Latest update March 28th, 2025 6:05 AM
Apr 25, 2019 News
US (Washington Times) – Embassies in Europe have wound up on the receiving end of an ongoing hacking campaign with roots in Russia, a multinational cyber security firm warned Monday.
Researchers at Check Point reported becoming aware of a weaponized spreadsheet being emailed to targets described as “Government finance authorities and representatives in several embassies in Europe.”
Attached to emails bearing the subject “Military Financing Program,” the booby-trapped document bears the seal of the U.S. State Department and claims to contain top secret information that can only be accessed if the recipient follows instructions that actually executes malicious code on their computer, according to the report.
Individuals who opened the purported State Department spreadsheet and followed the included steps would have allowed attackers to gain “full control” of the infected computer, Check Point reported.
Among the intended targets were official representative of Nepal, Guyana, Kenya, Italy, Liberia, Bermuda and Lebanon, the report found.
“It is hard to tell if there are geopolitical motives behind this campaign by looking solely at the list of countries it was targeting, since it was not after a specific region and the victims came from different places in the world,” Check Point reported.
“Nevertheless, the observed victims list reveals a particular interest of the attacker in the public financial sector, as they all appear to be handpicked Government officials from several revenue authorities.”
Despite having some hallmarks of a well-thought-out attack, Check Point reported that its researchers were able to trace the malicious code to a Russian speaker who has previously shared excerpts on internet hacking forums using the handle “EvaPiks.”
While far from definitive attribution, Check Point is hardly the only cyber security firm to spot Russian hackers using the State Department to stage attacks.
FireEye and CrowdStrike both reported late last year that “Cozy Bear,” the name given by cyber security professionals to hackers associated with Russian intelligence, were suspected of impersonating State Department employees as part of a phishing scheme targeting potential victims across several critical sectors.
“We can confirm that no Department networks were compromised,” a State Department official told The Washington Times on Wednesday.
Founded in 1993 in Tel Aviv, Israel, Check Point boasted deferred revenues of $1.3 billion in its first-quarter report earlier this week, a 13 percent increase year over year.
Check Point was able to stop the hacking campaign using proprietary cyber security services, according to its report.
Mar 28, 2025
-Milerock face Bamia, Hi Stars battle Botafago, Ward Panthers match skills with Silver Shattas Kaieteur News- With a total $1.4M in cash at stake, thirteen clubs are listed to start their campaign as...Peeping Tom… Kaieteur News- In politics, as in life, what goes around comes around. The People’s Progressive Party/Civic... more
By Sir Ronald Sanders For decades, many Caribbean nations have grappled with dependence on a small number of powerful countries... more
Freedom of speech is our core value at Kaieteur News. If the letter/e-mail you sent was not published, and you believe that its contents were not libellous, let us know, please contact us by phone or email.
Feel free to send us your comments and/or criticisms.
Contact: 624-6456; 225-8452; 225-8458; 225-8463; 225-8465; 225-8473 or 225-8491.
Or by Email: [email protected] / [email protected]