Pro-Russian hackers target elected US officials supporting Ukraine
Enlarge / Locked out. (credit: Sean Gladwell / Getty Images)
Threat actors aligned with Russia and Belarus are targeting elected US officials supporting Ukraine, using attacks that attempt to compromise their email accounts, researchers from security firm Proofpoint said.
The campaign, which also targets officials of European nations, uses malicious JavaScript that's customized for individual webmail portals belonging to various NATO-aligned organizations, a report Proofpoint published Thursday said. The threat actor-which Proofpoint has tracked since 2021 under the name TA473-employs sustained reconnaissance and painstaking research to ensure the scripts steal targets' usernames, passwords, and other sensitive login credentials as intended on each publicly exposed webmail portal being targeted.
Tenacious targetingThis actor has been tenacious in its targeting of American and European officials as well as military and diplomatic personnel in Europe," Proofpoint threat researcher Michael Raggi wrote in an email. Since late 2022, TA473 has invested an ample amount of time studying the webmail portals of European government entities and scanning publicly facing infrastructure for vulnerabilities all in an effort to ultimately gain access to emails of those closely involved in government affairs and the Russia-Ukraine war."