A recent analysis has revealed a significant phishing attack focused on defense, aerospace, and IT companies that are aiding Ukraine in its conflict with Russia. The campaign involves 878 spoofed domains, registered through a hosting service, which mimic the websites of actual contractors. This cyber-espionage tactic aims to steal sensitive information and credentials. While specific targeted companies were not disclosed, an associated phishing page linked to Ukraine's defense conglomerate was detected, suggesting a strategic effort likely motivated by geopolitical factors amid ongoing warfare.
A large-scale phishing campaign has targeted defense, aerospace, and IT companies supporting Ukraine against Russia, aiming to harvest credentials and intelligence.
The analysis identified that 878 spoofed domains were registered to exploit vulnerabilities of key contractors supporting Ukraine's military efforts.
Phishing scams leverage malware and social engineering to trick individuals into revealing sensitive information, posing a significant cyber-espionage risk to targeted organizations.
The motive behind these attacks appears to be cyber espionage, although there is insufficient evidence to attribute the activity to a specific actor.
Collection
[
|
...
]