- Buy Microsoft Visio Professional or Microsoft Project Professional 2024 for just $80
- Get Microsoft Office Pro and Windows 11 Pro for 87% off with this bundle
- Buy or gift a Babbel subscription for 78% off to learn a new language - new low price
- Join BJ's Wholesale Club for just $20 right now to save on holiday shopping
- This $28 'magic arm' makes taking pictures so much easier (and it's only $20 for Black Friday)
Google Sends Customers 50,000+ Warnings of State-Backed Attacks
Google has seen a 33% year-on-year spike in nation state attempts to compromise its customers so far in 2021, the tech giant revealed yesterday.
Security engineer Ajax Bash claimed that in the year-to-date, Google’s Threat Analysis Group (TAG) had sent over 50,000 warnings to customers that their account was the target of government-backed phishing or malware attempts.
The main reason for the increase in attacks was an “unusually large” campaign attributed to the notorious Kremlin-backed actor known as Fancy Bear (APT28).
“We intentionally send these warnings in batches to all users who may be at risk, rather than at the moment we detect the threat itself, so that attackers cannot track our defense strategies,” Bash explained.
“On any given day, TAG is tracking more than 270 targeted or government-backed attacker groups from more than 50 countries. This means that there is typically more than one threat actor behind the warnings.”
The news follows a similar update from Microsoft last week in which the tech giant revealed that Russia accounted for the majority (58%) of alerts it sent customers over the past year. APT29 (Cozy Bear) generated the vast majority (92%) of these notifications.
Microsoft said it had sent around 20,000 alerts relating to nation-state attacks, far fewer than Google’s tally over the past three years.
Google has been sending out these warnings for nearly a decade now and has an Advanced Protection Program for those who believe they may be a significant target, such as journalists and rights activists.
Also, in the blog post, Bash detailed the latest campaign from Iranian state group APT35, which tried last year to disrupt the US election by targeting Presidential campaign staff.
One of its tried-and-tested techniques is to compromise legitimate sites with phishing kits and send email messages to targets with links to those sites. It’s also been observed uploading spyware hidden in normal-seeming VPN software on Google Play.