Russian Hackers Bypass Gmail MFA in Targeted Academic Attacks
Russian Hackers Bypass Gmail MFA in Targeted Academic Attacks

Russian Hackers Bypass Gmail MFA in Targeted Academic Attacks

News summary

Between April and June 2025, a Russian state-sponsored hacking group identified as UNC6293, linked to APT29 (also known as Cozy Bear), conducted a sophisticated phishing campaign targeting prominent academics and critics of Russia by impersonating the U.S. Department of State. The attackers used personalized emails and fake meeting invites, including spoofed official State Department email addresses, to build trust with victims and persuade them to create and share Google App Passwords, which bypass Google's multi-factor authentication (MFA). These 16-character app passwords allow less secure apps to access Gmail accounts without triggering MFA, enabling hackers to gain long-term undetected access to victims' email accounts. Google confirmed the widespread nature of the attack and urged all Gmail users to strengthen their security settings to prevent unauthorized access. The campaign exploited the configuration of the State Department's email server, which does not bounce invalid addresses, to enhance the credibility of the phishing emails. This attack highlights the increasing sophistication of cyber threats against secure email platforms and the importance of vigilant security practices.

Story Coverage
Bias Distribution
50% Center
Information Sources
590f0115-7f1b-422d-91c7-98a5c6a6353068e7fc5e-537b-4887-b796-fbd29c315618
Left 50%
Center 50%
Coverage Details
Total News Sources
2
Left
1
Center
1
Right
0
Unrated
0
Last Updated
10 days ago
Bias Distribution
50% Center
Related News
Daily Index

Negative

23Serious

Neutral

Optimistic

Positive

Ask VT AI
Story Coverage
Subscribe

Stay in the know

Get the latest news, exclusive insights, and curated content delivered straight to your inbox.

Present

Gift Subscriptions

The perfect gift for understanding
news from all angles.

Related News
Recommended News