Russia Expert Falls Prey to Elite Hackers Disguised as US Officials Infosecurity Magazine
pReporter Infosecurity MagazineppKeir Giles a British expert on Russian information operations has been targeted by a sophisticated spear phishing attack using novel social engineering techniquesppThe writer and senior consulting fellow at the UK think tank Chatham House was lured into sending appspecific passwords to someone impersonating a US State Department employeeppThe Google Threat Intelligence Group GTIG investigated the case in collaboration with the Citizen LabppThe tech giant attributed the campaign to a threat actor tracked as UNC6293 and assessed with low confidence that cluster is associated with APT29 a cyber espionage group linked to Russias Foreign Intelligence Service SVRppOn May 22 2025 Giles received an email from someone posing as Claudie S Weber who purported to be a senior program advisor at the US Department of State DoSppIn the email Claudie S Weber invited Giles for a meeting to discuss certain recent developments with the sender and their colleaguesppSuch an invitation is something that would be common for him to receive said the Citizen Lab in its report published on June 18ppHowever the researchers stated that they were unable to find any Claudie S Weber in the US State Department registries or elsewhere  ppWhile the attacker used a Gmail account for the entire interaction claudiesweberatgmailcom they ccd four other email addresses ending with stategov including WeberCSatstategov as a way of making the email exchange look more credibleppWe believe that the attacker is aware that the State Departments email server is apparently configured to accept all messages and does not emit a bounce response even when the address does not exist said the Citizen Lab researchersppThey also assessed that the generic tone and evasiveness of the email sender could suggest that the attacker used a large language model LLM to craft the messageppAlthough the initial email did not contain any malicious content a subsequent email included a PDF file with instructions to register for an MS DoS Guest Tenant accountppTo create such an account Giles was told he would need to create an appspecific password ASP on a Google email account which would provide him access to a secure government resource enabling him to participate in the consultationppIn reality of course the ASP would provide them complete and persistent access to his accounts said the Citizen Lab researchersppAn ASP is a password created by a user to allow certain applications that are incompatible with multifactor authentication MFA or a platforms standard login workflow to access their online accounts that have MFA enabledppGoogle refers to these apps as Less Secure Apps LSAs and has been phasing out support in Google Workspaces However Google users can still create and remove these passwords on their personal Gmail accountsppSlightly suspicious Giles followed the procedure but with a different account from the one the attacker had intended for him to useppOn June 14 after over 10 email exchanges Giles publicly shared his suspicion that the material exfiltrated from his accounts is likely to be manipulated and selectively released as part of a future information operationppIn a social media thread he explained that one factor that increased the supposed legitimacy of the request is what he described as its unhurried pacingppThe attackers were also ready with answers and prepared to adapt in response to Mr Giles replies For example after Mr Giles stated that the initially proposed time would not work the attackers chose to not explicitly add pressure or urgency instead suggesting that they set up the platform for the future the Citizen Lab researchers explainedppGoogle later identified the attack locked down the impacted accounts and disabled the attackers emailppIn a separate report published on June 18 GTIG stated it had identified another similar campaign that started in April 2025 and involved a Ukrainian and Microsoftthemed ASP nameppThe GTIG report provided a list of mitigation recommendations includingp