Close Menu
The CISO Brief
  • Home
  • Cyberattacks
    • Ransomware
    • Cybercrime
    • Data Breach
  • Emerging Tech
  • Threat Intelligence
    • Vulnerabilities
    • Cyber Risk
  • Expert Insights
  • Careers and Learning
  • Compliance

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

What's Hot

Akira Ransomware Targets SonicWall VPNs: A Zero-Day Threat to Secured Devices

August 2, 2025

Ransomware Surge Tied to Possible SonicWall Zero-Day Vulnerability

August 1, 2025

Pi-hole Data Breach: WordPress Plugin Flaw Exposed

August 1, 2025
Facebook X (Twitter) Instagram
The CISO Brief
  • Home
  • Cyberattacks
    • Ransomware
    • Cybercrime
    • Data Breach
  • Emerging Tech
  • Threat Intelligence
    • Vulnerabilities
    • Cyber Risk
  • Expert Insights
  • Careers and Learning
  • Compliance
The CISO Brief
Home » “APT29 Strikes: Russian Hackers Bypass 2FA with Gmail App Passwords”
Cyberattacks

“APT29 Strikes: Russian Hackers Bypass 2FA with Gmail App Passwords”

Staff WriterBy Staff WriterJune 19, 2025No Comments4 Mins Read0 Views
Facebook Twitter Pinterest LinkedIn Tumblr Email
Share
Facebook Twitter LinkedIn Pinterest WhatsApp Email

Essential Insights

  1. Novel Tactics: Threat actors linked to Russia are exploiting Google’s application-specific passwords (ASPs) to access email accounts of targeted academics and government critics through sophisticated social engineering methods.

  2. Targeting Strategy: The campaign, attributed to threat cluster UNC6293 (possibly APT29), involved building rapport over weeks and using deceptive emails appearing as meeting invitations from fictitious State Department addresses to trick victims into providing their ASP passcodes.

  3. Execution and Access: Once victims share the 16-digit ASP passcode, attackers gain persistent access to their mailboxes, facilitating the reading of sensitive correspondence under the guise of enabling secure communications.

  4. Broader Implications: This attack reflects advanced social engineering techniques previously seen in other hacking campaigns, with Microsoft also reporting similar tactics by Russian-linked actors targeting Microsoft 365 accounts using OAuth codes to compromise access.

What’s the Problem?

In a sophisticated social engineering campaign attributed to the Russian-linked threat group known as UNC6293, cybercriminals have exploited Google’s application-specific password (ASP) feature to infiltrate the email accounts of targeted individuals, particularly prominent academics and critics of the Russian government. This operation, revealed by the Google Threat Intelligence Group (GTIG) alongside the Citizen Lab, operated between April and early June 2025, leveraging a slow, rapport-building strategy rather than creating immediate pressure to elicit compliance. Attackers sent seemingly innocuous emails disguised as legitimate meeting invitations from various fictitious state department addresses, convincing victims to generate and hand over their ASP codes under the guise of facilitating secure communications.

These ASP codes provided the attackers with persistent access to their victims’ email accounts, allowing them to monitor correspondence unhindered. The GTIG noted the refined nature of this attack, which includes the use of residential proxies to evade detection, underscores a disturbing trend in digital espionage that combines psychological manipulation with technical exploitation. Similar tactics have previously been employed by APT29, demonstrating a continued evolution in their methods as they seek to undermine the integrity of personal and institutional communications.

Security Implications

The recent revelations regarding the exploitation of application-specific passwords (ASPs) by threat actors linked to Russian state-sponsored hacking groups pose significant risks not only to individuals, such as academics and critics of the Kremlin, but extend to a broader spectrum of businesses and organizations utilizing similar security measures. As attackers meticulously employ social engineering tactics to coerce victims into relinquishing their ASPs under the guise of secure communication, the repercussions could ripple outward, undermining trust across digital platforms. Businesses that experience breaches may face confidential data exposure, operational disruptions, and potential reputational damage, engendering a climate of mistrust among clients and partners. Furthermore, the broader implications could provoke a pervasive sense of vulnerability in the digital ecosystem, as organizations may have to reassess and potentially overhaul their security protocols, which could entail substantial financial and resource burdens. Ultimately, if even a singular breach catalyzes a chain reaction, the collective confidence in digital communications and authentication mechanisms may be irrevocably compromised, jeopardizing the integrity of entire industries.

Possible Remediation Steps

In the rapidly evolving landscape of cyber threats, the urgency of timely remediation cannot be overstated, particularly concerning the sophisticated maneuvers employed by advanced persistent threat groups like Russia’s APT29, which exploits vulnerabilities to undermine security protocols such as two-factor authentication.

Mitigation Measures

  1. Implement Advanced Email Filters
  2. Enhance User Education
  3. Employ Endpoint Detection
  4. Regular Password Updates
  5. Monitor Account Activity
  6. Deploy Multi-Factor Authentication
  7. Conduct Phishing Simulations
  8. Incident Response Plans

NIST CSF Guidance
The NIST Cybersecurity Framework advises a proactive approach to identifying and mitigating risks. Relevant Special Publications (SP) include NIST SP 800-53 for security controls and NIST SP 800-61 for incident response strategies, offering extensive guidance on bolstering defenses against targeted phishing attacks.

Continue Your Cyber Journey

Discover cutting-edge developments in Emerging Tech and industry Insights.

Learn more about global cybersecurity standards through the NIST Cybersecurity Framework.

Disclaimer: The information provided may not always be accurate or up to date. Please do your own research, as the cybersecurity landscape evolves rapidly. Intended for secondary references purposes only.

Cyberattacks-V1

CISO Update computer security cyber attacks cyber news cyber security news cyber security news today cyber security updates cyber updates Cybersecurity data breach hacker news hacking news how to hack information security MX1 network security ransomware malware software vulnerability the hacker news
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleScania Under Siege: Truck Giant Probes Cyber Hack
Next Article Krispy Kreme Data Breach: Over 160,000 Affected in November Incident
Avatar photo
Staff Writer
  • Website

John Marcelli is a staff writer for the CISO Brief, with a passion for exploring and writing about the ever-evolving world of technology. From emerging trends to in-depth reviews of the latest gadgets, John stays at the forefront of innovation, delivering engaging content that informs and inspires readers. When he's not writing, he enjoys experimenting with new tech tools and diving into the digital landscape.

Related Posts

Akira Ransomware Targets SonicWall VPNs: A Zero-Day Threat to Secured Devices

August 2, 2025

Pi-hole Data Breach: WordPress Plugin Flaw Exposed

August 1, 2025

Cursor AI Code Editor Patches Vulnerability Against Prompt Injection Attacks

August 1, 2025

Comments are closed.

Latest Posts

Akira Ransomware Targets SonicWall VPNs: A Zero-Day Threat to Secured Devices

August 2, 20250 Views

Pi-hole Data Breach: WordPress Plugin Flaw Exposed

August 1, 20250 Views

Cursor AI Code Editor Patches Vulnerability Against Prompt Injection Attacks

August 1, 20250 Views

SonicWall Firewalls Targeted in Ransomware Surge

August 1, 20251 Views
Don't Miss

Big Risks for Malicious Code, Vulns

By Staff WriterFebruary 14, 2025

Attackers are finding more and more ways to post malicious projects to Hugging Face and…

North Korea’s Kimsuky Attacks Rivals’ Trusted Platforms

February 19, 2025

Deepwatch Acquires Dassana to Boost Cyber Resilience With AI

February 18, 2025

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

About Us
About Us

Welcome to The CISO Brief, your trusted source for the latest news, expert insights, and developments in the cybersecurity world.

In today’s rapidly evolving digital landscape, staying informed about cyber threats, innovations, and industry trends is critical for professionals and organizations alike. At The CISO Brief, we are committed to providing timely, accurate, and insightful content that helps security leaders navigate the complexities of cybersecurity.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Akira Ransomware Targets SonicWall VPNs: A Zero-Day Threat to Secured Devices

August 2, 2025

Ransomware Surge Tied to Possible SonicWall Zero-Day Vulnerability

August 1, 2025

Pi-hole Data Breach: WordPress Plugin Flaw Exposed

August 1, 2025
Most Popular

Designing and Building Defenses for the Future

February 13, 202515 Views

United Natural Foods Faces Cyberattack Disruption

June 10, 20257 Views

Attackers lodge backdoors into Ivanti Connect Secure devices

February 15, 20255 Views
© 2025 thecisobrief. Designed by thecisobrief.
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions

Type above and press Enter to search. Press Esc to cancel.