Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

React.js Hit by Maximum-Severity ‘React2Shell’ Vulnerability

December 5, 2025

FBI Reports $262M in ATO Fraud as Researchers Cite Growing AI Phishing and Holiday Scams

December 5, 2025

China-Linked Warp Panda Targets North American Firms in Espionage Camp

December 5, 2025
Facebook X (Twitter) Instagram
Friday, December 5
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»French NGO Reporters Without Borders Targeted by Star Blizzard
News

French NGO Reporters Without Borders Targeted by Star Blizzard

Team-CWDBy Team-CWDDecember 3, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


A fresh wave of spear-phishing activity linked to the Russia-nexus intrusion set Star Blizzard, also known as ColdRiver or Calisto, has been identified by cybersecurity researchers.

The group has been active since 2017 and is attributed by several Western governments to Russia’s FSB Center 18.

According to a new analysis by Sekoia.io’s TDR team, the latest incidents were reported in May and June 2025 by two organizations, including Reporters Without Borders (RSF), prompting a closer look at how the operators refined their credential-harvesting techniques.

A Familiar Intrusion Set Expands Its Focus

The new series of phishing attempts follows Star Blizzard’s long-running focus on Western entities backing Ukraine.

The group is known for impersonating trusted contacts and prompting targets to request missing or malfunctioning attachments. Once the victim requests the file, the attacker sends a second message containing a link to malware or a phishing page.

In one case involving RSF in March 2025, a ProtonMail address mimicking a legitimate contact sent a French-language email asking a core member to review a document. No file was attached.

When the member requested it, the operators replied in English with a link routed through a compromised website to a ProtonDrive URL. However, the file itself could not be retrieved because ProtonMail had blocked the associated account.

Read more : Russian Coldriver Hackers Deploy New ‘NoRobot’ Malware

A second victim received a file labeled as a PDF that was actually a ZIP archive disguised with a .pdf extension. The final stage of the attack used a typical Calisto decoy PDF that claimed to be encrypted and instructed the user to open it in ProtonDrive. The link again sent the target through a redirector hosted on a compromised website.

Infrastructure Points to Ongoing Activity

The phishing kit analyzed by TDR, located on account.simpleasip[.]org, appeared to be custom built.

It targeted ProtonMail accounts using an Adversary-in-the-Middle (AiTM) setup that relays two-factor authentication (2FA). Analysts found injected JavaScript designed to keep the cursor locked to the password field and to interact with an attacker-controlled API for handling CAPTCHA and 2FA prompts.

Key observations included:

  • Modified ProtonMail interface elements

  • Persistent password-field focus

  • API-based credential processing

Star Blizzard’s infrastructure included servers hosting phishing pages and others serving as API endpoints. Many domains were tied to Namecheap services, while some earlier ones were registered via Regway to help analysts track the cluster over time.

“Despite numerous publications on this threat actor, Calisto continues its spear-phishing campaigns for credential harvesting or code execution via the ClickFix technique,” Sekoia warned.

“We are at the disposal of any NGO wishing to analyse and/or attribute attack campaigns to a cluster of activity.”



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleFortinet Exploit, Chrome 0-Day, BadIIS Malware, Record DDoS, SaaS Breach & More
Next Article UK’s Cyber Service for Telcos Blocks 1 Billion Malicious Site Attempts
Team-CWD
  • Website

Related Posts

News

React.js Hit by Maximum-Severity ‘React2Shell’ Vulnerability

December 5, 2025
News

FBI Reports $262M in ATO Fraud as Researchers Cite Growing AI Phishing and Holiday Scams

December 5, 2025
News

China-Linked Warp Panda Targets North American Firms in Espionage Camp

December 5, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest News

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202512 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views

The risks of unsupported IoT tech

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202512 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views
Our Picks

Why the tech industry needs to stand firm on preserving end-to-end encryption

September 12, 2025

Find your weak spots before attackers do

November 21, 2025

Watch out for SVG files booby-trapped with malware

September 22, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2025 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.