Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Reporters Without Borders Targeted by Russian Hackers

Posted on December 4, 2025December 4, 2025 By CWS

The Russia-linked Star Blizzard APT earlier this yr focused French press freedom group Reporters With out Borders (RSF), Sekoia reviews.

The assault occurred in March and was carried out through a phishing e-mail concentrating on one in every of RSF’s core members.

Star Blizzard used a ProtonMail tackle and spoofed a recipient’s trusted contact, asking them to evaluate an connected doc. On goal, the Russian hackers didn’t connect the doc, and as an alternative waited for the recipient to reply and ask for it, Sekoia notes.

The second e-mail contained a hyperlink to a compromised web site that redirected to a PDF hosted on ProtonDrive. Nevertheless, the PDF file couldn’t be retrieved, as Proton had blocked the operator’s account.

As a part of the assault towards Reporters With out Borders, the Star Blizzard APT despatched phishing emails in each French and English and used peace negotiation themes to lure the supposed sufferer into clicking on the malicious hyperlink.

Star Blizzard’s phishing package targets ProtonMail accounts

In a second assault involving a unique group, the menace actor connected a ZIP archive posing as a PDF file to its phishing e-mail.

The file displayed a message claiming the doc was encrypted, luring the sufferer into clicking a hyperlink to a compromised web site that redirected to a phishing package.

In response to Sekoia, the package was designed to focus on ProtonMail accounts and may relay two-factor authentication.Commercial. Scroll to proceed studying.

Possible home made, the package permits the APT to inject malicious JavaScript into the sufferer’s sign-in web page, utilizing an adversary-in-the-middle (AiTM) approach.

The modified sign-in web page has the username pre-filled and retains the sufferer’s cursor targeted on the password discipline.

Extra complicated code injected into the web page interacts with an attacker-controlled API that processes the credentials and acts as an middleman between the consumer and the reliable ProtonMail authentication interface.

The recent assaults, Sekoia says, are a continuation of Star Blizzard’s spear-phishing campaigns that make use of the ClickFix approach.

“If you’re an NGO concerned in Ukraine, or a person or researcher with intelligence on this battle and partnering with Ukrainian our bodies, you’re probably one of many targets of this menace actor,” Sekoia notes.

Additionally tracked as UNC4057, Callisto, ColdRiver, and Seaborgium, the Star Blizzard APT has been energetic since at the least 2019, concentrating on authorities entities, educational organizations, NGOs, and suppose tanks.

In 2023, the US authorities publicly linked the hacking group to Russia’s Federal Safety Service (FSB). Earlier this yr, it was seen utilizing the LostKeys malware in assaults towards authorities and navy advisors, journalists, suppose tanks, and non-profits.

Associated: Russian APT Switches to New Backdoor After Malware Uncovered by Researchers

Associated: Russian Authorities Hackers Caught Shopping for Passwords from Cybercriminals

Associated: US and Allies Sanction Russian Bulletproof Internet hosting Service Suppliers

Associated: Harmful Russian Cyberattacks on Ukraine Develop to Grain Sector

Security Week News Tags:Borders, Hackers, Reporters, Russian, Targeted

Post navigation

Previous Post: Lazarus Group’s IT Workers Scheme Hacker Group Caught Live On Camera
Next Post: Arizona Attorney General Suses Chinese E-commerce Retailer Temu Over Data Theft Claims

Related Posts

Aspire Rural Health System Data Breach Impacts Nearly 140,000 Security Week News
Coyote Banking Trojan First to Abuse Microsoft UIA Security Week News
Rising Tides: Kelley Misata on Bringing Cybersecurity to Nonprofits Security Week News
AI Supply Chain Attack Method Demonstrated Against Google, Microsoft Products Security Week News
Over 50,000 Asus Routers Hacked in ‘Operation WrtHug’ Security Week News
BlinkOps Raises $50 Million for Agentic Security Automation Platform Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Microsoft January 2026 Security Update Causes Credential Prompt Failures in Remote Desktop Connections
  • Mandiant Releases Rainbow Tables Enabling NTLMv1 Admin Password Hacking
  • Black Basta Ransomware Leader Added to EU Most Wanted and INTERPOL Red Notice
  • Let’s Encrypt has made 6-day IP-based TLS certificates Generally Available
  • Python-powered Toolkit for Information Gathering and reconnaissance

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Microsoft January 2026 Security Update Causes Credential Prompt Failures in Remote Desktop Connections
  • Mandiant Releases Rainbow Tables Enabling NTLMv1 Admin Password Hacking
  • Black Basta Ransomware Leader Added to EU Most Wanted and INTERPOL Red Notice
  • Let’s Encrypt has made 6-day IP-based TLS certificates Generally Available
  • Python-powered Toolkit for Information Gathering and reconnaissance

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark