Back to Hub

Russian APT Bypasses Gmail 2FA in Targeted Attacks Against Critics

Imagen generada por IA para: APT ruso evade 2FA de Gmail en ataques dirigidos a críticos

A sophisticated Russian state-sponsored hacking group has successfully bypassed Google's two-factor authentication (2FA) protections in targeted attacks against political critics and academics, according to cybersecurity researchers. The Advanced Persistent Threat (APT) actors, believed to be operating with Kremlin backing, have refined social engineering tactics to compromise high-value Gmail accounts despite 2FA being enabled.

The attack chain begins with highly targeted phishing emails designed to harvest credentials from victims. Unlike conventional phishing attempts, these messages are meticulously crafted to appear as legitimate Google security alerts or collaboration requests from trusted contacts. Once victims enter their credentials on fake login pages, the attackers immediately use them to initiate a session while simultaneously intercepting the 2FA code through one of several methods:

  1. Real-time phishing: Prompting the victim to enter the 2FA code on the fake page
  2. SIM swapping: For SMS-based 2FA targets
  3. OAuth token hijacking: For app-based authentication

Security analysts note the attackers demonstrate unusual familiarity with Google's authentication flow timing, suggesting either insider knowledge or extensive reconnaissance. The campaign appears focused on individuals involved in Russia-related policy research, opposition journalism, and academic work about Eastern European affairs.

Google has acknowledged the threat but maintains that properly implemented 2FA remains effective against most attacks. The company recommends transitioning to physical security keys for high-risk users, which are resistant to these social engineering techniques. Meanwhile, cybersecurity teams advise organizations to:

• Implement conditional access policies
• Monitor for suspicious login patterns
• Conduct regular security awareness training
• Consider enterprise-grade identity protection solutions

This development marks a concerning evolution in APT tactics, where even properly secured individual accounts may be compromised through advanced social engineering rather than technical exploits. The cybersecurity community is urged to reassess protection strategies for sensitive communications in light of these demonstrated capabilities.

Original sources

NewsSearcher

This article was generated by our NewsSearcher AI system, analyzing information from multiple reliable sources.

Russian hackers target Gmail passwords to crack down on international critics

TechRadar
View source

La double authentification de Gmail n’arrête plus les hackers russes

Numerama
View source

⚠️ Sources used as reference. CSRaid is not responsible for external site content.

This article was written with AI assistance and reviewed by our editorial team.

Comentarios 0

¡Únete a la conversación!

Sé el primero en compartir tu opinión sobre este artículo.