Russian Threat Actor Star Blizzard Exploits WhatsApp in Spear-Phishing Campaign
Digital Forensics Research and Service Center (DFRSC)
White Collar Crime Investigation | Digital Forensics | Cyber Security | Malware Analysis
The Russian cyber threat group known as Star Blizzard has launched a sophisticated spear-phishing campaign targeting WhatsApp accounts, signaling a shift in their tactics to evade detection and exploit vulnerabilities. This new campaign marks a significant change in their approach, diverging from traditional credential-harvesting methods.
Star Blizzard: A Decade-Long Threat
Star Blizzard, formerly known as SEABORGIUM, is a Russia-linked cyber threat group active since at least 2012. The group has operated under numerous aliases, including Blue Callisto, COLDRIVER, and Dancing Salome. Historically, their activities have focused on harvesting credentials from individuals involved in diplomacy, government, defense policy, and research on international relations, particularly concerning Russia and Ukraine.
Typical Methods of Attack
Previously, Star Blizzard relied on spear-phishing emails sent from Proton accounts. These emails often included malicious documents embedded with links redirecting victims to an adversary-in-the-middle (AiTM) platform, such as Evilginx, to steal credentials and bypass two-factor authentication (2FA).
The group has also used platforms like HubSpot and MailerLite to disguise email sender addresses, eliminating the need for their own domains and complicating attribution.
Recent Shifts in Strategy
Following public exposure and efforts by Microsoft and the U.S. Department of Justice to disrupt their operations, including the seizure of over 180 domains, Star Blizzard adjusted its tactics. The latest campaign exploits WhatsApp's QR code feature to compromise accounts and gain unauthorized access to sensitive information.
How the Campaign Works
The campaign starts with a deceptive spear-phishing email that appears to originate from a U.S. government official. This tactic adds a sense of legitimacy to the communication, increasing the chances of engagement.
领英推荐
Targeted Sectors
Microsoft’s Threat Intelligence team identified that the campaign primarily targeted individuals in:
Implications of the Campaign
This campaign highlights Star Blizzard's adaptability and persistence in pursuing sensitive information. By shifting to WhatsApp, the group has found a way to circumvent traditional email security measures, showcasing a strategic evolution in their tactics, techniques, and procedures (TTPs).
Recommendations for Protection
Individuals in sectors targeted by Star Blizzard are advised to exercise extreme caution:
Conclusion
The latest spear-phishing campaign by Star Blizzard underscores the evolving nature of cyber threats. By exploiting WhatsApp’s features, the group continues its efforts to access sensitive data, posing significant risks to government officials, researchers, and humanitarian organizations. Vigilance and robust cybersecurity practices remain essential to mitigate such threats.