A widespread and highly-personalized spear phishing campaign has been targeting non-governmental organizations, media, individuals, and government personnel in the West and Russia. This campaign, attributed to the Russian Federal Security Service (FSB) through the threat actor COLDRIVER, employs personalized and highly-plausible social engineering tactics to gain access to online accounts.
The targets of this phishing campaign span a range of communities, from prominent Russian opposition figures living in exile to staff at nongovernmental organizations in the U.S. and Europe, as well as funders and media organizations. A common thread is a focus on Russia, Ukraine or Belarus.
Some targets still reside and work within Russia, placing them at considerable risk. The investigators at Citizen Lab as well as its partners have chosen to withhold the names of most targets to protect their privacy and safety.
The investigators found the level of personalization in these communications striking, as the level of intimacy expressed suggested the attackers have a deep understanding of their targets’ work and networks. In some cases, the attackers had followed up with targets who failed to enter their credentials.
One notable target was identified as Polina Machold, the publisher of Proekt Media, a Russian investigative news outlet. The attackers impersonated an individual known to Machold in an attempt to compromise her account. Proekt is known for its high-profile reporting on corruption and abuses of power within the Russian government.
The investigators had also observed targeting of former U.S. officials and academics in the think tank and policy space, such as former U.S. Ambassador to Ukraine Steven Pifer, who was approached by an attacker impersonating a fellow former ambassador.
The typical attack flow involves the following steps:
The investigation revealed that the attackers had leveraged a network of first-stage domains, often registered through Hostinger and hosted on shared servers with rotating IP addresses, making the campaign more difficult to track and block.
The malicious PDFs used in this campaign share consistent characteristics, including the formatting and placement of the phishing link, the PDF metadata, and the use of fake English-language author names. These overlaps suggest the use of automated tools or name lists in the generation of these documents.
The investigators shared the following recommendations to protect against this highly-personalized campaign:
AI is expected to be “the most significant driver of change in cybersecurity” this year, according to the World Economic…
Microsoft seized control of RedVDS, a global cybercrime subscription service that enabled fraud at industrial scale.
MS-ISAC warns of Fortinet vulnerabilities that may allow arbitrary code execution, impacting FortiSandbox, FortiWeb, FortiVoice, and more.
Ozer’s appointment to the California Privacy Protection Agency Board comes in the same week as another notable leadership development at…
Microsoft’s Patch Tuesday January 2026 update includes fixes for one actively-exploited zero day vulnerability and eight additional high-risk flaws. In…
A new Android banking malware can launch ransomware attacks in addition to more typical activities like credential theft and user…
This website uses cookies. By continuing to use this website you are giving consent to cookies being used.
Read More