Fighting Ursa, a Russian APT, has employed a car sales phishing lure to distribute the HeadLace backdoor malware targeting diplomats since March 2024. This strategy mirrors previous campaigns by the group and other Russian threat actors. The attack leveraged public, free infrastructure services and exploited user clicks on malicious content within the car advertisement. Hackers exploited Webhook.site, a legitimate service for creating custom URLs used in development projects.
Source: GBHackers