Phishing, Threat Intelligence

Advanced device code phishing leveraged by Russian APT

Russia flag is depicted on the screen with the program code. The concept of modern technology and site development.

Hackread reports that attacks involving sophisticated dynamic device code phishing have been deployed by Russian state-sponsored advanced persistent threat operation Storm-2372 to stealthily compromise organizations in the government, defense, healthcare, finance, and technology sectors in the U.S., Canada, Germany, Ukraine, Australia, and the UK.

Storm-2372 distributed malicious messages with links redirecting to seemingly legitimate login pages that generate device codes and exploit CORS-Anywhere to enable prolonged access to targeted Microsoft email accounts while circumventing multi-factor authentication and other security systems, according to an analysis from SOCRadar. Such findings were regarded by SOCRadar researchers to be indicative of increasingly advanced phishing tactics employed by threat actors that require the implementation of more robust cybersecurity defenses among organizations. "The campaign underlines the critical need for modern organizations to embrace adaptive, context-aware defense mechanisms to counter identity-based threats that are increasingly evading conventional protections," added researchers.

Get daily email updates

SC Media's daily must-read of the most current and pressing daily news

By clicking the Subscribe button below, you agree to SC Media Terms of Use and Privacy Policy.

You can skip this ad in 5 seconds