Russian Hackers Reportedly Targeted US Nuclear Research Labs: Here's How They Tried Tricking Scientists

Zinger Key Points
  • Hackers attempted a phishing scam to try and get password information to access laboratory servers.
  • The hacking team has been involved in many other high-profile hacking incidents in the recent past. 

A group of Russian hackers reportedly targeted three U.S. nuclear research laboratories in the summer of 2022. 

The Russian group Cold River carried out a phishing campaign against scientists at the Brookhaven, Argonne, and Lawrence Livermore National Laboratories to obtain passwords, Reuters reports. 

According to the report, hackers created fake login pages for the laboratories and contacted nuclear scientists to try to trick them into revealing their passwords.

"This is one of the most important hacking groups you've never heard of," Reuters quoted Adam Meyers, senior vice president of intelligence at U.S. cybersecurity firm CrowdStrike saying. "They are involved in directly supporting Kremlin information operations."

Cold River hacked into and leaked emails belonging to the former head of Britain's MI6 spy service in 2022 and targeted Britain's foreign ministry in 2016.

Also Read: Russian Ministry Website Hacked With The Message 'Glory To Ukraine'

The hacking team has been involved in many other high-profile hacking incidents. 

According to Reuters, western officials say the Russian government is a global leader in hacking and uses cyber espionage to spy on foreign governments and industries to seek a competitive advantage. 

In a blog post, SEKOIA.IO said that Cold River sought to contribute to "Russian intelligence collection about identified war crime-related evidence and international justice procedures." However, Reuters was unable to confirm this detail. 

Read Next: Putin Threatens To Strike New Targets In Ukraine, Says This Is What's Prolonging The War

Photo: Pete Linforth/Pixabay.

Posted In: NewsTechhackersnuclearresearch labsRussiaUS