Be Vigilant, New Russian Hackers May Target Your E-Mails - NITDA

The National Information Technology Development Agency has warned Nigerians to be cautious and vigilant as a new hack threat has reared its head, and may target e-mails of unsuspecting persons.

Advertisements

It said the threat was posed by Russian group, Nobelium.

This warning was contained in a press statement on Sunday by the agency’s Head of Corporate Affairs and External Relations, Mrs Hadiza Umar, titled ‘NITDA cautions Nigerians on new email-based attack From Solarwindhackers.’

Advertisements

Earlier, Microsoft had warned about the new cyber-attacks, which are said to originate from the state-backed Russian hackers behind the SolarWinds hacking against the United States and foreign government agencies and think tanks.

About 3,000 email accounts at over 150 organisations were targeted, especially organisations involving international development, humanitarian and human rights work.

Advertisements

The press statement read in part, “According to information available as obtained by the National Information Technology Development Agency, Microsoft, a world renown multinational technology company has uncovered a widespread malicious email campaign undertaken by the hacking group- NOBELIUM.

“The cybercriminals leveraged the legitimate mass-mailing service, to masquerade as a US-based development organisation and distribute malicious URLs to a wide variety of organisations especially government organisations, non-government organizations (NGOs), think-tanks, military, IT service providers, health technology and research, and telecommunications providers.

“Their antics involve the use of emails claiming to be an alert from USAID about new documents published by former President Donald Trump about ‘election fraud.’ Once users click the link in the email, the URL would direct them to the legitimate Constant Contact Service and then redirect to Nobelium-controlled infrastructure through a URL that delivers a malicious ISO file. This, in turn, enables the criminals to execute further malicious objectives, such as lateral movement, data exfiltration and delivery of additional malware.”

Advertisements

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.