TRJ CYBERSECURITY INTEL REPORT
Category: State-Sponsored Espionage Campaign
Features: Session hijacking, credential harvesting, Microsoft 365 cloud intrusion, stealth data exfiltration, phishing campaigns, non-destructive surveillance
Delivery Method: InfoStealer-purchased session tokens, phishing lures, abuse of legitimate APIs (Microsoft Graph, Exchange Online), living-off-the-land techniques
Threat Actor: Laundry Bear (also tracked by Microsoft as Void Blizzard) — likely Russian state-sponsored unit; operational overlap with APT28 (Fancy Bear) but considered distinct by Dutch intelligence
When the breach came, it wasn’t loud. There were no ransomware banners, no dramatic defacements, no systems locked with crypto wallets in waiting. Instead, there was silence — and that silence cost the Netherlands more than anyone knew at the time.
Disclosed by the General Intelligence and Security Service (AIVD) and the Military Intelligence and Security Service (MIVD) of the Netherlands, the adversary was codenamed Laundry Bear — a previously unknown Russian cyber-espionage outfit, surgically operating under the radar. Their campaign was deeply targeted, using legitimate tools, and engineered to live within the infrastructure of their victims for extended periods without detection.
They weren’t looking to cause chaos. They were there to watch — and steal.
THE POLICE BREACH THAT UNRAVELED A GHOST OPERATION
In September 2024, Dutch police systems were breached — but not through brute force or novel malware. A single session cookie, obtained through an infostealer and later sold on the dark web, was used to hijack a police officer’s account. That lone compromise became a gateway into one of the Netherlands’ most trusted institutions.
The stolen session was likely acquired through an infected personal device or third-party compromise and resold on illicit credential markets. What followed was a forensic nightmare. Emails accessed. Contacts mapped. Communications monitored. But there was no data destruction, no encryption — only quiet surveillance.
This wasn’t criminal extortion. It was espionage.
WHO THEY TARGETED — AND WHY IT MATTERS
Laundry Bear’s targets weren’t chosen at random. According to Dutch intelligence, the group has prioritized:
- NATO member state defense ministries
- Ukrainian aviation and defense infrastructure
- Aerospace and space technology manufacturers
- Military units and weapons supply chains
- IT service providers with indirect access to government networks
- Media and education sector orgs with geopolitical influence
Microsoft confirmed that Void Blizzard (aka Laundry Bear) had previously compromised a Ukrainian aviation agency also attacked by Sandworm/APT44, indicating a sustained interest in critical military logistics and defense manufacturing.
Dutch officials believe Laundry Bear had a working knowledge of Western arms procurement pipelines, especially with regard to Ukraine. One advisory stated the attackers were “very likely seeking sensitive details on military equipment purchases and their subcomponents.”
HOW THEY OPERATED — AND WHY THEY WENT UNDETECTED
Unlike traditional malware-based breaches, Laundry Bear avoided using custom payloads. Instead, they leveraged native system tools and legitimate cloud APIs to navigate internal networks — a technique known as living off the land.
Their TTPs (tactics, techniques, and procedures) included:
- Abusing Exchange Online APIs to access inboxes and metadata
- Enumerating cloud storage with Microsoft Graph
- Extracting contact relationships, Teams messages, and calendar events
- Automating large-scale data pulls from compromised cloud users
This allowed them to bypass most endpoint detection tools, since no unusual software was executed. The efficiency of the attack chain, Dutch intelligence noted, enabled Laundry Bear to hit “many targets in a short period of time” — blending into traffic and operating at scale without triggering alerts.
THE LURE THAT WORKED — EUROPEAN DEFENSE SUMMIT PHISHING CAMPAIGN
Microsoft documented that as recently as April 2025, Laundry Bear was still deploying phishing campaigns. One of the most notable lures was a fake invitation to the European Defense and Security Summit — embedded as a PDF attachment. Once opened, the document led to a credential-harvesting page designed to mirror legitimate login portals.
The simplicity of the campaign — and its effectiveness — highlights a core truth about espionage in 2025: it’s not about zero-days. It’s about access.
BROADER OBJECTIVES — AND A CALL TO ACTION
Dutch authorities made the unusual move of going public with the details. Why? Because the campaign isn’t over. The advisory made clear that more organizations across NATO territories may already be compromised — and not even know it.
The final warning from the MIVD and AIVD is chilling:
“The actor appears to possess advanced awareness of Western defense manufacturing. It targets both governmental and private sectors, especially where sanctions have made high-tech imports inaccessible to Russia. The full scope of exfiltrated data remains unknown.”
TRJ CONCLUSION: THE NEW NORMAL IN CYBER ESPIONAGE
Laundry Bear represents a dangerous evolution in state-sponsored cyber operations — stealthy, automated, cloud-native, and engineered to remain unseen. It’s not the dramatic attacks that should worry the West anymore. It’s the invisible ones — the ones that leave no digital blood, just empty shells where secrets used to be.
This wasn’t a single breach. It was a coordinated intelligence operation masquerading as routine traffic. And unless Western institutions adapt quickly, Laundry Bear won’t be the last ghost in the wires — just the first one we actually caught in the act.

🔥 NOW AVAILABLE! 🔥
📖 INK & FIRE: BOOK 1 📖
A bold and unapologetic collection of poetry that ignites the soul. Ink & Fire dives deep into raw emotions, truth, and the human experience—unfiltered and untamed.
🔥 Kindle Edition 👉 https://a.co/d/9EoGKzh
🔥 Paperback 👉 https://a.co/d/9EoGKzh
🔥 Hardcover Edition 👉 https://a.co/d/0ITmDIB
Get your copy today and experience poetry like never before. #InkAndFire #PoetryUnleashed #FuelTheFire
🚨 NOW AVAILABLE! 🚨
📖 THE INEVITABLE: THE DAWN OF A NEW ERA 📖
A powerful, eye-opening read that challenges the status quo and explores the future unfolding before us. Dive into a journey of truth, change, and the forces shaping our world.
🔥 Kindle Edition 👉 https://a.co/d/0FzX6MH
🔥 Paperback 👉 https://a.co/d/2IsxLof
🔥 Hardcover Edition 👉 https://a.co/d/bz01raP
Get your copy today and be part of the new era. #TheInevitable #TruthUnveiled #NewEra
🚀 NOW AVAILABLE! 🚀
📖 THE FORGOTTEN OUTPOST 📖
The Cold War Moon Base They Swore Never Existed
What if the moon landing was just the cover story?
Dive into the boldest investigation The Realist Juggernaut has ever published—featuring declassified files, ghost missions, whistleblower testimony, and black-budget secrets buried in lunar dust.
🔥 Kindle Edition 👉 https://a.co/d/2Mu03Iu
🛸 Paperback Coming Soon
Discover the base they never wanted you to find. TheForgottenOutpost #RealistJuggernaut #MoonBaseTruth #ColdWarSecrets #Declassified
Support truth, health, and preparedness by shopping the Alex Jones Store through our link. Every purchase helps sustain independent voices and earns us a 10% share to fuel our mission. Shop now and make a difference!
https://thealexjonesstore.com?sca_ref=7730615.EU54Mw6oyLATer7a

