Unmasking APT29: The Sophisticated Phishing Campaign Targeting European Diplomacy

Executive Summary Check Point Research has been observing a sophisticated phishing campaign conducted by Advanced Persistent Threat (APT) 29, a Russian-linked threat group. The operation targeted diplomatic organizations throughout Europe. The campaign appears to continue a previous operation called Wineloader, which impersonates a major European foreign affairs ministry to distribute fake invitations to diplomatic events, most commonly wine-tasting events. The campaign, which was spread via phishing emails, used a new malware dubbed Grapeloader. A new variant of Wineloader was also discovered, likely used in a later stage of the campaign. Introduction Check Point Research (CPR) identified a significant wave of […]

The post Unmasking APT29: The Sophisticated Phishing Campaign Targeting European Diplomacy appeared first on Check Point Blog.

This article has been indexed from Check Point Blog

Read the original article: