[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$fooPiOahQTx8D74gbvPz_iR2ryZoizPa_PRPhuVVHvWQ":3},{"article":4,"iocs":33},{"id":5,"title":6,"slug":7,"summary":8,"ai_summary":9,"brief":10,"full_text":11,"url":12,"image_url":13,"published_at":14,"ingested_at":15,"relevance_score":16,"entities":17,"category_id":23,"category":24,"article_tags":27},"f7e22628-b408-4c4b-b7be-34d58eed05c5","'FrostyNeighbor' APT Carefully Targets Govt Orgs in Poland, Ukraine","frostyneighbor-apt-carefully-targets-govt-orgs-in-poland-ukraine-a342a8","Attackers uniquely fingerprint victims before delivering spear-phishing payloads aimed at espionage, in the latest campaign from the Belarussian nation-state threat group.","The FrostyNeighbor APT group, attributed to Belarus, is conducting targeted espionage campaigns against government organizations in Poland and Ukraine. The attackers employ sophisticated victim fingerprinting techniques before delivering customized spear-phishing payloads designed to establish persistent access. This campaign reflects ongoing state-sponsored cyber operations in Eastern Europe.","FrostyNeighbor APT targets Polish and Ukrainian govt with fingerprinted spear-phishing for espionage.",null,"https:\u002F\u002Fwww.darkreading.com\u002Fcyberattacks-data-breaches\u002Ffrostyneighbor-apt-govt-orgs-poland-ukraine","https:\u002F\u002Feu-images.contentstack.com\u002Fv3\u002Fassets\u002Fblt6d90778a997de1cd\u002Fbltf983cc244eaa1c16\u002F6a04800d239afae8d4940268\u002FFrost_Piotr_Malczyk_AlamyStockPhoto.png?width=1280&auto=webp&quality=80&disable=upscale","2026-05-14T16:59:25+00:00","2026-05-14T18:00:10.116926+00:00",8,[18,21],{"name":19,"type":20},"FrostyNeighbor","threat_actor",{"name":22,"type":20},"Belarus (nation-state)","6cbdd207-aaa1-4176-9534-e156b125e917",{"id":23,"icon":11,"name":25,"slug":26},"Nation-state","nation-state",[28],{"category":29},{"id":30,"icon":11,"name":31,"slug":32},"e7b231c8-5f79-4465-8d38-1ef13aea5a14","Threat Intelligence","threat-intelligence",[]]