Russian Hackers Allegedly Targeted US Nuclear Research Labs: Here's How They Tried To Fool Scientists

A group of Russian hackers reportedly targeted three US nuclear research labs in the summer of 2022.

Russian group Cold River conducted a phishing campaign against scientists at Brookhaven, Argonne and Lawrence Livermore National Laboratories to obtain passwords, Reuters reports.

According to the report, hackers created fake login pages for laboratories and contacted nuclear scientists in an attempt to trick them into revealing their passwords.

"This is one of the biggest hacking groups you've ever heard of," said Adam Meyers, senior vice president of intelligence at the American security firm. CrowdStrike cybersecurity, quoted by Reuters. "They are involved in direct support of the Kremlin's information operations."

Cold River hacked into and leaked emails belonging to the former head of Britain's MI6 spy service in 2022 and targeted the UK Foreign Office in 2016.

Also read: Russian ministry website hacked with 'Glory to Ukraine' message

The hacking team has been involved in many other high-profile hacking incidents.

According to Reuters, Western officials say the Russian government is a world leader in hacking and uses cyber espionage to spy on foreign governments and industries to seek competitive advantage.

In a blog post, SEKOIA.IO said that Cold River seeks to contribute to "Russian intelligence gathering on identified evidence related to war crimes and international legal proceedings." However, Reuters was unable to confirm this detail.

Read next: Putin threatens to hit new targets in Ukraine, says it's prolonging war

Photo: Pete Linforth/Pixabay.

Russian Hackers Allegedly Targeted US Nuclear Research Labs: Here's How They Tried To Fool Scientists

A group of Russian hackers reportedly targeted three US nuclear research labs in the summer of 2022.

Russian group Cold River conducted a phishing campaign against scientists at Brookhaven, Argonne and Lawrence Livermore National Laboratories to obtain passwords, Reuters reports.

According to the report, hackers created fake login pages for laboratories and contacted nuclear scientists in an attempt to trick them into revealing their passwords.

"This is one of the biggest hacking groups you've ever heard of," said Adam Meyers, senior vice president of intelligence at the American security firm. CrowdStrike cybersecurity, quoted by Reuters. "They are involved in direct support of the Kremlin's information operations."

Cold River hacked into and leaked emails belonging to the former head of Britain's MI6 spy service in 2022 and targeted the UK Foreign Office in 2016.

Also read: Russian ministry website hacked with 'Glory to Ukraine' message

The hacking team has been involved in many other high-profile hacking incidents.

According to Reuters, Western officials say the Russian government is a world leader in hacking and uses cyber espionage to spy on foreign governments and industries to seek competitive advantage.

In a blog post, SEKOIA.IO said that Cold River seeks to contribute to "Russian intelligence gathering on identified evidence related to war crimes and international legal proceedings." However, Reuters was unable to confirm this detail.

Read next: Putin threatens to hit new targets in Ukraine, says it's prolonging war

Photo: Pete Linforth/Pixabay.

What's Your Reaction?

like

dislike

love

funny

angry

sad

wow