Suspected Russian hackers used new tactic against UK researcher
Published by Global Banking & Finance Review®
Posted on June 18, 2025
3 min readLast updated: January 23, 2026
Published by Global Banking & Finance Review®
Posted on June 18, 2025
3 min readLast updated: January 23, 2026
Suspected Russian hackers used a new tactic to deceive a UK researcher into compromising their account, showcasing advanced phishing techniques.
By Raphael Satter and James Pearson
LONDON (Reuters) -Suspected Russian hackers have deployed a new tactic to trick even wary targets into compromising their own accounts, a victim of the spy campaign and researchers said on Wednesday.
Last month hackers masquerading as a U.S. State Department employee who said her name was Claudie Weber invited British researcher Keir Giles to a meeting she said required the use of a secure government programme, according to emails reviewed by Reuters.
Although Weber used a Gmail address, she spoke idiomatic English and copied her purported work address and State Department colleagues throughout the exchange.
Giles, a senior consulting fellow of the Russia and Eurasia programme at London's Chatham House, has been targeted by hackers and spies previously and said he is typically on his guard about unsolicited pitches.
However, Giles was taken in by Weber's patience over nearly two weeks of correspondence, the professionally produced material she attached to her email, and the fact that other State Department officials appeared to be copied on the conversation.
Giles eventually provided Weber with an app-specific password, a kind of credential which can be used to help third party applications access email accounts but can also be abused to bypass password protection.
In a blog post, Alphabet's Google attributed the hack to the Russian government, based on similar activity it had seen previously.
The Russian Foreign Ministry did not immediately return messages seeking comment about Google's findings.
Giles said there had been "an impressive amount of effort to make this a seamless operation".
"There's nothing which, to me, even in retrospect, was a red flag," he said.
Although it was not possible to say for sure whether the hackers used large language models - typically dubbed artificial intelligence - to help draft messages to Giles, the fluency of the exchange suggests that hackers may be using such programmes, marking an upgrade from the typo-strewn, panic-inducing messages often associated with "smash-and-grab phishing", said John Scott Railton, a researcher with the University of Toronto-based Citizen Lab, which investigated Giles' hack.
"This is the kind of attack almost anyone could have fallen for," he added.
Reuters could not reach Weber, whose email is now inactive, or find any trace of her or the other purported State Department officials on the exchange with Giles.
Citizen Lab in its report said that sending messages to non-existent State employees does not produce an error message, which the hackers may have taken advantage of in their interactions with Giles.
The U.S. State Department did not immediately return a message seeking comment.
(Reporting by Raphael Satter and James PearsonEditing by Gareth Jones)
The hackers masqueraded as a U.S. State Department employee to trick targets into compromising their accounts.
The victim was Keir Giles, a senior consulting fellow at London's Chatham House.
Giles provided the hacker with an app-specific password, which can be abused to bypass password protections.
Google attributed the hack to the Russian government based on similar activities they had observed previously.
The hacker's communication was fluent and professional, making it difficult for Giles to identify any red flags.
Explore more articles in the Headlines category


