Russia-linked phishing campaigns ensnare civil society and NGOs (original) (raw)

Access Now’s Digital Security Helpline and the Citizen Lab at the Munk School of Global Affairs & Public Policy at the University of Toronto (“the Citizen Lab”), in collaboration with First Department, Arjuna Team, and RESIDENT.ngo, have uncovered at least two separate spear-phishing campaigns targeting Russian and Belarusian nonprofit organizations, Russian independent media, international NGOs active in Eastern Europe, and at least one former U.S. ambassador. The Citizen Lab attributes one of the two campaigns to a known Russian threat group called COLDRIVER, with the other likely to be the work of a different, previously unnamed actor. Access Now and the Citizen Lab have dubbed this second actor “COLDWASTREL.”

Spear phishing describes a highly personalized way of attacking victims, using carefully tailored information that aligns with a target’s personal and professional experiences and activities. Based on Access Now and the Citizen Lab’s assessment, it is likely that these threat actors or their sponsor organizations are still targeting civil society with spear phishing and other techniques. For more details on the Digital Security Helpline’s investigation, read our full technical report.

// About COLDWASTREL

Our investigation into the first campaign began in March 2023, when Russian human rights organization First Department alerted us to a phishing email received by several international NGOs. The sender impersonated a staff member using the Proton Mail platform. First Department also reported that the same staff member’s Proton Mail account had previously been targeted by a phishing attack in October 2022, resulting in them losing access to their account. In August 2024, we were again alerted by a previously targeted organization about a new phishing attack on their staff, which occurred in August 2024. Our Digital Security Helpline team investigated these cases, then reported them to Proton, ICANN, and other service providers.

While investigating the attacks, we discovered that an IP address used by the attacker was linked to domains impersonating several prominent civil society organizations active in Eastern Europe. We alerted the organizations in question, one of which confirmed they had received a similar phishing email, but preferred to stay anonymous for privacy and security reasons.

While some aspects of the attack indicate that the attacker, which we have dubbed “COLDWASTREL,” may be acting in the interests of the Russian regime, we cannot confidently attribute the attack to a particular actor at this stage.

// About COLDRIVER

In early 2024, Access Now and the Citizen Lab identified a different cluster of phishing attacks. The organizations and individuals targeted in this campaign included Russian and Belarusian civil society organizations and independent media, international NGOs, and at least one former US ambassador. Citizen Lab has attributed this campaign to a Russia-based threat group COLDRIVER, also known as, among other names, STAR BLIZZARD, SEABORGIUM, and CALLISTO. You can read more about COLDRIVER in the Citizen Lab’s investigation. According to several governments, this group is a subordinate of the Russian Federal Security Service (FSB)’s Centre 18.

// How the attacks were carried out

Below, we describe the pattern of the spear-phishing attacks we observed and offer guidance on how you can work to prevent or mitigate such attacks.

Both kinds of attacks were highly tailored to better deceive members of the target organizations. The most common attack pattern we observed was an email sent either from a compromised account or from an account appearing similar to the real account of someone the victim may have known. The phishing attacks were personalized to show scenarios that the individuals or their organizations might feasibly encounter in their daily work, mentioning topics such as event planning or financial discussions.

The attacks also typically included a seemingly locked PDF attachment, sometimes with a link purporting to help “unlock” the PDF’s content, but which in fact led to fake login pages aimed at harvesting the target’s information.

// The impact of the attacks

While some targets told us that they did not engage with the phishing emails described in the two attacks, others were deceived into entering their user credentials.

Even though we did not directly observe credentials being passed back to the attacker’s infrastructure, it is likely that attackers were able to gain unauthorized access to some victims’ email accounts.

If successful, such attacks could be enormously harmful, particularly to Russian and Belarusian organizations and independent media, since their email accounts are likely to contain sensitive information about their staff’s identities, activities, relationships, and whereabouts. Any contact between Russian NGOs or independent media with Western-based organizations could be mischaracterized by the Russian government, and used as a pretext to designate them as a “foreign agent” or “undesirable organization.” In some cases, this could even lead to individuals being criminally charged and imprisoned.

// How to protect yourself if you suspect you are being targeted

The following recommendations have been prepared jointly by Access Now and the Citizen Lab.

Start with prevention

Use two-factor authentication, correctly: Experts agree that setting up two-factor authentication (2FA) is one of the most powerful ways to protect your account from getting hacked.

However, hackers like COLDRIVER and COLDWASTREL may try to trick you into entering your second factor; we have seen attackers successfully compromise a victim who had enabled 2FA. People using SMS messaging as their second factor are also at greater risk of having their codes stolen if a bad actor takes over their phone account.

We recommend that people use more advanced 2FA options such as security keys or, if they are Gmail users, Google Passkeys. Here are three guides for increasing the level of security for your account:

Enroll in programs for high-risk users. Google and some other providers offer optional programs for people who, because of who they are or what they do, may face additional digital risks. These programs not only increase the security of your account, but also flag to companies that you may face more sophisticated attacks. Such programs include:

Received a message? Be a five-second detective

Considering online virus-checking sites? You may wish to use online virus-scanning sites such as VirusTotal or Hybrid Analysis to check suspicious links or files.

Think you are being targeted?

These recommendations address the kind of phishing that COLDRIVER and COLDWASTREL are currently using, but there are many other ways you could be targeted. Whatever your level of risk, we encourage you to get personalized security recommendations from the Security Planner, which also maintains a list of emergency resources and advanced security guides.

If you suspect that you have already been targeted in an attack, reach out to a trusted practitioner for advice. It is crucial to evaluate any damage to your organization and/or to other related organizations and individuals, such as partners, participants, grantees, and others. If this is the case, keep them informed about what has happened, what has been leaked, how this may impact them, and what steps you are taking to mitigate this impact.

If you believe you have been compromised: Access Now’s Digital Security Helpline is available to support members of civil society, including activists, media organizations, journalists, and human rights defenders, 24/7 in nine languages, including Russian.