Russian hackers group Coldriver or Callisto have targeted NATO and eastern European troops, according to Google

The report did not specify whose militaries had been targeted by “credential phishing efforts” performed by a Russian-based group known as Coldriver, or Callisto.

Russian hackers group Coldriver or Callisto have recently attempted to breach NATO and the militaries of some eastern European countries, according to a report issued on Wednesday by Google’s Threat Analysis Group.

The report did not specify whose militaries had been targeted by “credential phishing efforts” performed by a Russian-based group known as Coldriver, or Callisto.

“Because these messages were delivered from newly formed Gmail accounts to non-Google accounts, the success percentage of these campaigns is unknown,” according to the report.

NATO did not immediately respond to a request for comment on the allegations.

Russia, which is now subject to harsh Western economic penalties as a result of its decision to invade Ukraine on February 24, consistently disputes allegations of escalating cyberattacks on Western targets.

Callisto was defined by the Finnish cybersecurity firm F-Secure Labs in 2019 as an unidentified and advanced threat actor “engaged in intelligence collecting connected to foreign and security policy” in Europe.

The group apparently had its sights set on a NATO Center of Excellence, according to a Google report published on Wednesday.




Readers like you help support The Tech Outlook. When you make a purchase using links on our site, we may earn an affiliate commission. We cannot guarantee the Product information shown is 100% accurate and we advise you to check the product listing on the original manufacturer website. Thetechoutlook is not responsible for price changes carried out by retailers. The discounted price or deal mentioned in this item was available at the time of writing and may be subject to time restrictions and/or limited unit availability. Amazon and the Amazon logo are trademarks of Amazon.com, Inc. or its affiliates Read More

This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Accept Read More

function init() { var vidDefer = document.getElementsByTagName('iframe'); for (var i=0; i