World

Russian hackers lured embassy workers in Ukraine with ad for a cheap BMW

2023.07.12 08:22


© Reuters. The fake used car advert created by hackers suspected of working for Russia’s foreign intelligence agency in a bid to break into the computers of dozens of diplomats at embassies in Ukraine, is pictured in this undated handout picture. Unit 42/Handout v

By James Pearson

LONDON (Reuters) -Hackers suspected of working for Russia’s foreign intelligence agency targeted dozens of diplomats at embassies in Ukraine with a fake used car advert in a bid to break into their computers, according to a cybersecurity firm report published on Wednesday.

The wide-reaching espionage activity targeted diplomats working in at least 22 of the roughly 80 foreign missions in Ukraine’s capital, Kyiv, analysts at Palo Alto Networks (NASDAQ:)’ Unit 42 research division said in the report.

“The campaign began with an innocuous and legitimate event,” said the report, which was first reported by Reuters.

“In mid-April 2023, a diplomat within the Polish Ministry of Foreign Affairs emailed a legitimate flyer to various embassies advertising the sale of a used BMW 5-series sedan located in Kyiv”.

The Polish diplomat, who declined to be identified citing security concerns, confirmed the role of his advertisement in the digital intrusion.

The hackers, known as APT29 or “Cozy Bear”, intercepted and copied that flyer, embedded it with malicious software, then sent it to dozens of other foreign diplomats working in Kyiv, Unit 42 said.

“This is staggering in scope for what generally are narrowly scoped and clandestine advanced persistent threat (APT) operations,” said the report, using an acronym often used to describe state-backed cyberespionage groups.

In 2021, U.S. and British intelligence agencies identified APT29 as an arm of Russia’s foreign Intelligence Service, the SVR. The SVR did not respond to a request from Reuters for comment about the hacking campaign.

In April, Polish counterintelligence and cybersecurity authorities warned that the same group had conducted a “widespread intelligence campaign” against NATO member states, the European Union, and Africa.

Researchers at Unit 42 were able to tie the fake car advert back to the SVR because the hackers re-used certain tools and techniques which have previously been connected to the spy agency.

“Diplomatic missions will always be a high-value espionage target,” the Unit 42 report said. “Sixteen months into the Russian invasion of Ukraine, intelligence surrounding Ukraine and allied diplomatic efforts are almost certainly a high priority for the Russian government”.

USED BMW

The Polish diplomat said he had sent the original advert to various embassies in Kyiv, and that someone had called him back because the price looked “attractive”.

“When I checked, I realised they were talking about a slightly lower price,” the diplomat told Reuters.

SVR hackers, it turns out, had listed the diplomat’s BMW for a lower price – 7,500 euros – in their fake version of the advert, in an attempt to encourage more people to download malicious software that would give them remote access to their devices, Reuters found.

That software, Unit 42 said, was disguised as an album of photographs of the used BMW. Attempts to open those photographs would have infected the target’s machine, the report said.

Twenty-one of the 22 embassies targeted by the hackers and subsequently contacted by Reuters did not provide comment. It was not clear which embassies, if any, had been compromised.

A U.S. State Department spokesperson said they were “aware of the activity and based on the Directorate of Cyber and Technology Security’s analysis found it did not affect Department systems or accounts.”

As for the car, it was still available, the Polish diplomat told Reuters:

“I’ll try to sell it in Poland, probably,” he said. “After this situation, I don’t want to have any more problems”.

Source link

Related Articles

Back to top button
bitcoin
Bitcoin (BTC) $ 64,443.27 1.85%
ethereum
Ethereum (ETH) $ 2,656.36 0.42%
tether
Tether (USDT) $ 1.00 0.04%
bnb
BNB (BNB) $ 605.99 0.10%
solana
Solana (SOL) $ 153.42 6.09%
usd-coin
USDC (USDC) $ 1.00 0.07%
xrp
XRP (XRP) $ 0.592244 1.20%
staked-ether
Lido Staked Ether (STETH) $ 2,656.37 0.03%
dogecoin
Dogecoin (DOGE) $ 0.110533 2.39%
the-open-network
Toncoin (TON) $ 5.62 0.24%
cardano
Cardano (ADA) $ 0.391237 7.72%
tron
TRON (TRX) $ 0.151287 0.90%
avalanche-2
Avalanche (AVAX) $ 27.95 2.77%
wrapped-steth
Wrapped stETH (WSTETH) $ 3,127.54 0.07%
wrapped-bitcoin
Wrapped Bitcoin (WBTC) $ 64,186.20 2.03%
shiba-inu
Shiba Inu (SHIB) $ 0.000015 2.53%
weth
WETH (WETH) $ 2,654.08 0.14%
chainlink
Chainlink (LINK) $ 12.23 7.41%
bitcoin-cash
Bitcoin Cash (BCH) $ 350.11 2.78%
polkadot
Polkadot (DOT) $ 4.67 4.83%
near
NEAR Protocol (NEAR) $ 5.38 3.87%
dai
Dai (DAI) $ 1.00 0.21%
uniswap
Uniswap (UNI) $ 6.97 2.02%
leo-token
LEO Token (LEO) $ 5.56 0.21%
litecoin
Litecoin (LTC) $ 66.84 0.11%
sui
Sui (SUI) $ 1.74 12.76%
fetch-ai
Artificial Superintelligence Alliance (FET) $ 1.72 5.64%
internet-computer
Internet Computer (ICP) $ 9.48 9.28%
wrapped-eeth
Wrapped eETH (WEETH) $ 2,781.94 0.27%
bittensor
Bittensor (TAO) $ 560.96 3.52%
kaspa
Kaspa (KAS) $ 0.165804 0.97%
aptos
Aptos (APT) $ 8.18 3.39%
pepe
Pepe (PEPE) $ 0.000009 6.07%
monero
Monero (XMR) $ 169.34 1.48%
first-digital-usd
First Digital USD (FDUSD) $ 1.00 0.28%
polygon-ecosystem-token
POL (ex-MATIC) (POL) $ 0.410648 0.79%
blockstack
Stacks (STX) $ 1.98 7.73%
ethereum-classic
Ethereum Classic (ETC) $ 19.51 1.97%
stellar
Stellar (XLM) $ 0.097065 0.59%
immutable-x
Immutable (IMX) $ 1.79 0.09%
ethena-usde
Ethena USDe (USDE) $ 1.00 0.29%
aave
Aave (AAVE) $ 165.93 3.94%
render-token
Render (RENDER) $ 6.25 0.96%
okb
OKB (OKB) $ 40.18 0.35%
crypto-com-chain
Cronos (CRO) $ 0.087134 1.71%
filecoin
Filecoin (FIL) $ 3.89 3.65%
arbitrum
Arbitrum (ARB) $ 0.619618 3.90%
hedera-hashgraph
Hedera (HBAR) $ 0.057823 0.91%
injective-protocol
Injective (INJ) $ 21.80 2.68%
mantle
Mantle (MNT) $ 0.634327 0.73%