Cyber Intelligence

Linkedin
  • News
    • Aerospace
    • Apple
    • Arrest
    • Automotive
    • Big Tech
    • Breaking News
    • Business Email Compromise
    • China
    • Chip Technology
    • Cryptocurrency
    • Cyber Budget
    • Cyber Espionage
    • Cyber M&A
    • cybercrime
    • Data Leak
    • deepfake
    • Energy Sector
    • Ethiopia
    • Finance
    • France
    • Geopolitics
    • Government
    • Hacktivism
    • Healthcare
    • Human Error
    • Investment Scam
    • Iran
    • Israel Conflict
    • Malicious Bots
    • Malware
    • North Korea
    • Norton
    • One Minute Roundup
    • ransomware
    • SEC
    • SMB
    • Social Media
    • Sri Lanka
    • Taiwan
    • VPN
    • Wire Fraud
    • Workforce Cyber
  • Analysis
  • Expert Opinions
  • Resources
    • Conferences
    • Glossary of terms
    • Awards
    • Ecosystem map
Reading: Women leaders hit by ROMCOM attacks
Share
Cyber IntelligenceCyber Intelligence
Aa
  • News
  • Analysis
  • Expert Opinions
  • Resources
Search
  • News
    • Aerospace
    • Apple
    • Arrest
    • Automotive
    • Big Tech
    • Breaking News
    • Business Email Compromise
    • China
    • Chip Technology
    • Cryptocurrency
    • Cyber Budget
    • Cyber Espionage
    • Cyber M&A
    • cybercrime
    • Data Leak
    • deepfake
    • Energy Sector
    • Ethiopia
    • Finance
    • France
    • Geopolitics
    • Government
    • Hacktivism
    • Healthcare
    • Human Error
    • Investment Scam
    • Iran
    • Israel Conflict
    • Malicious Bots
    • Malware
    • North Korea
    • Norton
    • One Minute Roundup
    • ransomware
    • SEC
    • SMB
    • Social Media
    • Sri Lanka
    • Taiwan
    • VPN
    • Wire Fraud
    • Workforce Cyber
  • Analysis
  • Expert Opinions
  • Resources
    • Conferences
    • Glossary of terms
    • Awards
    • Ecosystem map

Cyber Intelligence

Linkedin
  • News
    • Aerospace
    • Apple
    • Arrest
    • Automotive
    • Big Tech
    • Breaking News
    • Business Email Compromise
    • China
    • Chip Technology
    • Cryptocurrency
    • Cyber Budget
    • Cyber Espionage
    • Cyber M&A
    • cybercrime
    • Data Leak
    • deepfake
    • Energy Sector
    • Ethiopia
    • Finance
    • France
    • Geopolitics
    • Government
    • Hacktivism
    • Healthcare
    • Human Error
    • Investment Scam
    • Iran
    • Israel Conflict
    • Malicious Bots
    • Malware
    • North Korea
    • Norton
    • One Minute Roundup
    • ransomware
    • SEC
    • SMB
    • Social Media
    • Sri Lanka
    • Taiwan
    • VPN
    • Wire Fraud
    • Workforce Cyber
  • Analysis
  • Expert Opinions
  • Resources
    • Conferences
    • Glossary of terms
    • Awards
    • Ecosystem map
Reading: Women leaders hit by ROMCOM attacks
Share
Have an existing account? Sign In
Follow US
© 2022 Foxiz News Network. Ruby Design Company. All Rights Reserved.
Cyber EspionageGeopoliticsNews

Women leaders hit by ROMCOM attacks

Maria Wilson
October 17, 2023 at 12:22 PM
By Maria Wilson Maria Wilson
Share
SHARE

Leading women politicians have become the latest targets of the now-notorious Void Rabisu threat actor following a cyber-campaign aimed at the Women Political Leaders (WPL) Summit in Brussels in June. A new report from Japan-based cybersecurity company Trend Micro shines a light on Void Rabisu’s extensive recent cyber-espionage activities.

According to Trend Micro: “Void Rabisu is one of the clearest examples where we see a mix of the typical tactics, techniques, and procedures (TTPs) used by cybercriminal threat actors and TTPs used by nation-state-sponsored threat actors motivated primarily by espionage goals… Void Rabisu also acts like an advanced persistent threat (APT) actor when it targets governments and the military.”

in June of this year, Void Rabisu launched an attack on some of the world’s women political leaders, reports Trend Micro. On August 8th, the threat actor initiated the strike on the Brussels conference and those attending by setting up a website called wplsummit[.]com duping delegates into believing they were logging onto the legitimate wplsummit.org domain.

Once the trap had been sprung, all Void Rabisu had to do was to wait for the delegates, who include some of the world’s political leaders, to click themselves straight into it. The next step was the delivery of a malicious payload to the duped delegates in the form of a highly-advanced version of ROMCOM, malware designed to open an unseen backdoor into the target organization’s systems that Trend Micro has named “ROMCOM 4.0”.

Attended by people from all over the world, the WPL summit aims to improve gender equality in politics. Among the topics included in the 2023 Brussels conference were peace and security, war and oppression, disinformation, the war in Ukraine, the role of women in politics, and gender equality. The motivation for the attack was therefore political rather than financial.

The aim was to gain a foothold in political organizations

“Since many current and future political leaders attended this conference, it presented an interesting target for espionage campaigns and served as a possible avenue for threat actors to gain an initial foothold in political organizations. It is therefore not surprising that Void Rabisu set up a campaign targeting WPL Summit 2023 attendees, “ says Trend Micro.

Trend Micro added that its research had yielded concrete evidence that this particular campaign was aimed at targets working on gender equality in EU politics. The identity of the threat actor and his no-doubt-misogynistic motivation for targeting gender equality are, as yet unknown. Among the threat actor’s previous targets were the Ukrainian government and military, their energy and water utility sectors, EU politicians, spokespersons of a certain EU government, and security conference participants.

As hostilities escalate in various regions across the globe, most recently in the Middle East, so will the level of international cyber espionage. In any conflict, knowledge is power, and hostile nation-states such as China, Russia, Iran, and North Korea have been installing backdoors in Western organizations’ systems for years in order to siphon off confidential and top-secret information in preparation for potential on-the-ground conflicts.

Many of these backdoors also have a more sinister capability – they can be used to disable critical infrastructure such as energy, water supplies, and crucial services at a time of war. Although the identities of politically motivated cyber criminals such as Void Rabisu often remain hidden, their aims and motivations clearly point to those countries that are increasingly coming into conflict with the Western powers and their NATO allies.

TAGGED: advanced persistent threat actor, belgium, brussels, cyber espionage, Cybersecurity, geopolitics, Politics, state sponsored attack, trend micro, void rabisu, women political leaders summit, women politician cyber attack
Maria Wilson October 19, 2023 October 17, 2023
Share This Article
Twitter LinkedIn Email Copy Link Print
Previous Article The Daily Decrypt - One Minute Roundup Q3-2023 shows ransomware attacks have doubled since last year – October 16th
Next Article The Daily Decrypt - One Minute Roundup Discord called a ‘hotbed’ of malware activity – October 17th
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Editor's Pick

You Might Also Like

CryptocurrencyNewsNorth Korea

Bogus IT workers are defrauding US businesses

The US government has seized over $7.74 million in illegal funds, allegedly siphoned off by illegitimate North Korean Information Technology (IT) workers for the benefit of the North Korean government. The US Department of Justice (DOJ) has filed a civil forfeiture complaint alleging that the IT workers secured employment in the US illegally, racking up millions of dollars in cryptocurrency and bypassing US sanctions placed against North Korea. According to the US Federal Bureau of Investigation (FBI), the use of North Korean IT workers to defraud the US is now taking place on a massive scale.

June 13, 2025
NewsOne Minute RoundupOne Minute Roundup

UK backs AI and intelligence modernization – June 12th

The UK government has announced its plans to invest in digital and artificial intelligence (AI) in public services, including the NHS, aiming to build strong technology foundations and tackle urgent cybersecurity risks.

June 12, 2025
NewsOne Minute RoundupOne Minute Roundup

Cyera secures $540 million in funding – June 11th

Cybersecurity firm Cyera has raised $540 million in a Series E funding round, bringing its total to over $1.3 billion. Cyera’s valuation has surged to $6 billion in six months, reporting a 353 percent year-over-year growth. 

June 11, 2025
One Minute RoundupOne Minute Roundup

Honeywell kicks off AI tools to accelerate industrial autonomy – June 10th

Honeywell has debuted a series of AI-powered tools that intend to boost industrial autonomy, introducing a suite of AI cybersecurity solutions designed to ramp up Operation Technology defenses against the ever-evolving cyberthreat landscape.

June 10, 2025

Cyber Intelligence

We provide in-depth analysis, breaking news, and interviews with some of the leading minds in cybersecurity and distill critical insights that matter to our readers. Daily.

Linkedin

Category

  • Cybercrime
  • News

Quick Links

  • News
    • Aerospace
    • Apple
    • Arrest
    • Automotive
    • Big Tech
    • Breaking News
    • Business Email Compromise
    • China
    • Chip Technology
    • Cryptocurrency
    • Cyber Budget
    • Cyber Espionage
    • Cyber M&A
    • cybercrime
    • Data Leak
    • deepfake
    • Energy Sector
    • Ethiopia
    • Finance
    • France
    • Geopolitics
    • Government
    • Hacktivism
    • Healthcare
    • Human Error
    • Investment Scam
    • Iran
    • Israel Conflict
    • Malicious Bots
    • Malware
    • North Korea
    • Norton
    • One Minute Roundup
    • ransomware
    • SEC
    • SMB
    • Social Media
    • Sri Lanka
    • Taiwan
    • VPN
    • Wire Fraud
    • Workforce Cyber
  • Analysis
  • Expert Opinions
  • Resources
    • Conferences
    • Glossary of terms
    • Awards
    • Ecosystem map

© 2023 Cyberintel.media

Welcome Back!

Sign in to your account

Lost your password?