As of April 9, 2024 I am writing from the perspective that the threat picture for European aerospace and political institutions remains one of persistent, patient espionage. Recent and prior technical reporting shows a consistent set of tools and behaviors that map directly to long term intelligence collection campaigns attributed by many analysts to Russian state linked groups. These campaigns favor low-noise credential collection, reuse of proven vulnerabilities, and targeting of both industrial and political corridors of influence.
The technical pattern is simple and dangerous. Beginning in 2022 and through 2023 security researchers observed campaigns that exploited a critical Outlook elevation of privilege vulnerability tracked as CVE-2023-23397 to cause involuntary NTLM authentication callbacks. That technique does not require a user to open a message. The message can trigger an SMB callback, leaking Net-NTLMv2 negotiation data to an attacker controlled listener. Microsoft documented the vulnerability, released mitigation guidance and published investigative scripts so defenders could search mailboxes for the malicious items.
Proofpoint and other telemetry collectors observed that an actor tracked as TA422, overlapping with the aliases used for known Russian GRU linked groups, ran high volume “Test Meeting” appointment campaigns across 2023. Proofpoint recorded repeated use of TNEF appointment attachments that pointed to UNC paths hosted on likely compromised routers acting as SMB listeners. The apparent goal was broad, repeated credential collection against prioritized accounts in government, defense and aerospace sectors. The scale and recurrence of those attempts show a tolerance for long term collection operations rather than smash and grab data theft.
Why aerospace is repeatedly attractive. Aerospace and air and space suppliers hold design files, supplier mappings, maintenance schedules, license regimes, and integration plans that are both commercially valuable and militarily relevant. Credential and email access can yield sensitive procurement plans, software bill of materials, contractual timelines, and details about embedded systems and avionics. Those artifacts mature into operational insights long after the initial compromise, which is why collection over months or years delivers strategic value. The observed campaigns targeted defense, aerospace, logistics, and IT service providers for precisely this reason.
The behavioral backdrop matters. Groups linked to Russian military intelligence have long pursued hybrid collection that mixes political influence operations with technical espionage. Historical incidents, including high profile intrusions against European institutions and parliamentary networks, established that state linked actors will include political targets among collection priorities when it serves broader strategic aims. Viewed together, the use of persistent credential collection against industry plus intermittent strikes on political entities forms a coherent intelligence picture.
Operational implications for defenders. First, patch management remains foundational. The Outlook CVE was pragmatic to exploit because many desktops and edge software stacks had delayed patching. Ensuring Outlook clients and Exchange servers are on updated builds reduces this attack surface. Microsoft also published investigation guidance and detection scripts that organizations should run to find legacy malicious TNEF items and anomalous mailbox updates.
Second, reduce credential blast radius. Block or tightly control outbound SMB (port 445) where feasible, enforce strict egress filtering, and apply NTLM hardening and modern authentication where possible. Where legacy NTLM is unavoidable, add monitoring for unexpected outbound NTLM negotiation and use detection capability to surface SMB callbacks to unusual hosts.
Third, assume long dwell and hunt accordingly. The campaigns observed collected credentials without noisy payloads. That means defenders must invest in hunting for signs of credential replay, abnormal mailbox folder permission changes, suspicious mailbox rule creation, and lateral authentication attempts from accounts that should not be accessing certain services. Telemetry from firewalls, endpoint detection platforms, identity providers and mail servers needs to be fused into an enterprise timeline. Proofpoint and others documented how repeated low effort campaigns probe the same accounts over long periods. That telemetry should drive prioritized containment and rotation of credentials.
Fourth, protect the supply chain and sensitive partners. Aerospace programs are rarely single vendor. Secure integration requires contractual security baselines, continuous assessment of subcontractors, and threat-informed red team exercises that simulate credential theft followed by lateral movement. Given adversaries seek long term intelligence value, short one off assessments will not be sufficient. Design reviews, build pipelines, signing keys and firmware update channels are all potential long term intelligence targets.
Policy and strategic considerations. Attribution is part technical, part intelligence, and part political. But operationally the effect is the same for defenders. Nations and companies must treat espionage against aerospace and political institutions as an integrated threat. That means investments in cross domain visibility, international information sharing, and coordinated contingency plans to protect programs of national significance. Public private information sharing and adoption of detection playbooks that map specific TTPs to concrete mitigations will blunt collection campaigns that depend on patience and low noise.
What defenders should do now, practically speaking:
- Prioritize Outlook and Exchange updates and run vendor provided investigation scripts.
- Block or monitor egress to SMB endpoints and disable NTLM where possible.
- Hunt for TNEF appointment items with UNC paths, unexpected mailbox permission changes, and repeated failed NTLM relays to external hosts.
- Rotate and strengthen credentials for accounts with access to sensitive design or procurement repositories and enable modern MFA that resists NTLM replay.
- Treat supply chain partners as extensions of critical networks. Mandate baseline telemetry and incident playbooks for tier one and tier two partners.
Conclusion. The evidence available through early April 2024 shows a mature, measured campaign model that prioritizes credential collection and long term access in aerospace, defense and other critical sectors. Whether a given political party or single organization is the immediate target is secondary to the larger operational fact that adversaries have developed reliable low noise means to harvest credentials and sit on those access paths for long periods. Defenders must stop thinking in quarterly cycles and start assuming multi year campaigns. Investing in patching, egress control, identity protection, and sustained threat hunting is the only realistic way to narrow the window of exposure and deny the long view that state linked collectors prize.