AI & TechCybersecurityNewswireSecurityTechnology

Russian Hackers Bypass Two-Factor Authentication in New Attack

▼ Summary

– British researcher Keir Giles, an expert on Russian influence operations, was targeted by a sophisticated phishing attack exploiting Gmail’s “app password” feature.
– The attack was linked to UNC6293, a group suspected of ties to Russian cyber-espionage group APT29 (Cozy Bear), targeting critics of Moscow like academics and journalists.
– Hackers impersonated a U.S. official (“Claudie S. Weber”) using fake @state.gov emails, guiding Giles over multiple emails to generate an app password, bypassing two-factor authentication.
– The attack relied on social engineering rather than malware or technical vulnerabilities, exploiting legitimate but poorly secured Gmail features.
– Google detected and blocked the intrusion, but the incident highlights vulnerabilities in current protections, prompting recommendations for high-risk users to disable app passwords.

Russian hackers have developed a sophisticated method to bypass two-factor authentication (2FA), targeting high-profile individuals through carefully crafted social engineering tactics. Security experts warn this new approach exploits legitimate account features rather than technical vulnerabilities, making it particularly dangerous.

One notable victim was British researcher Keir Giles, a specialist in Russian influence operations. Hackers posing as U.S. officials tricked him into generating an app password”, a legitimate Gmail feature designed for software that doesn’t support 2FA. The attackers, linked to the Russian-affiliated group UNC6293 (suspected to be part of APT29, or Cozy Bear), used a multi-stage deception campaign to gain access without triggering security alerts.

The scheme began with a convincing email from a fake State Department official, complete with forged government email addresses. Over several exchanges, the hackers guided Giles through creating an app password under the pretense of official business. A professionally designed but fraudulent PDF provided step-by-step instructions, masking the attack as legitimate procedure. Once generated, the password gave hackers full account access, bypassing 2FA entirely.

Google confirmed the attack didn’t rely on malware or system flaws, just expertly executed manipulation. While the company intervened to revoke unauthorized access, the incident highlights a critical weakness: even robust security measures fail if users are tricked into disabling them manually.

Similar campaigns have targeted academics, journalists, and activists critical of the Kremlin, with attacks documented between April and June 2025. Citizen Lab, which analyzed the breach, warns that hackers are refining their tactics, prioritizing patience and psychological precision over brute-force methods.

To mitigate risks, Google now advises high-profile users to enroll in its Advanced Protection Program, which disables app passwords entirely. Security experts stress the importance of skepticism toward unsolicited requests, no matter how legitimate they appear, and recommend verifying identities through separate channels before taking sensitive actions.

This incident underscores a growing trend in cybercrime: as defenses improve, attackers shift focus to human vulnerabilities, proving that even the most secure systems can be compromised through deception.

(Source: JdG)

Topics

russian influence operations 95% social engineering 90% phishing attack 90% gmail app password feature 85% two-factor authentication bypass 85% unc6293 cyber-espionage group 80% cyber-espionage targets 80% apt29 cozy bear 75% human vulnerabilities cybersecurity 75% google advanced protection program 70%
Show More

The Wiz

Wiz Consults, home of the Internet is led by "the twins", Wajdi & Karim, experienced professionals who are passionate about helping businesses succeed in the digital world. With over 20 years of experience in the industry, they specialize in digital publishing and marketing, and have a proven track record of delivering results for their clients.
Close

Adblock Detected

We noticed you're using an ad blocker. To continue enjoying our content and support our work, please consider disabling your ad blocker for this site. Ads help keep our content free and accessible. Thank you for your understanding!