Russia-affiliated Secret Blizzard conducting ongoing espionage against embassies in Moscow
A Russian nation-state threat group has been spying on foreign diplomats, managing continuous access to theirΒ communications and data in Moscow since at least 2024, according to Microsoft Threat Intelligence.
Secret Blizzard is gaining βadversary-in-the-middleβ positions on Russian internet service providers and telecom networks by likely leveraging surveillance tools and deploying malware on targeted devices, researchers said in a report released Thursday.Β
Microsoftβs discovery marks the first time its researchers have confirmed with high confidence that Secret Blizzard has capabilities at the ISP level, a degree of access that combines passive surveillance and an active intrusion.Β
βItβs a shift, or a kind of movement, toward the evolution of simply watching traffic to actively modifying network traffic in order to get into those targeted systems,β Sherrod DeGrippo, director of threat intelligence strategy at Microsoft, told CyberScoop.Β
Secret Blizzard β also known as Turla, Pensive Ursa or Waterbug β is affiliated with Center 16 of Russiaβs Federal Security Service (FSB) and has been active for decades.
The Russian nation-state group is βthe classic definition of what you think of when you think of advanced persistent threat: creative, persistent, well resourced, highly organized, able to execute projects, able to execute actions on objectives,β DeGrippo said. βUltimately, I think that the key word is creative.β
Secret Blizzard is gaining initial access to embassy employee devices by redirecting them to a malicious domain that displays a certificate validation error after targeted victims access a state-aligned network through a captive portal, according to Microsoft.
The error prompts and tricks embassy employees into downloading root certificates falsely branded as Kaspersky Anti-Virus software, which deploy ApolloShadow malware. The custom malware turns off traffic encryption, tricks the devices to recognize malicious sites as legitimate and enables Secret Blizzard to maintain persistent access to diplomatic devices for espionage.Β
βThis is an excellent piece of social engineering because it plays on habit, it plays on urgency, it plays on emotions, which are the three holy trinity of social engineering,β DeGrippo said.Β
βYou see this pop-up thatβs telling you you have a security issue, and itβs branded as a security vendor. Weβve been seeing that capability for decades,β she said. βSimply clicking through and not examining and thinking about that, especially when on a state-aligned, state-owned network in one of these surveillance-heavy countries where the government has deep technical and legal controls over those ISPs β that infrastructure is now part of your attack surface.β
Microsoft declined to say how many embassies have been impacted, but noted the group is active. Intrusions linked to this politically motivated espionage campaign allow Secret Blizzard to view the majority of the targetβs browsing in plain text, including certain tokens and credentials, researchers said in the report.
βThis seems relatively simple, but itβs only made so simple by the likely leveraging of a lawful intercept capability,β DeGrippo said. βRelying on local infrastructure in these high-risk environments β China, Russia, North Korea, Iran β in these surveillance-heavy countries, is of concern.βΒ
Microsoft previously observed Secret Blizzard using tools from other cybercriminal groups to compromise targets in Ukraine, showing how the group uses various attack vectors and means to infiltrate networks of geopolitical interest to Russia.
The post Russia-affiliated Secret Blizzard conducting ongoing espionage against embassies in Moscow appeared first on CyberScoop.