Google Blocks Chinese Phishing Campaign Targeting U.S. Government
Google says it has blocked a phishing campaign originating from China and aimed at Gmail users associated with the U.S. government.
The attacks, Google Threat Analysis Group (TAG) director Shane Huntley said on Tuesday, happened in February and were completely blocked. According to him, TAG has no evidence that these attacks are related to the war in Ukraine.
“In February, we detected an APT31 phishing campaign targeting high profile Gmail users affiliated with the U.S. government. 100% of these emails were automatically classified as spam and blocked by Gmail,” Huntley said.
Also tracked as Zirconium, Judgment Panda, and Red Keres, the Chinese hacking group is known for the targeting of entities in the United States, Canada, and various European countries, including Belarus, Finland, and France. Last year, the group also targeted Russia.
Likely working on behalf of the Chinese government, APT31 was previously observed targeting known vulnerabilities in Microsoft Exchange, and likely acquired and cloned an exploit associated with the NSA-linked Equation Group.
Huntley also said that Google has sent warnings to all users who had their accounts targeted in government-backed attacks, including those who were not the focus of APT31.
Google sends these notifications in batches and not when the attacks are detected, to prevent threat actors from identifying its defensive strategies.
The Internet giant advises all individuals who might be at risk – such as journalists, politicians, activists, executives, and celebrities – to enroll in its Advanced Protection Program for both business and personal accounts.
This week, Google also shared information on recent cyberattacks targeting Ukrainian users, including phishing assaults attributed to Russian and Belarusian threat actors, and Ukraine-themed phishing campaigns targeting entities in Europe.
The Internet giant also says that it has observed numerous distributed denial-of-service (DDoS) attacks targeting Ukrainian sites over the past couple of weeks, and that it will continue monitoring activity related to Ukraine and Russia.