff from US and EU nonprofit and media organizations, the report said.

Researchers noted that some of the targets were still in Russia when they suffered from hacker attacks. They suggested that the victims may have been chosen in an attempt to infiltrate their extensive networks of contacts.

Citizen Lab identified two groups behind the hacking: Cold River, a well-known Russian hacking group linked by Western intelligence and security officials to Russia’s Federal Security Service, and a newly emerged group named Coldwastrel, which seems to support Russian intelligence operations.

One of the hacking operation’s victims was a former US ambassador to Ukraine. The report said that the ambassador was targeted by a “credible effort” involving an impersonation of a fellow former ambassador known to him, though the report did not disclose the individual’s personal details.

The booby-trapped emails typically included a PDF attachment that prompted the recipient to click a link to decrypt the document. This link redirected the target to a website designed to mimic the Gmail or ProtonMail login pages. If the target entered their credentials, the hackers could gain access to their accounts and mailing lists.

“This attack isn’t particularly sophisticated, but it’s no less effective because you don’t expect a phishing email from a colleague,” Dmitry Zair-Bek, head of the Russian rights group First Department, which participated in the research, told Reuters.

He added that the total number of people targeted was in the double digits, with most attacks occurring in 2023.

Read more:

You could close this page. Or you could join our community and help us produce more materials like this.  We keep our reporting open and accessible to everyone because we believe in the power of free information. This is why our small, cost-effective team depends on the support of readers like you to bring deliver timely news, quality analysis, and on-the-ground reports about Russia's war against Ukraine and Ukraine's struggle to build a democratic society. A little bit goes a long way: for as little as the cost of one cup of coffee a month, you can help build bridges between Ukraine and the rest of the world, plus become a co-creator and vote for topics we should cover next. Become a patron or see other ways to support. Become a Patron!

To suggest a correction or clarification, write to us here

You can also highlight the text and press Ctrl + Enter

Please leave your suggestions or corrections here



    Euromaidan Press

    We are an independent media outlet that relies solely on advertising revenue to sustain itself. We do not endorse or promote any products or services for financial gain. Therefore, we kindly ask for your support by disabling your ad blocker. Your assistance helps us continue providing quality content. Thank you!

    Related Posts