Technology NewsTechnology NewsTechnology News
  • Computing
  • AI
  • Robotics
  • Cybersecurity
  • Electric Vehicle
  • Wearables
  • Gaming
  • Space
Reading: Russian Hackers Target Experts Using Clever State Department Phishing
Share
Font ResizerAa
Technology NewsTechnology News
Font ResizerAa
Search
  • Computing
  • AI
  • Robotics
  • Cybersecurity
  • Electric Vehicle
  • Wearables
  • Gaming
  • Space
Follow US
  • Cookie Policy (EU)
  • Contact
  • About
© 2025 NEWSLINKER - Powered by LK SOFTWARE
Technology

Russian Hackers Target Experts Using Clever State Department Phishing

Highlights

  • Russian-linked hackers employed new tactics to impersonate the State Department.

  • Attackers bypassed multi-factor authentication using app-specific passwords.

  • Experts recommend stricter controls and user awareness to counter such threats.

Kaan Demirel
Last updated: 18 June, 2025 - 8:10 pm 8:10 pm
Kaan Demirel 13 hours ago
Share
SHARE

Security professionals are drawing attention to increasingly patient and sophisticated tactics employed by threat actors suspected of links to Russia’s intelligence apparatus. Recent targeting of Keir Giles, a prominent British analyst specializing in Russian military affairs, signals a shift in methodology from traditional phishing attempts to more elaborate and targeted strategies. As attackers integrate language proficiency, technical knowledge, and realistic digital tactics, the challenges for individual and organizational cybersecurity escalate. Insights from both Citizen Lab and Google’s Threat Intelligence Group shed light on the attackers’ methods and the broader implications for digital security frameworks.

Contents
Why Did the Attack on Keir Giles Succeed?What Was the Technical Breakthrough in the Attack?How Are Security Teams and Companies Responding?

Similar attacks in previous years focused on broader, less personalized phishing efforts, often aimed at large organizations and governmental bodies by groups known as APT29, Cozy Bear, or ICECAP. Past incidents typically involved bulk email phishing and relied on victims’ unfamiliarity with common cyber threats. Unlike before, the latest incident places greater emphasis on targeted deception, personal engagement with the victim, and circumventing advanced security tools. The adaptation evident in the latest campaign reflects a notable evolution in the techniques used by state-backed threat actors.

Why Did the Attack on Keir Giles Succeed?

The operation targeting Giles distinguished itself by its careful planning and execution. Attackers used a spoofed state.gov email and a domain designed to appear legitimate, responding during typical working hours and refraining from the rushed tactics that often hint at malicious intent. Giles, a senior consulting fellow at Chatham House, noted that “it was totally straight up and very well-constructed from beginning to end.” The attackers’ fluency and patience contributed to the credibility of their approach, reducing tell-tale signs common in hastily assembled phishing scams.

What Was the Technical Breakthrough in the Attack?

A notable innovation in this campaign was the use of app-specific passwords (ASPs) to bypass multi-factor authentication (MFA), an obstacle widely regarded as a pillar of modern cybersecurity. Rather than pushing for credentials directly, the attackers convinced Giles to generate and share a screenshot of an ASP, thereby sidestepping the protections MFA confers on linked accounts. This approach exploited a feature—intended to serve users in situations where MFA is unavailable—to compromise Google accounts.

How Are Security Teams and Companies Responding?

Security responses include detection and account lockdowns, with Google issuing alerts upon discovering suspicious activity. The company advises users at elevated risk to join its Advanced Protection Program, which restricts the use of ASPs. While Google’s Threat Intelligence Group (GTIG) classifies the incident as rare due to the time and effort required, it underscores growing interest among hostile actors in slower-paced, targeted attacks. GTIG staff observed a departure from targeting large organizations, instead focusing on specific individuals such as researchers and critics.

The patience with which the attackers pursued Giles was striking to security researchers. John Scott-Railton of Citizen Lab commented,

“What impresses me about this attack is how patient the attackers were, slowly unfolding their deception over a period of weeks. It’s as if they knew everything we’d been taught to expect from Russian hackers, and then did the opposite.”

This patience suggests a calculated approach aimed at maximizing a single target’s compromise rather than achieving widespread, immediate infiltration.

The incident highlights the limitations of established security protocols in the face of evolving threat landscapes. While Giles expressed dissatisfaction with the level of user support during the account lockdown, Google maintains that its alert systems are active and urges susceptible users to strengthen their authentication methods. Previous reluctance among victims to discuss such breaches may have hindered collective learning in the cybersecurity field, but Giles’s decision to speak publicly provides a case study for updating threat awareness and defensive practices.

Adapting cyberdefense to these advanced social engineering attacks remains a significant challenge. Individuals working in sensitive or adversarial domains should review their use of features like app-specific passwords and consider enrolling in specialized protection programs. Increased awareness of targeted, patient phishing tactics can help potential victims recognize early warning signs. Sharing information about incidents, even when embarrassing, enhances the community’s collective preparedness and resilience.

You can follow us on Youtube, Telegram, Facebook, Linkedin, Twitter ( X ), Mastodon and Bluesky

You Might Also Like

Cyber Experts Urge Stronger Volunteer Networks to Safeguard Key Groups

OpenResearch Study Details How Cash Transfers Affect Work and Wellbeing

OpenAI’s Sam Altman Warns Society to Adapt as AI Progresses

Aircela Produces Gasoline from Air with New Carbon-Neutral Machine

Researchers Detect Paragon Spyware on Apple Devices Used by Journalists

Share This Article
Facebook Twitter Copy Link Print
Kaan Demirel
By Kaan Demirel
Kaan Demirel is a 28-year-old gaming enthusiast residing in Ankara. After graduating from the Statistics department of METU, he completed his master's degree in computer science. Kaan has a particular interest in strategy and simulation games and spends his free time playing competitive games and continuously learning new things about technology and game development. He is also interested in electric vehicles and cyber security. He works as a content editor at NewsLinker, where he leverages his passion for technology and gaming.
Previous Article Elon Musk Hints at Major Upgrades for Tesla’s Optimus Robot
Next Article Hackers Drain $90 Million from Nobitex in Iran Cyberattacks

Stay Connected

6.2kLike
8kFollow
2.3kSubscribe
1.7kFollow

Latest News

Wordle Players Solve Tricky “Curio” on June 19 Challenge
Gaming
Kojima Praises Small Teams After Examining Clair Obscur: Expedition 33
Gaming
Tesla Increases Robotaxi Test Runs on Austin’s Public Streets
Electric Vehicle
NASA’s Robotics Lead Shares Insights on Space and Industry Progress
AI
Hackers Drain $90 Million from Nobitex in Iran Cyberattacks
Cybersecurity
NEWSLINKER – your premier source for the latest updates in ai, robotics, electric vehicle, gaming, and technology. We are dedicated to bringing you the most accurate, timely, and engaging content from across these dynamic industries. Join us on our journey of discovery and stay informed in this ever-evolving digital age.

ARTIFICAL INTELLIGENCE

  • Can Artificial Intelligence Achieve Consciousness?
  • What is Artificial Intelligence (AI)?
  • How does Artificial Intelligence Work?
  • Will AI Take Over the World?
  • What Is OpenAI?
  • What is Artifical General Intelligence?

ELECTRIC VEHICLE

  • What is Electric Vehicle in Simple Words?
  • How do Electric Cars Work?
  • What is the Advantage and Disadvantage of Electric Cars?
  • Is Electric Car the Future?

RESEARCH

  • Robotics Market Research & Report
  • Everything you need to know about IoT
  • What Is Wearable Technology?
  • What is FANUC Robotics?
  • What is Anthropic AI?
Technology NewsTechnology News
Follow US
About Us   -  Cookie Policy   -   Contact

© 2025 NEWSLINKER. Powered by LK SOFTWARE
Welcome Back!

Sign in to your account

Register Lost your password?