Russian Hackers Target Over 20 NGOs with Evilginx Phishing via Fake Microsoft Entra Pages

Published:

spot_img

Understanding the Threat of Void Blizzard: A New Cybersecurity Concern

Microsoft has recently uncovered a significant cluster of threat activity associated with a Russia-linked hacking group known as Void Blizzard, also referred to as Laundry Bear. This group, active since at least April 2024, is under scrutiny for their involvement in cyber-espionage aimed at organizations pivotal to Russian governmental interests. Such targets include key sectors such as government, defense, transportation, media, NGOs, and healthcare across Europe and North America.

Overview of Void Blizzard’s Activities

According to the Microsoft Threat Intelligence team, Void Blizzard primarily engages in obtaining access to organizations through stolen login credentials, which they likely acquire from various online black markets. Once inside a system, their tactics include extensive data theft, encompassing a large volume of emails and files. Notably, their operations have a marked focus on NATO member states and Ukraine, indicating a strategic agenda aligned with Russian political objectives.

Targeted Sectors and Notable Attacks

Void Blizzard’s attacks have prominently targeted government bodies and law enforcement agencies in NATO member countries, particularly those providing military or humanitarian support to Ukraine. The group’s operations extend to numerous sectors, with a significant focus on education, transportation, and defense enterprises within Ukraine. For instance, an October 2024 breach compromised user accounts belonging to a Ukrainian aviation organization, further illustrating their expanding reach.

Techniques and Methods Utilized

The group’s approach appears both opportunistic and systematically targeted, emphasizing large-scale efforts aimed at organizations deemed valuable to the Russian state. Their initial access methods often employ rudimentary tactics, such as password spraying and utilizing stolen authentication credentials.

In several campaigns, Void Blizzard has exploited credentials sourced from information stealer logs prevalent in cybercrime ecosystems to infiltrate platforms like Exchange and SharePoint Online, allowing them to harvest sensitive organizational data.

Advanced Phishing Techniques

More recently, Microsoft reported a shift in Void Blizzard’s tactics towards spear-phishing. This method involves crafting deceptive emails designed to coax victims into revealing their login details through adversary-in-the-middle (AitM) landing pages.

One notable operation targeted over 20 NGOs in Europe and the U.S., presenting seemingly legitimate communication about the European Defense and Security Summit. Recipients received PDF attachments that included malicious QR codes linked to a phishing site imitating the Microsoft Entra authentication portal.

Post-Compromise Exploitation

After breaching an organization’s defenses, Void Blizzard employs various strategies to exploit compromised systems. These include utilizing Exchange Online and Microsoft Graph to enumerate users’ mailboxes and cloud-based files, ensuring efficient data accumulation. In some situations, they have even accessed conversations within Microsoft Teams through web applications.

Microsoft emphasizes that many targeted organizations have overlapping interests with other well-known Russian state actors, such as Forest Blizzard, Midnight Blizzard, and Secret Blizzard. This intersection points to an organized espionage operation aimed at gathering intelligence for the Russian government.

In a connected issue, the Netherlands Defence Intelligence and Security Service (MIVD) attributed a breach from September 23, 2024, involving a Dutch police agency to Void Blizzard. Through a technique known as a pass-the-cookie attack, the threat actor gained unauthorized access to employee accounts from which sensitive contact information was obtained.

A pass-the-cookie attack involves leveraging stolen session cookies, thus allowing the attacker to bypass traditional login credentials. While the complete range of information stolen remains unclear, the operation raises concerns regarding Void Blizzard’s intent to gather intelligence related to Western military supplies to Ukraine.

Threat Landscape and Implications

The activities of Void Blizzard underline a growing cybersecurity threat landscape that demands urgent attention. As this group continues to target sensitive organizations worldwide, the risk to national security and private enterprises grows.

Organizations are urged to bolster their cybersecurity measures, particularly against potential phishing attacks and to remain vigilant against unauthorized access attempts. The need for comprehensive awareness of such sophisticated threats has never been more critical.

spot_img

Related articles

Recent articles

Critical CVSS 10.0 Vulnerability in Wishlist Plugin Puts Over 100,000 WordPress Sites at Risk

Critical Security Flaw in TI WooCommerce Wishlist Plugin Overview of the Vulnerability Cybersecurity experts have identified a serious security vulnerability in the TI WooCommerce Wishlist plugin...

Avnet India and NITK Surathkal Join Forces to Develop AI Solutions for Landslide Detection and Wildlife Conservation

Avnet India Partners with NITK for Sustainable Innovation A Major Step Towards Environmental Sustainability Bangalore, India – Avnet India Pvt Ltd, a renowned global technology distributor,...

Ransomware Strikes: 69% of Organizations Affected in Past Year

Rising Ransomware Threats: A Realty Check The Alarming Statistics Recent findings from Delinea’s 2025 State of Ransomware Report paint a stark picture of the current cybersecurity...

Empowering Cybersecurity Experts to Safeguard National Digital Sovereignty

Shaping the Future of Cybersecurity: Positive Hack Camp 2025 In an age where our digital world is increasingly vulnerable to attacks, the necessity for skilled...