russian hackers bypass 2fa

As two-factor authentication has long been regarded as a strong defense against unauthorized account access, a sophisticated Russian hacking operation has demonstrated how even Gmail’s upgraded security measures can be circumvented through carefully coordinated social engineering. The Russian hacking group APT29, additionally tracked as UNC6293, executed targeted attacks from April to early June 2025, particularly targeting diplomats, academics, and government-related individuals through highly convincing phishing campaigns.

The attackers successfully bypassed Gmail’s two-factor authentication by exploiting Google’s app-specific password feature, a legitimate security tool designed for third-party applications that cannot support 2FA directly. While standard 256-bit AES encryption remains reliable for password protection, victims were manipulated into generating these 16-character passwords through elaborate fake onboarding processes, with attackers posing as US State Department staff members conducting official business communications.

APT29 employed sophisticated social engineering tactics that included impersonating government officials using State Department letterhead, creating fake email threads with multiple bogus colleagues, and maintaining extended correspondence over several weeks to build trust. The hackers delivered instructions through detailed PDFs, maintained business-hour communication schedules, and engaged victims in lengthy back-and-forth conversations before making malicious requests. These emails demonstrated flawless English and authentic-looking government formatting, making detection extremely difficult.

Once victims provided the app-specific passwords, attackers gained persistent access to Gmail accounts without requiring additional 2FA codes. Using residential proxies and virtual private servers to mask their activities, the hackers established mail clients that allowed complete account access, including reading, downloading, and forwarding sensitive emails. This persistent access could remain undetected for extended periods, enabling continuous monitoring and data exfiltration.

The campaign targeted high-value individuals including academics, government officials, and policy analysts such as UK expert Keir Giles. This stealth approach allowed the hackers to access sensitive information contained within academic email accounts without triggering typical security alerts.

Google’s threat intelligence teams eventually detected the operation and began addressing compromised accounts, thereafter updating security guidance regarding app-specific password misuse.

Microsoft also issued warnings about novel OAuth phishing tactics employed by Russian-linked actors.

Security experts now recommend improved monitoring of app-specific password generation and anomalous device registrations to prevent similar attacks, highlighting how legitimate security features can become vulnerabilities when exploited through sophisticated social engineering.

You May Also Like

Why Public Wi-Fi Might Be the Biggest Cyber Trap You’re Ignoring

Your favorite coffee shop’s Wi-Fi isn’t just serving up free internet – it could be serving your private data to cybercriminals. Learn why 43% of users fall victim.

Millions Tricked by Chrome Extensions Pretending to Be Fortinet, YouTube Tools, and VPNs

Malicious Chrome extensions masquerading as trusted tools have silently stolen data from 2.6 million users. Your browser may be compromised right now.

Fake Docusign and Gitcode Sites Lure Users Into Dangerous Netsupport RAT Powershell Trap

Dangerous new phishing attacks abuse DocuSign and Gitcode to trap users with malicious Powershell code. See how cybercriminals exploit trusted brands.

Trusted Google Tools Hijacked: How Phishers Exploit Google Apps Script to Outsmart Security Systems

Cybercriminals manipulate Google’s most trusted tools to bypass security, leaving organizations defenseless. Your business could be the next target.