Russian Hackers Breach 20+ NGOs Using Evilginx Phishing via Fake Microsoft Entra Pages

Russian Hackers Breach 20+ NGOs Using Evilginx Phishing via Fake Microsoft Entra Pages

Microsoft has shed light on a previously undocumented cluster of threat activity originating from a Russia-affiliated threat actor dubbed Void Blizzard (aka Laundry Bear) that it said is attributed to “worldwide cloud abuse.”

Active since at least April 2024, the hacking group is linked to espionage operations mainly targeting organizations that are important to Russian government objectives, including those in government, defense, transportation, media, non-governmental organizations (NGOs), and healthcare sectors in Europe and North America.

“They often use stolen sign-in details that they likely buy from online marketplaces to gain access to organizations,” the Microsoft Threat Intelligence team said in a report published today. “Once inside, they steal large amounts of emails and files.”

Attacks mounted by Void Blizzard have been found to disproportionately single out NATO member states and Ukraine, suggesting that the adversary is looking to collect intelligence to further Russian strategic objectives.

Cybersecurity

Specifically, the threat actor is known to target government organizations and law enforcement agencies in NATO member states and countries that provide direct military or humanitarian support to Ukraine. It’s also said to have staged successful attacks aimed at education, transportation, and defense verticals in Ukraine.

This includes the October 2024 compromise of several user accounts belonging to a Ukrainian aviation organization that had been previously targeted by Seashell Blizzard, a threat actor tied to the Russian General Staff Main Intelligence Directorate (GRU), in 2022.

The attacks are characterized as opportunistic and targeted high-volume efforts that are engineered to breach targets deemed of value to the Russian government. Initial access methods comprise unsophisticated techniques like password spraying and stolen authentication credentials.

In some of the campaigns, the threat actor has utilized stolen credentials likely sourced from commodity information stealer logs available on the cybercrime underground to access Exchange and SharePoint Online and harvest email and files from compromised organizations.

“The threat actor has also in some cases enumerated the compromised organization’s Microsoft Entra ID configuration using the publicly available AzureHound tool to gain information about the users, roles, groups, applications, and devices belonging to that tenant,” Microsoft said.

As recently as last month, the Windows maker said it observed the hacking crew shifting to “more direct methods” to steal passwords, such as sending spear-phishing emails that are engineered to trick victims into parting with their login information by means of an adversary-in-the-middle (AitM) landing pages.

The activity entails the use of a typosquatted domain to impersonate the Microsoft Entra authentication portal to target over 20 NGOs in Europe and the United States. The email messages claimed to be from an organizer from the European Defense and Security Summit and contained a PDF attachment with fake invitations to the summit.

Present wishing the PDF document is a malicious QR code that redirects to an attacker-controlled domain (“micsrosoftonline[.]com”) that hosts a credential phishing page. It’s believed that the phishing page is based on the open-source Evilginx phishing kit.

Post-compromise actions after gaining initial access encompass the abuse of Exchange Online and Microsoft Graph to enumerate users’ mailboxes and cloud-hosted files, and then make use of automation to facilitate bulk data collection. In select instances, the threat actors are also said to have accessed Microsoft Teams conversations and messages via the web client application.

Cybersecurity

“Many of the compromised organizations overlap with past – or, in some cases, concurrent – targeting by other well-known Russian state actors, including Forest Blizzard, Midnight Blizzard, and Secret Blizzard,” Microsoft said. “This intersection suggests shared espionage and intelligence collection interests assigned to the parent organizations of these threat actors.”

Void Blizzard Linked to September Breach of Dutch Police Agency

In a separate advisory, the Netherlands Defence Intelligence and Security Service (MIVD) attributed Void Blizzard to a September 23, 2024, breach of a Dutch police employee account via a pass-the-cookie attack, stating work-related contact information of police employees was obtained by the threat actor.

Pass-the-cookie attack refers to a scenario where an attacker uses stolen cookies obtained via information stealer malware to sign in to accounts without having to enter a username and password. It’s currently not known what other information was stolen, although it’s highly likely that other Dutch organisations were also targeted.

“Laundry Bear is looking for information about the purchase and production of military equipment by Western governments and Western supplies of weapons to Ukraine,” said MIVD director, Vice Admiral Peter Reesink, in a statement.

Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.

Similar Posts

  • FBI Warns of UNC6040 and UNC6395 Targeting Salesforce Platforms in Data Theft Attacks

    The U.S. Federal Bureau of Investigation (FBI) has issued a flash alert to release indicators of compromise (IoCs) associated with two cybercriminal groups tracked as UNC6040 and UNC6395 for a string of data theft and extortion attacks. “Both groups have recently been observed targeting organizations’ Salesforce platforms via different initial access mechanisms,” the FBI said….

  • 14 GEO Conferences to Attend in 2026

    Whether you call it GEO, AEO, LLMO, or SEO for AI search, it is a field that barely existed two years ago. Now, it commands its own conference circuit, operating alongside dozens of dozens of established SEO and marketing conferences that have added substantial AI search tracks. Here’s a roundup of all the GEO and GEO-adjacent…

  • Good SEO Plus Lazy Marketing Won’t Cut It Anymore

    SEO is a playground for creative, scrappy problem-solvers. But today, it’s often reduced to a formula: plug keywords into an AI tool. Run a cookie-cutter checklist to create content. Build links. Hope traffic rolls in.  That used to work. But with AI-powered search on the rise, the era of SEOs as technicians is fading, and the…

  • 7 Best PHP Hosting Server Providers in 2025,Jul

    Are you looking for an efficient and versatile website hosting solution?  Why not try hosting based on the PHP scripting language? Choosing a hosting is a daunting task especially when you have so many options!  The hosting solution that you choose must have certain technical capabilities and functionality so that your project can develop and…

  • Drupal AI: How to Set It Up and Try It Out

    After watching the Driesnote earlier this week, I wanted to try and play around with the AI tools that were demonstrated. Mostly because I find this space fascinating, and I like to try and see what kind of goofy things I can get the robots to do. So I installed all the relevant modules on…