World

Russian hackers lured embassy workers in Ukraine with ad for a cheap BMW

2023.07.12 08:22


© Reuters. The fake used car advert created by hackers suspected of working for Russia’s foreign intelligence agency in a bid to break into the computers of dozens of diplomats at embassies in Ukraine, is pictured in this undated handout picture. Unit 42/Handout v

By James Pearson

LONDON (Reuters) -Hackers suspected of working for Russia’s foreign intelligence agency targeted dozens of diplomats at embassies in Ukraine with a fake used car advert in a bid to break into their computers, according to a cybersecurity firm report published on Wednesday.

The wide-reaching espionage activity targeted diplomats working in at least 22 of the roughly 80 foreign missions in Ukraine’s capital, Kyiv, analysts at Palo Alto Networks (NASDAQ:)’ Unit 42 research division said in the report.

“The campaign began with an innocuous and legitimate event,” said the report, which was first reported by Reuters.

“In mid-April 2023, a diplomat within the Polish Ministry of Foreign Affairs emailed a legitimate flyer to various embassies advertising the sale of a used BMW 5-series sedan located in Kyiv”.

The Polish diplomat, who declined to be identified citing security concerns, confirmed the role of his advertisement in the digital intrusion.

The hackers, known as APT29 or “Cozy Bear”, intercepted and copied that flyer, embedded it with malicious software, then sent it to dozens of other foreign diplomats working in Kyiv, Unit 42 said.

“This is staggering in scope for what generally are narrowly scoped and clandestine advanced persistent threat (APT) operations,” said the report, using an acronym often used to describe state-backed cyberespionage groups.

In 2021, U.S. and British intelligence agencies identified APT29 as an arm of Russia’s foreign Intelligence Service, the SVR. The SVR did not respond to a request from Reuters for comment about the hacking campaign.

In April, Polish counterintelligence and cybersecurity authorities warned that the same group had conducted a “widespread intelligence campaign” against NATO member states, the European Union, and Africa.

Researchers at Unit 42 were able to tie the fake car advert back to the SVR because the hackers re-used certain tools and techniques which have previously been connected to the spy agency.

“Diplomatic missions will always be a high-value espionage target,” the Unit 42 report said. “Sixteen months into the Russian invasion of Ukraine, intelligence surrounding Ukraine and allied diplomatic efforts are almost certainly a high priority for the Russian government”.

USED BMW

The Polish diplomat said he had sent the original advert to various embassies in Kyiv, and that someone had called him back because the price looked “attractive”.

“When I checked, I realised they were talking about a slightly lower price,” the diplomat told Reuters.

SVR hackers, it turns out, had listed the diplomat’s BMW for a lower price – 7,500 euros – in their fake version of the advert, in an attempt to encourage more people to download malicious software that would give them remote access to their devices, Reuters found.

That software, Unit 42 said, was disguised as an album of photographs of the used BMW. Attempts to open those photographs would have infected the target’s machine, the report said.

Twenty-one of the 22 embassies targeted by the hackers and subsequently contacted by Reuters did not provide comment. It was not clear which embassies, if any, had been compromised.

A U.S. State Department spokesperson said they were “aware of the activity and based on the Directorate of Cyber and Technology Security’s analysis found it did not affect Department systems or accounts.”

As for the car, it was still available, the Polish diplomat told Reuters:

“I’ll try to sell it in Poland, probably,” he said. “After this situation, I don’t want to have any more problems”.

Source link

Related Articles

Back to top button
bitcoin
Bitcoin (BTC) $ 94,319.27 1.76%
ethereum
Ethereum (ETH) $ 3,329.47 1.04%
tether
Tether (USDT) $ 0.999841 0.06%
xrp
XRP (XRP) $ 2.14 1.05%
bnb
BNB (BNB) $ 694.37 0.66%
solana
Solana (SOL) $ 184.93 2.33%
dogecoin
Dogecoin (DOGE) $ 0.313055 0.25%
usd-coin
USDC (USDC) $ 1.00 0.10%
staked-ether
Lido Staked Ether (STETH) $ 3,329.50 0.90%
cardano
Cardano (ADA) $ 0.869581 0.20%
tron
TRON (TRX) $ 0.261022 2.41%
avalanche-2
Avalanche (AVAX) $ 36.48 3.03%
the-open-network
Toncoin (TON) $ 5.72 0.57%
wrapped-steth
Wrapped stETH (WSTETH) $ 3,972.01 0.29%
chainlink
Chainlink (LINK) $ 21.32 7.20%
shiba-inu
Shiba Inu (SHIB) $ 0.000022 0.23%
wrapped-bitcoin
Wrapped Bitcoin (WBTC) $ 94,288.26 1.49%
sui
Sui (SUI) $ 4.02 4.90%
bitget-token
Bitget Token (BGB) $ 8.38 10.46%
stellar
Stellar (XLM) $ 0.348417 2.67%
hedera-hashgraph
Hedera (HBAR) $ 0.273672 4.75%
polkadot
Polkadot (DOT) $ 6.86 2.09%
weth
WETH (WETH) $ 3,333.17 0.92%
hyperliquid
Hyperliquid (HYPE) $ 26.54 2.73%
bitcoin-cash
Bitcoin Cash (BCH) $ 440.15 0.15%
leo-token
LEO Token (LEO) $ 9.20 0.07%
uniswap
Uniswap (UNI) $ 13.18 3.79%
litecoin
Litecoin (LTC) $ 99.80 3.26%
pepe
Pepe (PEPE) $ 0.000018 1.80%
wrapped-eeth
Wrapped eETH (WEETH) $ 3,518.27 0.88%
near
NEAR Protocol (NEAR) $ 5.09 1.18%
ethena-usde
Ethena USDe (USDE) $ 0.998797 0.03%
usds
USDS (USDS) $ 1.00 0.15%
aave
Aave (AAVE) $ 322.78 6.98%
internet-computer
Internet Computer (ICP) $ 10.16 2.46%
aptos
Aptos (APT) $ 8.66 2.68%
crypto-com-chain
Cronos (CRO) $ 0.14761 2.53%
polygon-ecosystem-token
POL (ex-MATIC) (POL) $ 0.47705 1.17%
mantle
Mantle (MNT) $ 1.19 0.28%
ethereum-classic
Ethereum Classic (ETC) $ 25.84 1.84%
vechain
VeChain (VET) $ 0.045548 3.34%
monero
Monero (XMR) $ 195.48 2.81%
render-token
Render (RENDER) $ 6.95 3.28%
whitebit
WhiteBIT Coin (WBT) $ 24.62 0.47%
mantra-dao
MANTRA (OM) $ 3.70 1.30%
dai
Dai (DAI) $ 1.00 0.04%
virtual-protocol
Virtuals Protocol (VIRTUAL) $ 3.42 14.89%
bittensor
Bittensor (TAO) $ 465.67 1.76%
fetch-ai
Artificial Superintelligence Alliance (FET) $ 1.29 1.03%
arbitrum
Arbitrum (ARB) $ 0.756698 0.88%