Phishing attempt against Reporters Without Borders attributed to Russia-linked group
嗯,用户让我总结一篇文章的内容,控制在100字以内,而且不需要用特定的开头。首先,我得通读一下文章,抓住主要信息。 文章讲的是一个与俄罗斯有关的网络攻击组织Callisto最近试图入侵无国界记者组织RSF。他们通过钓鱼邮件,假装成可信联系人,发送虚假链接来获取凭证。RSF在俄罗斯被列为“不受欢迎组织”,这次攻击可能与政治动机有关。 接下来,我需要把这些信息浓缩到100字以内。要包括攻击者是谁,目标是谁,使用的方法以及背后可能的原因。 还要注意用词简洁,避免重复。比如“钓鱼邮件”可以简写为“钓鱼攻击”。同时,确保所有关键点都涵盖:Callisto组织、RSF、钓鱼邮件、获取凭证、政治动机。 最后检查一下字数是否符合要求,并且表达清晰连贯。 </think> 俄罗斯相关网络攻击组织Callisto近期针对无国界记者组织RSF发起钓鱼攻击,伪装成可信联系人发送虚假链接以获取凭证。该组织长期针对支持乌克兰的非政府组织和政府机构展开网络间谍活动。此次攻击可能与RSF在俄罗斯被列为"不受欢迎组织"的政治背景有关。 2025-12-4 20:16:8 Author: therecord.media(查看原文) 阅读量:2 收藏

A Russia-aligned threat actor attempted to compromise the nonprofit Reporters Without Borders (RSF) in a recent phishing campaign, according to new research.

The hacking group — also known as Callisto, ColdRiver or Star Blizzard and previously linked by Western governments to Russia’s FSB security service — has been active since at least 2017 and is known for credential-harvesting operations against NGOs, government bodies and organizations supporting Ukraine.

According to cybersecurity firm Sekoia, one of RSF’s core members received a phishing email in March from a ProtonMail account impersonating a trusted contact. The message — written in French and using the correct email signature — asked the recipient to review a document but did not include an attachment, a tactic Callisto has used before to prompt targets to request a follow-up file.

When the RSF member asked for the missing document, the attacker replied in English with a link hosted on a compromised website. The link was designed to redirect the victim to a malicious PDF, but the file could not be retrieved after ProtonMail blocked the operator’s account, Sekoia said.

RSF, which provides support to reporters under threat and has helped Russian journalists flee the country, was labeled an “undesirable organization” by the Kremlin in August 2025 — a designation that effectively criminalizes its activity in Russia.

The organization has not publicly commented on the attempted intrusion or the hackers’ suspected motives.

Sekoia said another organization, which the researchers did not name, was targeted with a similar lure. In that case, the victim received a decoy PDF claiming the file was encrypted and instructing the user to open it via ProtonDrive. Clicking the link redirected the target to a phishing kit designed to harvest ProtonMail credentials.

The kit presented victims with a spoofed ProtonMail login page where the email address was pre-filled. Injected JavaScript forced the cursor to remain in the password field — a trick meant to increase the likelihood the target would enter their credentials.

Callisto is known for espionage campaigns against Western governments, defense contractors, research institutions and NGOs, with a particular focus on Eastern Europe and countries supporting Ukraine. Previous targets include NATO-linked organizations, a Ukrainian defense company and individuals with expertise on Russia.

Last September, for example, the U.S.-based Free Russia Foundation said it was investigating a breach after thousands of internal emails and documents — including grant reports and correspondence — were leaked online. The organization believes the intrusion was linked to Callisto, saying attackers compromised “a number of entities” to steal the data.

Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

Recorded Future

No previous article

No new articles

Daryna Antoniuk

Daryna Antoniuk

is a reporter for Recorded Future News based in Ukraine. She writes about cybersecurity startups, cyberattacks in Eastern Europe and the state of the cyberwar between Ukraine and Russia. She previously was a tech reporter for Forbes Ukraine. Her work has also been published at Sifted, The Kyiv Independent and The Kyiv Post.


文章来源: https://therecord.media/phishing-attempt-reporters-without-borders-callisto-coldriver
如有侵权请联系:admin#unsafe.sh