Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      Sunshine And March Vibes (2025 Wallpapers Edition)

      May 16, 2025

      The Case For Minimal WordPress Setups: A Contrarian View On Theme Frameworks

      May 16, 2025

      How To Fix Largest Contentful Paint Issues With Subpart Analysis

      May 16, 2025

      How To Prevent WordPress SQL Injection Attacks

      May 16, 2025

      Microsoft has closed its “Experience Center” store in Sydney, Australia — as it ramps up a continued digital growth campaign

      May 16, 2025

      Bing Search APIs to be “decommissioned completely” as Microsoft urges developers to use its Azure agentic AI alternative

      May 16, 2025

      Microsoft might kill the Surface Laptop Studio as production is quietly halted

      May 16, 2025

      Minecraft licensing robbed us of this controversial NFL schedule release video

      May 16, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      The power of generators

      May 16, 2025
      Recent

      The power of generators

      May 16, 2025

      Simplify Factory Associations with Laravel’s UseFactory Attribute

      May 16, 2025

      This Week in Laravel: React Native, PhpStorm Junie, and more

      May 16, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      Microsoft has closed its “Experience Center” store in Sydney, Australia — as it ramps up a continued digital growth campaign

      May 16, 2025
      Recent

      Microsoft has closed its “Experience Center” store in Sydney, Australia — as it ramps up a continued digital growth campaign

      May 16, 2025

      Bing Search APIs to be “decommissioned completely” as Microsoft urges developers to use its Azure agentic AI alternative

      May 16, 2025

      Microsoft might kill the Surface Laptop Studio as production is quietly halted

      May 16, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»Highly-Personalized Phishing Campaign Targets Russian Government Dissidents

    Highly-Personalized Phishing Campaign Targets Russian Government Dissidents

    August 14, 2024

    A widespread and highly-personalized spear phishing campaign has been targeting non-governmental organizations, media, individuals, and government personnel in the West and Russia. This campaign, attributed to the Russian Federal Security Service (FSB) through the threat actor COLDRIVER, employs personalized and highly-plausible social engineering tactics to gain access to online accounts.

    COLDRIVER Campaign Targeted Russian Dissidents

    The targets of this phishing campaign span a range of communities, from prominent Russian opposition figures living in exile to staff at nongovernmental organizations in the U.S. and Europe, as well as funders and media organizations. A common thread is a focus on Russia, Ukraine or Belarus.

    Some targets still reside and work within Russia, placing them at considerable risk. The investigators at Citizen Lab as well as its partners have chosen to withhold the names of most targets to protect their privacy and safety.

    The investigators found the level of personalization in these communications striking, as the level of intimacy expressed suggested the attackers have a deep understanding of their targets’ work and networks. In some cases, the attackers had followed up with targets who failed to enter their credentials.

    One notable target was identified as Polina Machold, the publisher of Proekt Media, a Russian investigative news outlet. The attackers impersonated an individual known to Machold in an attempt to compromise her account. Proekt is known for its high-profile reporting on corruption and abuses of power within the Russian government.

    The investigators had also observed targeting of former U.S. officials and academics in the think tank and policy space, such as former U.S. Ambassador to Ukraine Steven Pifer, who was approached by an attacker impersonating a fellow former ambassador.

    COLDRIVER Attack Flow

    The typical attack flow involves the following steps:

    The threat actor initiates an email exchange with the target, masquerading as someone known to them.
    The target is asked to review a document, often with a PDF file containing a phishing link.
    If the target clicks on the link, their browser fetches JavaScript code from the attacker’s server, which computes a fingerprint of the target’s system and submits it to the server.
    The server may show a CAPTCHA to the user prior to redirecting them to a phishing page designed to look like a legitimate login page for the target’s email service.
    If the target enters their password and two-factor code, the attacker uses the credentials to access the target’s email account.

    Extensive Infrastructure and Overlaps

    The investigation revealed that the attackers had leveraged a network of first-stage domains, often registered through Hostinger and hosted on shared servers with rotating IP addresses, making the campaign more difficult to track and block.

    The malicious PDFs used in this campaign share consistent characteristics, including the formatting and placement of the phishing link, the PDF metadata, and the use of fake English-language author names. These overlaps suggest the use of automated tools or name lists in the generation of these documents.

    The investigators shared the following recommendations to protect against this highly-personalized campaign:

    Be cautious of personalized and urgent emails, verify sender information, and use strong passwords and two-factor authentication to protect online accounts.
    Be wary of PDFs with embedded links, especially if they are from unknown senders, and avoid clicking on suspicious links.
    Implement robust security measures, such as email filtering and antivirus software, and regularly update systems and software with the latest security patches.
    Additionally, train employees on phishing awareness and monitor account activity to detect and report any suspicious activity.

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleAtlas Search Nodes: Now with Multi-Region Availability
    Next Article Researchers Identify Working Method to Exploit GitHub Artifacts to Hack Major Projects

    Related Posts

    Machine Learning

    LLMs Struggle with Real Conversations: Microsoft and Salesforce Researchers Reveal a 39% Performance Drop in Multi-Turn Underspecified Tasks

    May 17, 2025
    Machine Learning

    This AI paper from DeepSeek-AI Explores How DeepSeek-V3 Delivers High-Performance Language Modeling by Minimizing Hardware Overhead and Maximizing Computational Efficiency

    May 17, 2025
    Leave A Reply Cancel Reply

    Continue Reading

    B2B Testers

    Development

    Best Free and Open Source Alternatives to Apple Zoom

    Linux

    Build a Forum With Laravel: Denormalizing the Database

    Development

    CVE-2025-25014 – Kibana Prototype Pollution Remote Code Execution

    Common Vulnerabilities and Exposures (CVEs)
    GetResponse

    Highlights

    Artificial Intelligence

    A crossroads for computing at MIT

    April 11, 2024

    On Vassar Street, in the heart of MIT’s campus, the MIT Stephen A. Schwarzman College…

    How to use AI to create a logo for free

    August 12, 2024

    Windows 11’s MSN Weather now has more ads and new features

    June 30, 2024

    Acer Nitro Blaze 11 is Godzilla-sized — Here’s how massive it is next to other gaming handhelds

    January 24, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.