defenselead.com Open in urlscan Pro
162.214.80.21  Public Scan

URL: https://defenselead.com/google-alerts-14000-gmail-users-attacked-by-russian-hackers/
Submission: On October 11 via api from GB — Scanned from DE

Form analysis 4 forms found in the DOM

GET https://defenselead.com/

<form role="search" method="get" id="searchform" action="https://defenselead.com/">
  <div class="input-group"> <input type="search" class="form-control" placeholder="Search" value="" name="s"> <span class="input-group-btn btn-default"> <button type="submit" class="btn"> <i class="fa fa-search"></i> </button> </span></div>
</form>

<form id="commentform" class="comment-form"> <iframe title="Comment Form"
    src="https://jetpack.wordpress.com/jetpack-comment/?blogid=178024582&amp;postid=1290&amp;comment_registration=0&amp;require_name_email=1&amp;stc_enabled=1&amp;stb_enabled=1&amp;show_avatars=1&amp;avatar_default=wp_user_avatar&amp;greeting=Leave+a+Reply&amp;greeting_reply=Leave+a+Reply+to+%25s&amp;color_scheme=dark&amp;lang=en_US&amp;jetpack_version=10.2&amp;show_cookie_consent=10&amp;has_cookie_consent=0&amp;token_key=%3Bnormal%3B&amp;sig=0d9acaf103bc25d4d4ef15272ed964bbf1275aab#parent=https%3A%2F%2Fdefenselead.com%2Fgoogle-alerts-14000-gmail-users-attacked-by-russian-hackers%2F"
    name="jetpack_remote_comment" style="width:100%; height: 430px; border:0;" class="jetpack_remote_comment" id="jetpack_remote_comment" sandbox="allow-same-origin allow-top-navigation allow-scripts allow-forms allow-popups" scrolling="no">
  </iframe> <!--[if !IE]><!-->
  <script>
    document.addEventListener('DOMContentLoaded', function() {
      var commentForms = document.getElementsByClassName('jetpack_remote_comment');
      for (var i = 0; i < commentForms.length; i++) {
        commentForms[i].allowTransparency = false;
        commentForms[i].scrolling = 'no';
      }
    });
  </script> <!--<![endif]--><input type="hidden" name="js-spam-prevention" value="4b72c4acd2e818f4b843fb9a36e90395">
</form>

POST #

<form action="#" method="post" accept-charset="utf-8" id="subscribe-blog-blog_subscription-5">
  <div id="subscribe-text">
    <p>Enter your email address to subscribe to this Newsletter and receive notifications of new posts by email.</p>
  </div>
  <p id="subscribe-email"> <label id="jetpack-subscribe-label" class="screen-reader-text" for="subscribe-field-blog_subscription-5"> Email Address </label> <input type="email" name="email" required="required" value=""
      id="subscribe-field-blog_subscription-5" placeholder="Email Address"></p>
  <p id="subscribe-submit"> <input type="hidden" name="action" value="subscribe"> <input type="hidden" name="source" value="https://defenselead.com/google-alerts-14000-gmail-users-attacked-by-russian-hackers/"> <input type="hidden" name="sub-type"
      value="widget"> <input type="hidden" name="redirect_fragment" value="blog_subscription-5"> <button type="submit" class="wp-block-button__link" name="jetpack_subscriptions_widget"> Subscribe </button></p>
</form>

POST /google-alerts-14000-gmail-users-attacked-by-russian-hackers/

<form id="wpforms-form-734" class="wpforms-validate wpforms-form wpforms-ajax-form" data-formid="734" method="post" enctype="multipart/form-data" action="/google-alerts-14000-gmail-users-attacked-by-russian-hackers/"
  data-token="7e300dfcdb413d863b120e7da32b6258" novalidate="novalidate"><noscript class="wpforms-error-noscript">Please enable JavaScript in your browser to complete this form.</noscript>
  <div class="wpforms-field-container">
    <div id="wpforms-734-field_1-container" class="wpforms-field wpforms-field-name" data-field-id="1"><label class="wpforms-field-label" for="wpforms-734-field_1">Name <span class="wpforms-required-label">*</span></label>
      <div class="wpforms-field-row wpforms-field-medium">
        <div class="wpforms-field-row-block wpforms-first wpforms-one-half"><input type="text" id="wpforms-734-field_1" class="wpforms-field-name-first wpforms-field-required" name="wpforms[fields][1][first]" required=""><label
            for="wpforms-734-field_1" class="wpforms-field-sublabel after ">First</label></div>
        <div class="wpforms-field-row-block wpforms-one-half"><input type="text" id="wpforms-734-field_1-last" class="wpforms-field-name-last wpforms-field-required" name="wpforms[fields][1][last]" required=""><label for="wpforms-734-field_1-last"
            class="wpforms-field-sublabel after ">Last</label></div>
      </div>
    </div>
    <div id="wpforms-734-field_2-container" class="wpforms-field wpforms-field-email" data-field-id="2"><label class="wpforms-field-label" for="wpforms-734-field_2">Email <span class="wpforms-required-label">*</span></label><input type="email"
        id="wpforms-734-field_2" class="wpforms-field-medium wpforms-field-required" name="wpforms[fields][2]" required=""></div>
  </div>
  <div class="wpforms-submit-container"><input type="hidden" name="wpforms[id]" value="734"><input type="hidden" name="wpforms[author]" value="0"><input type="hidden" name="wpforms[post_id]" value="1290"><button type="submit" name="wpforms[submit]"
      class="wpforms-submit " id="wpforms-submit-734" value="wpforms-submit" aria-live="assertive" data-alt-text="Sending..." data-submit-text="Submit">Submit</button><noscript><img
        src="https://defenselead.com/wp-content/plugins/wpforms-lite/assets/images/submit-spin.svg" class="wpforms-submit-spinner" style="display: none;" width="26" height="26" alt=""></noscript><img
      src="data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%2026%2026%22%3E%3C/svg%3E" data-src="https://defenselead.com/wp-content/plugins/wpforms-lite/assets/images/submit-spin.svg"
      class="lazyload wpforms-submit-spinner" style="display: none;" width="26" height="26" alt=""></div><input type="hidden" name="pum_form_popup_id" value="746">
</form>

Text Content

Skip to content
 * October 11, 2021 5:19 pm





DEFENSE LEAD

Leader in Cyber Security


 * 
 * Information Security
   * Application Security
   * VAPT
   * Information Security
   * Security Awareness
 * Cyber News
 * White Papers
 * About Us


Application Security Cyber News


GOOGLE ALERTS 14,000 GMAIL USERS ATTACKED BY RUSSIAN HACKERS

BYDEFENSE LEAD

Oct 10, 2021
Page Visited: 213
Read Time:3 Minute, 47 Second



Google has warned approx. 14,000 Gmail users about being attacked by
government-backed phishing campaign conduct by Fancy Bear, or APT28, a Russian
government cyber espionage group.

Google communicated to Gmail users by sending email notifications and
recommended to enroll in Advanced Protection Program (APP) for personal and work
email.




OFFICIAL STATEMENT OF GOOGLE ON FANCY BEAR PHISHING ATTACK ON GMAIL USERS:

Google’s Threat Analysis Group (TAG) Director Shane Huntley, wrote on Twitter
that their team has sent “above average batch” of warnings about the government
phishing attempts. They also stated they are able to block phishing emails sent
by APT28 and they will be classified as spam and don’t come in the inbox folder.

Below is the notification snapshot sent by Google to Gmail users.



TAG team also informed that they already delivered warnings to 86% of Gmail
accounts this month who are under the radar of Fancy Bear’s phishing campaign
and these alert notifications indicate targeting of the recipient, not a
compromise of their Gmail account.

They also advised increasing their Gmail protection by using multi-factor
authentication, or using security keys instead of SMS, or enroll in the Google
Advanced Protection Program (APP).

> In late September, we detected an APT28 phishing campaign targeting a large
> volume of Gmail users (approx 14,000) across a wide variety of industries.
> This particular campaign comprised 86% of the batch of warnings we sent for
> this month. Firstly these warnings indicate targeting NOT compromise. If we
> are warning you there’s a very high chance we blocked. If you are an
> activist/journalist/government official or work in NatSec, this warning
> honestly shouldn’t be a surprise. At some point, some government-backed entity
> probably will try to send you something,” he added while urging users to
> review account security settings.
> 
> Shane Huntley, Director, Google Threat Analysis Group (TAG)

Shane Huntley also posted a reminder about government-backed phishing from
Google’s security blog which states that- 

> We intentionally send these notices in batches to all users who may be at
> risk, rather than at the moment we detect the threat itself, so that attackers
> cannot track some of our defense strategies. We have an expert team in our
> Threat Analysis Group, and we use a variety of technologies to detect these
> attempts. We also notify law enforcement about what we’re seeing; they have
> additional tools to investigate these attacks.
> 
> Google Security Blog







Here is the official statement from Google – Google Online Security Blog: A
reminder about government-backed phishing


FANCY BEAR (OR) APT28 – ONE OF THE WORLD’S MOST DANGEROUS NATION HACKER GROUP:



Fancy Bear (or) APT28 is one of the most threatening hacking groups responsible
for some of the high-profile attacks in recent years. It has been operating
since 2004 and is linked to the Russian General Staff Main Intelligence
Directorate (GRU) 85th Main Special Service Center (GTsSS), military unit 26165.

Generally, Fancy Bear group attacked the victim by spear-phishing emails and
their goal is to get unauthorized access to inboxes and steal sensitive
information and documents, then exploit to other individuals or internal
networks.



APT 28 gained huge popularity when they are involved in the Great DNC Hack of
2016, 2017 French Presidential election and more recently they target members of
the Bundestag, the German Federal Parliament, and the Norwegian Parliament.

The group’s immense attacks against the individuals in the political and defense
sectors clearly pictured the planned interests of the Russian government.

According to Microsoft’s second Annual Digitial Defence Report, there is a spike
increase in Russian government-backed hacking group attacks from 21% to 32%
compared to last year.



GOOGLE SENDING SECURITY KEYS TO 10000 GMAIL USERS:

The Goggle company also announced they are sending security keys to 10,000 Gmail
users as part of enrolling in their Advanced Protection Program (APP). This was
informed in their security blog few days after the attack.

Advanced Protection Program (APP) is Google’s strongest security system for
those users who are at higher risk in such phishing attacks and are targeted to
steal their sensitive information or documents such as elected officials,
political campaigns, human rights activists and journalists.



In the same security blog, they also stated that to enhance security for most
at-risk users, they are partnering with International Foundation for Electoral
Systems (IFES), UN Women, and Defending Digital Campaigns (a non-profit).

Here is the official report – Delivering 10,000 security keys to high-risk
users 



Found this article interesting? Follow DefenseLead on Twitter, Facebook and
LinkedIn to read more exclusive content.

 * 
 * 
 * 
 * 
 * 





POST NAVIGATION

Mobile Application Security Testing – Methodology and Approach


BY DEFENSE LEAD



RELATED POST

Application Security VAPT

MOBILE APPLICATION SECURITY TESTING – METHODOLOGY AND APPROACH

Oct 8, 2021 Defense Lead
Application Security Information Security Security Awareness

CYBER SECURITY REQUIREMENTS FOR APPLICATION DEVELOPMENT PROJECTS

Oct 6, 2021 Defense Lead
Cyber News Exploitation

GOOGLE PATCHES TWO MORE ZERO-DAY VULNERABILITIES IN CHROME

Oct 3, 2021 Haroon T


LEAVE A REPLY CANCEL REPLY


Video Player
https://defenselead.com/wp-content/uploads/2021/08/DefenseLead_Featured_Video.mp4

00:00
00:00
01:19
Use Up/Down Arrow keys to increase or decrease volume.



POST YOUR ARTICLES!

Readers, want your ideas, articles, Whitepapers and Research papers published on
our DefenseLead website?

We are inviting you to post your whitepapers, research, case studies, or any
wide range of topics and articles related to cyber security
on DefenseLead website with your name credited.

Make sure that your write-ups should be up to date, high quality, unique content
relevant to cyber security with no plagiarism.

For the submissions, please contact us on our email address
–defenselead.official@gmail.com

Or else you can message us on
DefenseLead Twitter, Facebook and Linkedin profiles.



CYBER NEWS

 * Application Security Cyber News
   
   GOOGLE ALERTS 14,000 GMAIL USERS ATTACKED BY RUSSIAN HACKERS

 * Cyber News Exploitation
   
   GOOGLE PATCHES TWO MORE ZERO-DAY VULNERABILITIES IN CHROME

 * Cyber News Exploitation
   
   URGENT PATCH FOR ACTIVE ZERO-DAY VULNERABILITY IN GOOGLE CHROME

 * Cyber News Exploitation
   
   MICROSOFT FIXED ZERO-DAY VULNERABILITY OF MS OFFICE 365 & MSHTML

 * Cyber News Exploitation
   
   APPLE RELEASED SECURITY FIX FOR PEGASUS ZERO-CLICK VULNERABILITY

 * Application Security Cyber News Owasp top 10
   
   OWASP TOP 10-2021 DRAFT RELEASED FOR PEER REVIEW

 * Cyber News Exploitation
   
   THOUSANDS OF FORTINET VPN CREDENTIALS LEAKED BY HACKERS

 * Cyber News Exploitation
   
   ACTIVE ZERO DAY ATTACK ON MICROSOFT INTERNET EXPLORER WITH OFFICE 365

 * Cyber News Exploitation
   
   NETGEAR-CRITICAL AUTHENTICATION BYPASS VULNERABILITY IN THEIR SMART SWITCHES

 * Cyber News Information Security
   
   WIPRO LAUNCHES @NOW STUDIO, A CYBER SECURITY CENTER IN TEXAS

FOLLOW US ON TWITTER



FOLLOW US ON FACEBOOK




 


DefenseLead is a dedicated platform for articles, information, white
papers and news about Cyber Security from around the world. Contact us at
defenselead.official@gmail.com and follow us on
Twitter, Facebook and LinkedIn to read more exclusive contents.

 

SUBSCRIBE TO NEWSLETTER

Enter your email address to subscribe to this Newsletter and receive
notifications of new posts by email.

Email Address

Subscribe



YOU MISSED

Application Security Cyber News

GOOGLE ALERTS 14,000 GMAIL USERS ATTACKED BY RUSSIAN HACKERS

Oct 10, 2021 Defense Lead
Application Security VAPT

MOBILE APPLICATION SECURITY TESTING – METHODOLOGY AND APPROACH

Oct 8, 2021 Defense Lead
Application Security Information Security Security Awareness

CYBER SECURITY REQUIREMENTS FOR APPLICATION DEVELOPMENT PROJECTS

Oct 6, 2021 Defense Lead
Cyber News Exploitation

GOOGLE PATCHES TWO MORE ZERO-DAY VULNERABILITIES IN CHROME

Oct 3, 2021 Haroon T


DEFENSE LEAD

Leader in Cyber Security



Copyright © 2021 DefenseLead. All Rights Reserved.



 * Home
 * About Us
 * Cyber News
 * Information Security
 * Pin Posts
 * White Papers

Subscribe To Defense Lead NewsLetter!
Please enable JavaScript in your browser to complete this form.
Name *
First
Last
Email *
Submit
×