As two-factor authentication has long been regarded as a strong defense against unauthorized account access, a sophisticated Russian hacking operation has demonstrated how even Gmail’s upgraded security measures can be circumvented through carefully coordinated social engineering. The Russian hacking group APT29, additionally tracked as UNC6293, executed targeted attacks from April to early June 2025, particularly targeting diplomats, academics, and government-related individuals through highly convincing phishing campaigns.
The attackers successfully bypassed Gmail’s two-factor authentication by exploiting Google’s app-specific password feature, a legitimate security tool designed for third-party applications that cannot support 2FA directly. While standard 256-bit AES encryption remains reliable for password protection, victims were manipulated into generating these 16-character passwords through elaborate fake onboarding processes, with attackers posing as US State Department staff members conducting official business communications.
APT29 employed sophisticated social engineering tactics that included impersonating government officials using State Department letterhead, creating fake email threads with multiple bogus colleagues, and maintaining extended correspondence over several weeks to build trust. The hackers delivered instructions through detailed PDFs, maintained business-hour communication schedules, and engaged victims in lengthy back-and-forth conversations before making malicious requests. These emails demonstrated flawless English and authentic-looking government formatting, making detection extremely difficult.
Once victims provided the app-specific passwords, attackers gained persistent access to Gmail accounts without requiring additional 2FA codes. Using residential proxies and virtual private servers to mask their activities, the hackers established mail clients that allowed complete account access, including reading, downloading, and forwarding sensitive emails. This persistent access could remain undetected for extended periods, enabling continuous monitoring and data exfiltration.
The campaign targeted high-value individuals including academics, government officials, and policy analysts such as UK expert Keir Giles. This stealth approach allowed the hackers to access sensitive information contained within academic email accounts without triggering typical security alerts.
Google’s threat intelligence teams eventually detected the operation and began addressing compromised accounts, thereafter updating security guidance regarding app-specific password misuse.
Microsoft also issued warnings about novel OAuth phishing tactics employed by Russian-linked actors.
Security experts now recommend improved monitoring of app-specific password generation and anomalous device registrations to prevent similar attacks, highlighting how legitimate security features can become vulnerabilities when exploited through sophisticated social engineering.