Microsoft’s Threat Intelligence team has warned that a state-sponsored hacking group it calls “Secret Blizzard” is conducting an ongoing cyber-espionage campaign against foreign embassies in Moscow. The operation, which Microsoft attributes to the Kremlin’s FSB-linked Turla outfit, leverages Russia’s own internet service providers to place the hackers in an adversary-in-the-middle position between diplomats’ devices and the wider internet. From that vantage point, the attackers redirect victims to a captive portal that mimics a routine connectivity check, then prompt them to install what appears to be a Kaspersky certificate update. The download instead delivers a custom backdoor dubbed “ApolloShadow.” Once installed, the malware adds rogue root certificates, strips TLS encryption from web traffic, creates a persistent administrative account and captures credentials and other sensitive data in clear text. Microsoft says the espionage activity has been underway since at least 2024 and remains active. While the company declined to identify the embassies affected or the number of systems compromised, it notes that the ISP-level access is “likely facilitated by lawful intercept” powers available to Russian authorities, marking the first confirmed use of such capability by Secret Blizzard. The company advises diplomatic missions and other sensitive organisations operating in Russia to route all traffic through trusted encrypted tunnels or satellite-based VPN services, enforce least-privilege access on devices and review privileged accounts regularly to mitigate the risk.
Secret Blizzard Deploys Malware in ISP-Level AitM Attacks on Moscow Embassies: https://t.co/IKDXjIrsS4 by The Hacker News #infosec #cybersecurity #technology #news
Une campagne de phishing qui exploite les applications Microsoft OAuth pour contourner l'authentification à facteurs multiples vient d'être identifiée par des experts en cybersécurité. Son taux de réussite les inquiète d'autant plus. https://t.co/nCmZcYAySg
🛑 Russia’s Secret Blizzard hackers are hijacking embassy internet traffic in Moscow—at the ISP level. They’re using fake Kaspersky alerts + a new malware “ApolloShadow” to silently take over devices. Microsoft confirms: the campaign is ongoing. Details here → https://t.co/6cFRcnMHQu