Carder.life

Carder.life (http://txgate.io:443/index.php)
-   Carding News (http://txgate.io:443/forumdisplay.php?f=38)
-   -   Microsoft: Russian hackers use ISP access to hack embassies in AiTM attacks (http://txgate.io:443/showthread.php?t=51302195)

Artifact 07-31-2025 10:24 PM

<div id="post_message_806669">
<img alt="" border="0" class="bbCodeImage" src="https://www.bleepstatic.com/content/hl-images/2023/11/08/Russian_hacker_headpic.jpg"/><br/>
<br/>
Microsoft warns that a cyber-espionage group linked to Russia's Federal Security Service (FSB) is targeting diplomatic missions in Moscow using local internet service providers.<br/>
<br/>
The hacking group tracked by Microsoft as Secret Blizzard (also known as Turla, Waterbug, and Venomous Bear) has been observed exploiting its adversary-in-the-middle (AiTM) position at the internet service provider (ISP) level to infect the systems of diplomatic missions with custom ApolloShadow malware.<br/>
<br/>
To do this, they redirect targets to captive portals, tricking them into downloading and executing a malware payload disguised as a Kaspersky antivirus installer.<br/>
<br/>
Once deployed, ApolloShadow installs a trusted root certificate disguised as Kaspersky Anti-Virus, which helps trick compromised devices into recognizing malicious websites as legitimate, allowing threat actors to maintain long-term access for intelligence gathering after infiltrating diplomatic systems.<br/>
<br/>
"This is the first time Microsoft can confirm Secret Blizzard's capability to conduct espionage at the ISP level, meaning diplomatic personnel using local internet providers and telecommunications in Russia are at high risk of being targets of Secret Blizzard's AiTM position within those services," Microsoft said.<br/>
<br/>
"This campaign, which has been ongoing since at least 2024, poses a high risk to foreign embassies, diplomatic entities, and other sensitive organizations operating in Moscow, particularly to those entities who rely on local internet providers."<br/>
<br/>
While Microsoft first detected the attacks in February 2025, the company believes this cyber-espionage campaign has been active since at least 2024.<br/>
<br/>
<img alt="" border="0" class="bbCodeImage" src="https://www.bleepstatic.com/images/news/u/1109292/2025/Secret_Blizzard_infection_chain.jpg"/><br/>
<div style="margin:20px; margin-top:5px; ">
<!-- <div class="smallfont" style="margin-bottom:2px">Quote:</div> -->
<table border="0" cellpadding="6" cellspacing="0" width="100%">
<tr>
<td class="alt2" style="background: rgb(37, 37, 37) none repeat scroll 0% 0%; border: 1px solid rgb(0, 0, 0); border-radius: 5px; font-size: 11px; text-shadow: none;">

Secret Blizzard infection chain (Microsoft)

</td>
</tr>
</table>
</div>Secret Blizzard hackers are also <a href="http://www.microsoft.com/en-us/security/blog/2024/12/04/frequent-freeloader-part-i-secret-blizzard-compromising-storm-0156-infrastructure-for-espionage/" target="_blank">taking advantage of Russia's domestic interception systems</a>, including the System for Operative Investigative Activities (SORM), to carry out their large-scale AiTM campaigns.<br/>
<br/>
<b><font size="4"><font color="White">​Unorthodox cyberspies focused on high-profile targets</font></font></b><br/>
<br/>
Turla has been orchestrating cyber-espionage and information theft campaigns targeting embassies, governments, and research facilities across over 100 countries since at least 1996.<br/>
<br/>
Two years ago, CISA <a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-129a" target="_blank">linked </a>the group to Center 16 of Russia's Federal Security Service (FSB) and a peer-to-peer (P2P) network of computers infected with Snake cyber-espionage malware that was later <a href="https://www.bleepingcomputer.com/news/security/fbi-nukes-russian-snake-data-theft-malware-with-self-destruct-command/" target="_blank">taken down</a> in a joint action involving Five Eyes cybersecurity and intelligence agencies.<br/>
<br/>
These Russian state-backed hackers are also the primary suspects behind attacks targeting the <a href="https://www.nytimes.com/2010/08/26/technology/26cyber.html" target="_blank">U.S. Central Command</a>, <a href="https://www.kaspersky.com/blog/moonlight-maze-the-lessons/6713/" target="_blank">NASA</a>, <a href="https://www.kaspersky.com/blog/moonlight-maze-the-lessons/6713/" target="_blank">the Pentagon</a>, multiple Eastern European Ministries of Foreign Affairs, the <a href="https://yle.fi/uutiset/osasto/news/russian_group_behind_2013_foreign_ministry_hack/8591548" target="_blank">Finnish Foreign Ministry</a>, and <a href="https://www.bleepingcomputer.com/news/security/russian-turla-hackers-breach-european-government-organization/" target="_blank">EU governments and embassies</a>.<br/>
<br/>
This threat group is known for its unconventional tactics, including the control of malware through <a href="https://www.bleepingcomputer.com/news/security/russian-state-hackers-use-britney-spears-instagram-posts-to-control-malware/" target="_blank">comments on Britney Spears' Instagram photos</a> and the use of <a href="https://www.bleepingcomputer.com/news/security/cyber-espionage-malware-is-so-advanced-it-has-its-own-api/" target="_blank">backdoor trojans with their own APIs</a>.<br/>
<br/>
Turla also utilized the <a href="https://www.bleepingcomputer.com/news/security/russian-hackers-use-iranian-threat-groups-tools-servers-as-cover/" target="_blank">hijacked infrastructure and malware of the Iranian APT OilRig</a> in their own campaigns to mislead and deceive defenders into attributing their attacks to Iranian state hackers.<br/>
<br/>
Most recently, they've also been spotted hijacking the infrastructure of <a href="https://www.bleepingcomputer.com/news/security/russian-cyber-spies-hide-behind-other-hackers-to-target-ukraine/" target="_blank">Pakistani threat actor Storm-0156</a> to target Ukrainian military devices connected via Starlink.<br/>
<br/>
<a href="https://www.bleepingcomputer.com/news/security/microsoft-russian-hackers-use-isp-access-to-hack-embassies-in-aitm-attacks" target="_blank">@ BleepingComputer </a>
</div>


All times are GMT. The time now is 11:06 AM.

Powered by vBulletin® Version 3.8.7
Copyright ©2000 - 2025, vBulletin Solutions, Inc.