The attacks involved spear phishing emails sent to dozens of targets Credit: Michael Kan/IDGNS Hours after Donald Trump won the presidential election, a suspected Russian cyber-espionage team was blamed for targeting several U.S. think tanks with phishing emails designed to fool victims into installing malware.On Wednesday, the phishing emails landed in the inboxes of dozens of targets associated with U.S. think tanks and non-governmental organizations, said security firm Volexity.A hacking group called APT 29 or Cozy Bear was behind the attack, according to Veloxity. This is one of the same groups that security experts say was also responsible for hacking the Democratic National Committee and is allegedly tied to the Russian government.Wednesday’s attack involved five waves of phishing emails that targeted groups and individuals in the national security, international affairs, and public policy sectors, among other groups, Volexity said in a blog post. To entice the victims to open the emails, the messages were titled with subject lines about election rigging in the U.S. and how the system was flawed. Other emails pretended to come from the Clinton Foundation. However, all of the messages were meant to trick victims into opening download links or attachments to install malware.That malware is designed to examine and control whatever system it infects. It can also secretly download additional malicious files and evade detection from antivirus products. Volexity is blaming the attack on the Cozy Bear group partly because of the malware used; it contains coding that’s been found in other hacking techniques tied to the elite hacking team, company founder Steven Adair said.In addition, Wednesday’s attack matches similar methods used in phishing email campaigns that occurred in August and also targeted think tanks and NGOs.In this case, the malicious emails came from a mix of Google Gmail accounts and possibly hacked emails accounts from Harvard’s arts and sciences faculty.Harvard didn’t immediately respond to a request for comment. Volexity declined to name which think tanks were targeted. But Adam Segal, a China expert at the Council on Foreign Relations, and Maeve Whelan-Wuest, a researcher at the Brookings Institution, said on Twitter they had both received the phishing emails.Why these institutions were targeted isn’t clear. But “folks at think tanks have a lot of contacts and relationships with different government officials and people in the political space,” Adair said. “My guess it’s access to what these people are saying and potentially leveraging knowledge about them to further target them,” he said. Security firm Crowdstrike has claimed the hacking team Cozy Bear has previously infiltrated networks belonging to the White House, U.S. State Department, and the Joint Chiefs of Staff. Although security experts and the U.S. government have linked the Cozy Bear group with Russia, the country’s government has denied any involvement in state-sponsored hacking. Related content news analysis Attackers breach US government agencies through ColdFusion flaw Both incidents targeted outdated and unpatched ColdFusion servers and exploited a known vulnerability. By Lucian Constantin Dec 06, 2023 5 mins Advanced Persistent Threats Advanced Persistent Threats Advanced Persistent Threats news BSIMM 14 finds rapid growth in automated security technology Embrace of a "shift everywhere" philosophy is driving a demand for automated, event-driven software security testing. By John P. Mello Jr. Dec 06, 2023 4 mins Application Security Network Security news Almost 50% of organizations plan to reduce cybersecurity headcounts: Survey While organizations are realizing the need for knowledgeable teams to address unknown threats, they are also looking to reduce their security headcount and infrastructure spending. By Gagandeep Kaur Dec 06, 2023 4 mins IT Jobs Security Practices feature 20 years of Patch Tuesday: it’s time to look outside the Windows when fixing vulnerabilities After two decades of regular and indispensable updates, it’s clear that security teams need take a more holistic approach to applying fixes far beyond the Microsoft ecosystem. By Susan Bradley Dec 06, 2023 6 mins Patch Management Software Threat and Vulnerability Management Windows Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe