APT29 and APT35 phishing campaigns, analysis of key attacks

20 September 2024 2 minutes Author: Cyber Witcher

APT29 and APT35 are among the most active hacker groups that carry out phishing attacks. The article examines their most notorious campaigns, including phishing related to election fraud, the Covid-19 pandemic, and the Charming Kitten attack series. Learn more about these dangerous cyber threats.

Phishing attacks by APT35

The Wall Street Journal Attack

This phishing campaign targeted journalists and staff at The Wall Street Journal. The attacks used fake emails and links to compromise accounts and collect sensitive information.

CLICK HERE

Happy New Year Phishing Campaign

Here, cybercriminals used holiday greetings related to the New Year to distribute phishing emails. The welcome messages contained malicious attachments or links to access personal data.

CLICK HERE

The Kittens Are Back in Town 1-3

This is a series of phishing attacks by the Charming Kitten (APT35) group that included several waves of malicious campaigns. Each wave targeted different organizations and used a variety of social engineering techniques to obtain data.

CLICK HERE

Phishing attacks by APT29

Election Fraud Themed Phishing Campaigns

This phishing campaign targeted election fraud themes used to mislead users and gain access to sensitive information. Attacks often targeted government institutions and political organizations.

CLICK HERE

Post-Election Spear Phishing on Think Tanks and NGOs

Post-election phishing campaigns targeted think tanks and non-governmental organizations dealing with election issues. The groups used targeted phishing techniques to collect sensitive data and compromise systems.

CLICK HERE

Covid-19 Phishing Campaign Worldwide

During the Covid-19 pandemic, criminals have used the fear and uncertainty surrounding the virus to launch phishing attacks. The emails were disguised as official messages from medical organizations to lure users’ data.

CLICK HERE

No Easy Breach

This campaign demonstrates the sophistication of the attack, which combined various hacking and social engineering techniques. Attackers have focused on long-term and carefully planned attacks, making them difficult to detect.

CLICK HERE

Other related articles
Found an error?
If you find an error, take a screenshot and send it to the bot.