top of page

APT29 Exploits Gmail App Passwords to Bypass MFA in Spear-Phishing Attacks

June 23rd, 2025

Severity Level: Medium

Technical Details

  • Threat Actor: Russian APT29 (UNC6293).

  • Severity: Medium.

  • Exploit Method: Social engineering via email.

  • Tactics: Long-term engagement.

  • Goal: Harvest emails, sensitive content, and maintain mailbox persistence.

The attackers initiate contact through highly personalized phishing emails, often impersonating entities such as the U.S. State Department, using tactics like flawless English and legitimate-looking PDF documents to build rapport over multiple exchanges. Once trust is established, victims are persuaded to generate a 16-character ASP, which the attacker then uses to gain full access to the victim's Gmail account without triggering any multi-factor authentication (MFA) challenge.

Our Cyber Threat Intelligence Unit has identified a sophisticated cyber-espionage campaign conducted by the Russian-linked threat actor APT29/UNC6293. This attack exploits Google app-specific passwords (ASPs) through sophisticated social engineering tactics, coercing victims into generating ASPs that effectively bypass multi-factor authentication. This method grants attackers persistent, covert access to Gmail accounts and is often used to spy on high-profile targets. The exploitation of ASPs highlights a critical vulnerability in systems that continue to rely on outdated authentication methods.

Image by ThisisEngineering

Impact

Successful exploitation can result in:

  • Bypassing Gmail’s MFA protections entirely.

  • Complete mailbox compromise, including private and confidential emails.

  • Continuous monitoring, with attackers potentially intercepting and altering communications.

  • Credential misuse for lateral attacks or future phishing.

Given APT29’s history, this method poses serious risks to high-profile individuals and governments.

Detection Method

To identify attempted or successful intrusions:

  1. Review Gmail Account Activity: Check for suspicious logins from unfamiliar IP addresses or locations.

  2. Audit ASP Usage: In Google Account settings, inspect for unusual or newly created app-specific passwords.

  3. Analyze Email History: Search for PDF attachments that teach ASP creation steps.

  4. Monitor Logs: Check for mailbox access without standard two-factor authentication (2FA) events.

  5. Identify Proxies: Flag connections routed through residential IP ranges or known proxy networks.

Indicators of Compromise


Type

Indicator

Description

SHA256 File Hash

329fda9939930e504f47d30834d769b30ebeaced7d73f3c1aadd0e48320d6b39

A malicious PDF file used in a phishing email attachment

IP Address

91.190.191.117

Malicious IP linked to unauthorized Gmail ASP access


mix of red, purple, orange, blue bubble shape waves horizontal for cybersecurity and netwo

Recommendations

  • Do Not Share App-Specific Passwords: Treat them like real passwords, as they can bypass multi-factor authentication (MFA) controls.

  • Verify Suspicious Activity: Independently confirm with suspicious senders through separate communication methods.

  • Enable Google Advanced Protection: Provides enhanced security and reduces ASP misuse.

  • Review Account Security Weekly: Check for unfamiliar Application Service Providers (ASPs) or unusual session logs.

  • Raise Awareness: Educate high-risk users about this ASP phishing technique.

  • Limit ASP usage: Allow their creation only when necessary.

  • Monitor Mailbox Access Patterns: Especially from residential or proxy-based IP ranges.

  • Apply AI-Enabled Email Filters: To detect and quarantine social engineering patterns used in this campaign.

Conclusion

The APT29 app-specific password (ASP) phishing campaign represents a new evolution in social engineering, characterized by its high level of targeting, patience, and deceptive simplicity. By convincing victims to generate ASPs, attackers effectively bypass multi-factor authentication and breach high-value Gmail accounts without the need for malware or fake login pages. This credibility-driven tactic is extremely difficult to detect with automated tools or traditional antivirus solutions. This instance highlights a growing trend: threat actors exploiting human behavior over technical vulnerabilities. Mitigating this threat requires heightened user awareness, secure Gmail configurations and a layered defense strategy including behavioral detection and zero-trust principles.

bottom of page