Search for an article

Select a plan

Choose a plan from below, subscribe, and get access to our exclusive articles!

Monthly plan

$
13
$
0
billed monthly

Yearly plan

$
100
$
0
billed yearly

All plans include

  • Donec sagittis elementum
  • Cras tempor massa
  • Mauris eget nulla ut
  • Maecenas nec mollis
  • Donec feugiat rhoncus
  • Sed tristique laoreet
  • Fusce luctus quis urna
  • In eu nulla vehicula
  • Duis eu luctus metus
  • Maecenas consectetur
  • Vivamus mauris purus
  • Aenean neque ipsum
Customize Consent Preferences

We use cookies to help you navigate efficiently and perform certain functions. You will find detailed information about all cookies under each consent category below.

The cookies that are categorized as "Necessary" are stored on your browser as they are essential for enabling the basic functionalities of the site. ... 

Always Active

Necessary cookies are required to enable the basic features of this site, such as providing secure log-in or adjusting your consent preferences. These cookies do not store any personally identifiable data.

No cookies to display.

Functional cookies help perform certain functionalities like sharing the content of the website on social media platforms, collecting feedback, and other third-party features.

No cookies to display.

Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics such as the number of visitors, bounce rate, traffic source, etc.

No cookies to display.

Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.

No cookies to display.

Advertisement cookies are used to provide visitors with customized advertisements based on the pages you visited previously and to analyze the effectiveness of the ad campaigns.

No cookies to display.

HomeCII/OTRussian Phishing Targets Anti-war, Ukraine Supporters through Fake CIA Sites

Russian Phishing Targets Anti-war, Ukraine Supporters through Fake CIA Sites

Published on

spot_img

A recent discovery by cybersecurity researchers at Silent Push has unveiled a sophisticated phishing campaign allegedly orchestrated by Russian intelligence services, targeting individuals who support Ukraine and oppose the Russian government. This elaborate operation, which came to light in early 2025, utilized fake website lures to harvest personal information from Russian citizens and informants, a risky endeavor considering the prohibition of anti-war activities within the Russian Federation.

The modus operandi of this phishing campaign involved the use of fake websites that collected user data through a combination of static HTML and JavaScript. Data exfiltration was often carried out through simple POST requests to servers controlled by the threat actors or by exploiting Google Forms for malicious purposes. The researchers identified four distinct phishing clusters, each masquerading as a reputable organization: the US Central Intelligence Agency (CIA), the Russian Volunteer Corps (RVC), Legion Liberty, and Hochuzhit, a hotline for Russian service members operated by Ukrainian intelligence.

Despite their well-crafted impersonations, these clusters shared a common goal of illicitly collecting personal data from unsuspecting victims. The threat actors behind this campaign employed a bulletproof hosting provider, Nybula LLC, to host phishing pages that replicated the official websites of the targeted organizations. Furthermore, the use of Google Forms and website forms to gather data demonstrated a high level of sophistication in deceiving individuals and extracting sensitive information.

An in-depth analysis of the campaign’s infrastructure highlighted interconnectedness among the four phishing clusters, with shared technical details such as the WHOIS organization name “Semen Gerda,” similar metadata, and common registration through the NiceNIC registrar. The phishing pages utilized various tactics to lure victims, including enticing buttons that led to legitimate or malicious forms requesting personal information.

The impersonation of the CIA involved the creation of domains with suspicious web forms and embedded illegitimate .onion links, while YouTube content was also manipulated to redirect users to phishing domains. In contrast, the Hochuzhit cluster targeted Russian service members seeking to surrender, using specific domains to lure victims. Silent Push Threat Analysts, in collaboration with security researcher Artem Tamoian, uncovered additional domains and infrastructure linked to the campaign, including domains hosted on Cloudflare.

Silent Push attributed this phishing campaign to Russian intelligence services based on several factors, including the strategic targets of interest to the Russian government, observed tactics, techniques, and procedures (TTPs) consistent with known Russian state-sponsored actor behavior, and the persistent impersonation of the CIA for intelligence gathering purposes. The researchers emphasized the significant privacy and security risks posed by all domains associated with this campaign, underscoring the importance of exercising caution and implementing robust cybersecurity measures.

In conclusion, the exposure of this alleged Russian intelligence phishing operation sheds light on the ongoing threat of malicious cyber activities targeting individuals advocating for causes contrary to the interests of certain governments. This incident serves as a stark reminder of the need for vigilance and enhanced cybersecurity measures to safeguard personal data and prevent unauthorized access by threat actors.

Source link

Latest articles

Top 10 Most-Used RDP Passwords Lack Complexity

In a groundbreaking study conducted by Specops Software, new insights have emerged regarding the...

Zklend Hacker Admits to Losing Stolen Ethereum on Tornado Cash Scam Website

A recent incident in the world of decentralized finance (DeFi) serves as a cautionary...

Australian councils advised to enhance training for cyber threats

Cyberattacks on Australian local councils are on the rise, highlighting the urgent need for...

GCHQ Intern Admits to Smuggling Data

Hassan Arshad, a 25-year-old intern at the British cyber intelligence agency GCHQ, admitted to...

More like this

Top 10 Most-Used RDP Passwords Lack Complexity

In a groundbreaking study conducted by Specops Software, new insights have emerged regarding the...

Zklend Hacker Admits to Losing Stolen Ethereum on Tornado Cash Scam Website

A recent incident in the world of decentralized finance (DeFi) serves as a cautionary...

Australian councils advised to enhance training for cyber threats

Cyberattacks on Australian local councils are on the rise, highlighting the urgent need for...