Attackers Target EU Officials Helping Ukrainian Refugees

Share post:

Cyberattackers are targeting EU officials helping Ukrainian refugees with malware.

According to Proofpoint researchers, the goal of such an attack is to stop any attempt towards helping Ukrainian refugees.

“Proofpoint has identified a likely nation state-sponsored phishing campaign using a possibly compromised Ukrainian armed service member’s email account to target European government personnel involved in managing the logistics of refugees fleeing Ukraine,” Proofpoint researchers stated on the company’s website.

While the identity of the attacker remains unknown, the researchers claimed the attack was similar to the ones conducted by a hacking group dubbed Ghostwriter, also known as TA445 or UNC1151.

The attackers, in this case, have been identified as working in the interests of Belarus.

Proofpoint researchers had previously reported that Belarusian military hackers were targeting the private email addresses of Ukrainian military personnel “and related individuals.”

According to the researchers, the recent campaign targeting European officials could be the next stage of these attacks.

For more information, read the original story in Reuters.

SUBSCRIBE NOW

Related articles

Cyber Security Today, May 20, 2024 -Ransomware gang claims it hit a Canadian internet provider

A ransomware gang claims it hit a Canadian internet provider. Welcome to Cyber Security Today. It's Monday May 20th,...

Cyber Security Today, Week in Review for week ending Friday May 17, 2024

Welcome to Cyber Security Today. This is the Week in Review for the week ending Friday, May 17th,...

Cyber Security Today, May 17, 2024 – Malware hiding in Apache Tomcat servers

Malware hiding in Apache Tomcat servers, new backdoors found, and more Welcome to Cyber Security Today. It's Friday, May...

MIT students exploit blockchain vulnerability to steal 25 million dollars

Two MIT students have been implicated in a highly sophisticated cryptocurrency heist, where they reportedly exploited a vulnerability...

Become a member

New, Relevant Tech Stories. Our article selection is done by industry professionals. Our writers summarize them to give you the key takeaways