Tech

Journalists being targeted in ‘sustained effort’ by nation-state hackers, researchers say

Hackers believed to be allied with countries such as Turkey and Iran are even impersonating reporters.

Photo of Mikael Thalen

Mikael Thalen

silhouette holds a smartphone with the Fox News Channel logo in the background

Cybersecurity researchers say they have witnessed a “sustained effort” by nation-state hackers to compromise the accounts of journalists.

Featured Video

In a blog post on Thursday, the cybersecurity firm Proofpoint detailed the numerous campaigns it says were carried out by state-sponsored and state-aligned hacking groups against members of the media.

The hacking groups, referred to as advanced persistent threat (APT) actors, either impersonated or targeted journalists in order to access information deemed valuable by foreign governments.

“A well-timed, successful attack on a journalist’s email account could provide insights into sensitive, budding stories and source identification,” the blog states. “A compromised account could be used to spread disinformation or pro-state propaganda, provide disinformation during times of war or pandemic, or be used to influence a politically charged atmosphere.”

Advertisement

The APT actors monitored by Proofpoint are believed to be aligned with the state interests of countries such as China, North Korea, Iran, and Turkey. While some targeted journalists merely for painting their countries in a poor light, others timed their attacks around major political events in the U.S.

The most common method of targeting came in the form of phishing emails designed to steal the login credentials of journalists’ email accounts. Proofpoint states that one APT actor that is believed to be linked to China, commonly referred to as TA412 or Zirconium, has engaged in numerous reconnaissance phishing campaigns since early last year.

Zirconium is said to often use web beacons or tracking pixels in emails in order to determine whether an account is active while also learning information on the target’s web browser and operating system. In total, Proofpoint says it witnessed five separate campaigns between January and February 2021. The cybersecurity firm also says it noticed an uptick in the targeting of journalists in Washington, D.C., prior to the Jan. 6 attack on the U.S. Capitol.

The APT actors reportedly became active months later in August 2021, switching their focus to journalists focused on cybersecurity, surveillance, and privacy issues related to China. The efforts picked up once again in February after the Russian invasion of Ukraine. Others Chinese-linked APT actors were found to be sending journalists malicious documents in order to serve them malware.

Advertisement

North Korea was also active in targeting American journalists. APT actors known as Lazarus reportedly carried out reconnaissance against a specific media outlet after it published an article critical of North Korean leader Kim Jong-un. The hackers advertised links to fake job listings in their phishing emails, which when clicked would provide the APT actors with information on their device, such as their public IP address and operating system, for use in further exploitation. The social media accounts of journalists were also targeted.

Proofpoint further pointed the finger at APT actors aligned with Turkey that have been targeting the social media accounts of journalists, especially those on Twitter, since the beginning of the year. The attacks often involve phishing attacks that attempt to steal a user’s login credentials. The hackers were even accused of impersonating journalists in order to target academics and foreign policy experts.

“There is an inherent sense of intrigue when one is approached by a journalist to discuss an area of expertise. The allure of having research highlighted in the media is often a great motivator to overlook or disregard signs that this opportunity may not be entirely legitimate,” the blog notes. “This social engineering tactic successfully exploits the human desire for recognition and is being leveraged by APT actors wishing to target academics and foreign policy experts worldwide, likely in an effort to gain access to sensitive information.”

Multiple APT actors reportedly linked to Iran were also mentioned in Proofpoint’s research. Two groups referred to as Charming Kitten and Tortoiseshell are accused of regularly posing as journalists from prominent outlets such as Fox News and the Guardian, among others. Most of the attacks appeared to center around the harvesting of login credentials.

Advertisement

“Targeting journalists and media organizations is not novel,” Proofpoint writes in closing. “APT actors, regardless of their state affiliation, have and will likely always have a mandate to target journalists and media organizations and will use associated personas to further their objectives and collection priorities.”

Proofpoint is warning journalists, especially those that cover foreign policy in relation to countries such as China or North Korea, to be mindful when checking emails or visiting login pages.


Read more of the Daily Dot’s tech and politics coverage

Nevada’s GOP secretary of state candidate follows QAnon, neo-Nazi accounts on Gab, Telegram
Court filing in Bored Apes lawsuit revives claims founders built NFT empire on Nazi ideology
EXCLUSIVE: ‘Say hi to the Donald for us’: Florida police briefed armed right-wing group before they went to Jan. 6 protest
Inside the Proud Boys’ ties to ghost gun sales
‘Judas’: Gab users are furious its founder handed over data to the FBI without a subpoena
EXCLUSIVE: Anti-vax dating site that let people advertise ‘mRNA FREE’ semen left all its user data exposed
Sign up to receive the Daily Dot’s Internet Insider newsletter for urgent news from the frontline of online.
Advertisement
 
The Daily Dot