avatar
John Scott-Railton @jsrailton.bsky.social

6/ What's an App-Specific Password? So, not every app supports Multi-Factor Authentication. Some older email clients don't. So providers like Google let users create a special password just for those apps. An ASP is a string of characters that give access to *everything* See where this is going?

image
jun 18, 2025, 9:11 pm • 25 4

Replies

avatar
John Scott-Railton @jsrailton.bsky.social

7/ This attack was like slow food. 10 email exchanges over several weeks! No overt pressure! Very much not your run-of-the-mill phishing. Ultimately, @keirgiles.bsky.social realized something was wrong and got in touch with us @citizenlab.ca...but not before the attackers got some of his ASPs...

image image
jun 18, 2025, 9:14 pm • 28 5 • view
avatar
John Scott-Railton @jsrailton.bsky.social

8/ Who targeted @keirgiles.bsky.social ? Enter the Google Threat Intelligence Group w/analysis & attribution! Great! Our bad actors are: 🇷🇺 #UNC6293, a #Russian state-sponsored threat actor. Google adds bonus additional low confidence association to #APT29 (that would be the #SVR). Nice people.

image
jun 18, 2025, 9:17 pm • 31 5 • view
avatar
John Scott-Railton @jsrailton.bsky.social

9/ There were so many clever bits to this attack, it's easy to imagine a lot of people falling for it. Everything was clean. Foc looked real. The language was right. Email addresses at the State Dept. seemed to be CC'd.. I could go on. They even had Keir enter "ms.state. gov" into the ASP name...

image
jun 18, 2025, 9:18 pm • 23 3 • view
avatar
John Scott-Railton @jsrailton.bsky.social

10/ Takeaway: some gov-backed groups are feeling pressure & experimenting. Moving from smash & grab phishing... to subtler, slower & perhaps less detectable. By me @jsrailton.bsky.social with Rebekah Brown & @billmarczak.org citizenlab.ca/2025/06/russ...

jun 18, 2025, 9:24 pm • 41 19 • view
avatar
John Scott-Railton @jsrailton.bsky.social

11/ Targeting App-Specific Passwords is novel. But it's just part of a trend of state-backed attackers innovating. The folks @volexity.com have some great recent work on similar novel Russian attacks. www.volexity.com/blog/2025/04...

jun 18, 2025, 9:26 pm • 17 2 • view
avatar
John Scott-Railton @jsrailton.bsky.social

12/ I recommend the Google blog post on this attack. It's great that GTIG decided to post on this & go public with attribution. Helpful to victims & other research teams that don't share Google's terrifying actor visibility. By Gabby Roncone & @wxs.bsky.social cloud.google.com/blog/topics/...

jun 18, 2025, 9:30 pm • 12 3 • view
avatar
John Scott-Railton @jsrailton.bsky.social

13/ What next? Well if experience is a guide... I agree with Keir here. There's a good chance that whatever the attackers got will be manipulated, sprinkled with fake stuff & misleadingly framed in some future information operation. bsky.app/profile/keir...

jun 18, 2025, 9:33 pm • 11 2 • view
avatar
John Scott-Railton @jsrailton.bsky.social

14/ Coda: Every @citizenlab.ca report is a team production. Especially when they come together fast. Big props to my coauthors Rebekah Brown & @billmarczak.org & and the many colleagues, collaborators & coworkers that jumped in here to help out and get this report done!

image
jun 18, 2025, 9:43 pm • 8 0 • view
avatar
John Scott-Railton @jsrailton.bsky.social

15/ Plus, a special thanks to @keirgiles.bsky.social for graciously working with us to understand & get his case shared. We are all safer when people share their experiences with hacking & social engineering. They are paying it forwards.

jun 18, 2025, 9:45 pm • 14 0 • view
avatar
John Scott-Railton @jsrailton.bsky.social

16/ Easter Egg: I can't decide if the attackers did this MS DoS thing... - As a troll - Coincidence, didn't notice (are they zoomers?) - As a credibility enhancing thing - An LLM came up with it - ....?

image
jun 18, 2025, 10:03 pm • 12 0 • view
avatar
Ladida @ladidayaya.bsky.social

📌

jun 18, 2025, 9:31 pm • 0 0 • view