HomeCyber BalkansRussian hackers pose as CIA to steal Ukrainian defense intelligence data

Russian hackers pose as CIA to steal Ukrainian defense intelligence data

Published on

spot_img

A recent discovery by Silent Push Threat Analysts has shed light on a sophisticated cyber operation carried out by Russian hackers. These hackers have launched a multi-pronged phishing campaign, impersonating various organizations including the CIA, to gather intelligence on individuals sympathetic to Ukraine’s defense efforts.

The campaign, believed to be orchestrated by Russian Intelligence Services or aligned actors, aims to collect personal information from unsuspecting victims through a network of fraudulent websites.

The threat actors have created convincing replicas of websites belonging to the Russian Volunteer Corps (RVC), Legion Liberty, and “I Want to Live” (Hochuzhit), an appeals hotline for Russian service members in Ukraine. These fake sites prompt visitors to submit personal data under the guise of recruitment or information-sharing purposes.

Specifically targeting Russian citizens involved in anti-war activities, which are illegal in the Russian Federation and can lead to arrests, the campaign exploits anti-war sentiment to lure victims into divulging sensitive information.

The phishing infrastructure utilized in this campaign spans across multiple domains hosted on bulletproof providers, with a notable presence on Nybula LLC (ASN 401116). The attackers employ sophisticated tactics, including the use of legitimate-looking Google Forms to capture victim information and the embedding of authentic Telegram channels to enhance credibility.

One key domain in the CIA impersonation effort, ciagov[.]icu, was found to generate suspicious “Submission Reference IDs” when users attempted to report information. This domain, along with others like jagotovoff[.]com, shared infrastructure with the fake RVC and Legion Liberty sites, indicating a coordinated effort by the threat actors.

To further their deceptive tactics, the hackers have manipulated search engine results and created deceptive YouTube content to drive traffic to their phishing pages. For instance, a YouTube channel (@contactciaofficial) was discovered referencing both ciagov[.]icu and a fake .onion domain, highlighting the campaign’s multi-platform approach.

As of March 2025, the campaign remains active with new domains being registered continuously. Security researchers have identified several indicators of compromise, including specific IP addresses and domain naming patterns. Organizations and individuals are urged to exercise caution when interacting with websites purporting to represent these entities and to verify the authenticity of any forms requesting personal information.

This complex cyber operation underscores the evolving nature of cyber threats in the context of geopolitical conflicts, emphasizing the importance of enhanced digital vigilance and robust cybersecurity measures to protect against such malicious activities. It serves as a stark reminder of the lengths to which threat actors will go to gather sensitive information and highlights the critical need for vigilance and proactiveness in the face of ever-evolving cyber threats.

Source link

Latest articles

Iranian Hacker Group Handal Claims to Have Breached Israeli Defense Firm

The international cybersecurity community has been shaken by a significant data breach targeting Israeli...

ThreatsDay Bulletin: Pre-Auth Chains, Android Rootkits, CloudTrail Evasion, and 10 Additional Stories

The latest ThreatsDay Bulletin presents a succinct overview of the evolving landscape of cybersecurity...

GitHub Utilized as a Covert Channel in Multi-Stage Malware Campaign

Malicious Campaign Targeting South Korean Users Uncovered Security researchers have detected a sophisticated series of...

Cloudflare’s New CMS: A WordPress Alternative, Not a WordPress Killer

On Wednesday, Cloudflare introduced EmDash, heralded as a more secure and versatile site-building tool,...

More like this

Iranian Hacker Group Handal Claims to Have Breached Israeli Defense Firm

The international cybersecurity community has been shaken by a significant data breach targeting Israeli...

ThreatsDay Bulletin: Pre-Auth Chains, Android Rootkits, CloudTrail Evasion, and 10 Additional Stories

The latest ThreatsDay Bulletin presents a succinct overview of the evolving landscape of cybersecurity...

GitHub Utilized as a Covert Channel in Multi-Stage Malware Campaign

Malicious Campaign Targeting South Korean Users Uncovered Security researchers have detected a sophisticated series of...