According to the report, hacking groups related to Russia have unleashed a new “advanced phishing campaign” targeting European diplomats.
Check out the points survey The APT29 group said it was trying to urge targets to send invitations to wine tasting events in spoofing the Ministry of Foreign Affairs and urged them to click on the web link that leads to the deployment of new backdoors. [malware] It is called Grapeloader. ”
“The campaign appears to be focusing on targets of European diplomatic groups, including embassies in non-European countries in Europe,” the cybersecurity company said in its advisory, noting that emails with malicious links include subjects such as “Wine Tasting Event (Updated), “Ambassador Calendar,” and “Diplomatic Dinner.”
US Cybersecurity and Infrastructure Security Agency Last year, Apt29, also known as Midnight Blizzard, The Dukes or Cozy Bear, said it was “a cyberspy group and arguably part of the SVR, an element of the Russian intelligence agency.”
Windows 10 security flaws remain vulnerable to millions
According to the cybersecurity company, the new phishing campaign says European diplomats are being invited to fake wine tasting events. (Thierry Monasse/Getty Images)
Checkpoint research says APT29 is “known for targeting well-known organizations, including government agencies and think tanks,” and “can range from targeted phishing campaigns to well-known supply chain attacks that utilize large arrays of both custom and commercial malware.
“whole [new] The campaign includes several European countries with a special focus on embassies of other European countries. In addition to the emails we identified, we also found signs of limited targeting outside of Europe, including diplomats based in the Middle East.”
According to checkpoint investigations, the phishing attack began in January of this year.
Chinese officials claimed in a closed room that their government played a role in US cyberattacks: Report

According to a checkpoint investigation, the APT29 group has been attempting “fake invitations to major European Foreign Ministrys to distribute to diplomatic events, most commonly wine tasting events.” (Justin Sullivan/Getty Images)
“If the initial attempt fails, an additional wave of email has been sent to increase the likelihood that the victim will click on the link and compromise the machine,” he added.
“The servers that host the link are considered highly protected from scanning and automated analysis solutions, and malicious downloads are only triggered under certain conditions, such as a specific time or geographic location. Upon direct access, the link was redirected to the official Ministry of Foreign Affairs website,” the company continued.

According to Check Point Research, the unstable email had a subject line that included “wine event.” (istock)
Click here to get the Fox News app
It is unknown whether any of the phishing attacks were successful.

