Members of the Russian military have been receiving well-crafted phishing emails since mid-summer Credit: REUTERS/Grigory Dukor Members of the Russian military have been receiving well-crafted phishing emails since mid-summer from attackers that use Chinese-language tools and Chinese command-and-control installations, according to a report released yesterday.The campaign also targets Russian telecom firms and, as collateral damage, has hit Russian-speaking financial analysts who cover the telecom space for global financial firms, according to Sunnyvale, Calif.-based security vendor Proofpoint, Inc.In the past, the same group of attackers has been reportedly targeting military installations in Central Asia.“Actor attribution is always tricky, but there is significant use of Chinese-language build tools and command-and-control goes back to host sites in Chinese-influenced areas,” said Kevin Epstein, the company’s vice president of the threat operations center. Occam’s Razon would mean that the Chinese are the most likely actors, he said, but there’s always the possibility that some other group entirely is deliberately trying to cast blame on the Chinese.In addition, the attack could be government sponsored, or it could be a financially-motivated group planning to sell the military intelligence it gathers. “There is a world market for classified data of any time,” said Epstein. “There are documented cases in the past where private hackers hacked into various institutions and then sold the data to nation states. The lines are increasingly blurred in the world of cybersecurity.”The attack starts with a well-written Russian-language email that seems to come from someone else in the targeted military division or an analyst section from the same group of the military, he said.It comes with an attached document, a Microsoft Word file with a published article about the history of military testing in Russia.“It’s a decoy document,” said Epstein. “You double-click on it, you open it, you read it, you think, ‘Ah, that was kind of interesting.’ Then you close it and you don’t think about it again. But when it closes, it activates a macro, and the macro triggers a secondary file to take action, which is to download a third file, which is the nasty stuff.”That’s when the malware takes over the computer and everything the user has access to, the attackers now have access to.“Any anti-virus program wouldn’t see a virus in the document because there’s no virus in the document,” he said. “And the trigger on closing is a common anti-sandboxing technique because most sandboxes check for triggering when documents are opened, not when they are closed.” According to Epstein, Russian-language speakers on his staff say that the email is very convincing, and if they didn’t know to watch out for it — or hadn’t had enough coffee — they might well have clicked on it.“This looks like something a colleague might well send you as a reference, and there is nothing there to trigger suspicion,” he said. Related content news UK government plans 2,500 new tech recruits by 2025 with focus on cybersecurity New apprenticeships and talent programmes will support recruitment for in-demand roles such as cybersecurity technologists and software developers By Michael Hill Sep 29, 2023 4 mins Education Industry Education Industry Education Industry news UK data regulator orders end to spreadsheet FOI requests after serious data breaches The Information Commissioner’s Office says alternative approaches should be used to publish freedom of information data to mitigate risks to personal information By Michael Hill Sep 29, 2023 3 mins Government Cybercrime Data and Information Security feature Cybersecurity startups to watch for in 2023 These startups are jumping in where most established security vendors have yet to go. By CSO Staff Sep 29, 2023 19 mins CSO and CISO Security news analysis Companies are already feeling the pressure from upcoming US SEC cyber rules New Securities and Exchange Commission cyber incident reporting rules don't kick in until December, but experts say they highlight the need for greater collaboration between CISOs and the C-suite By Cynthia Brumfield Sep 28, 2023 6 mins Regulation Data Breach Financial Services Industry Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe