Russia-Linked Cyber Espionage Group Targets Ukraine Using Starlink and Charity Lures

Related

Female Cybersecurity Leaders to Watch in North Carolina

North Carolina’s cybersecurity leadership strength cuts across state government,...

Female Cybersecurity Leaders to Watch in Minnesota

Minnesota’s cybersecurity leadership strength shows up across agriculture, banking,...

Google Deploys Gemini AI to Monitor Dark Web for Cyber Threats

What happened Google has deployed Gemini AI agents within its...

Infinite Campus Warns of Breach After ShinyHunters Claims Data Theft

What happened Infinite Campus, a major U.S. K-12 student information...

Dutch Ministry of Finance Discloses Breach Affecting Employees

What happened The Dutch Ministry of Finance confirmed that some...

Share

What happened

A Russia-linked hacking group has launched a cyber espionage campaign targeting Ukrainian organizations using malicious documents disguised as information about Starlink satellite internet terminals and a Ukrainian charity. Researchers attributed the activity to the group Laundry Bear, also tracked as Void Blizzard, which has been active since at least 2024 and previously targeted NATO member states and Ukrainian institutions. The attackers used phishing emails containing weaponized documents designed to deploy spyware once opened, enabling the collection of sensitive information from compromised systems. Researchers said the campaign appears focused on gathering intelligence from organizations connected to Ukraine’s government and critical sectors. 

Who is affected

Organizations in Ukraine, including government bodies and other institutions connected to national infrastructure or international partnerships, are affected as targets of the espionage campaign. 

Why CISOs should care

The campaign highlights continued cyber-espionage activity tied to the Russia-Ukraine conflict, where phishing operations and spyware deployments are used to gather intelligence from government and strategic organizations. 

3 practical actions

  1. Monitor for spear-phishing campaigns. Investigate suspicious emails containing documents referencing Starlink or charitable initiatives. 
  2. Inspect attachments for spyware activity. Analyze documents that trigger abnormal processes or network connections. 
  3. Strengthen phishing awareness training. Ensure staff can identify social-engineering lures involving humanitarian or infrastructure themes.

Explore the latest incidents, tactics, and real-world impacts in our ongoing coverage of cyberattacks.