Active Stocks
Tue Apr 16 2024 10:24:36
  1. Tata Steel share price
  2. 161.40 0.31%
  1. NTPC share price
  2. 359.75 -0.44%
  1. HDFC Bank share price
  2. 1,493.50 -0.10%
  1. Infosys share price
  2. 1,446.85 -1.46%
  1. Power Grid Corporation Of India share price
  2. 273.30 -0.31%
Business News/ News / World/  Russia ‘Grizzly Steppe’ hacking started simply, say US agencies
BackBack

Russia ‘Grizzly Steppe’ hacking started simply, say US agencies

According to the US intelligence report, initial Russian hackers sent spearphishing e-mails that appeared to come from legitimate websites tied to US organizations

Russia President Vladimir Putin. Photo: APPremium
Russia President Vladimir Putin. Photo: AP

Washington: The attack against US democracy began in the summer of 2015 with a simple trick: Hackers working for Russia’s civilian intelligence service sent e-mails with hidden malware to more than 1,000 people working for the American government and political groups.

US intelligence agencies say that was the modest start of “Grizzly Steppe," their name for what they say developed into a far-reaching Russian operation to interfere with this year’s presidential election.

Prodded to produce evidence by Russia, which has denied a role in hacking—and by an openly skeptical President-elect Donald Trump—the FBI and the department of homeland security did so Thursday. They issued a 13-page joint analysis just as President Barack Obama imposed sanctions against Russian government organizations and individuals and expelled 35 Russian operatives.

While Trump said in a statement Thursday that “it’s time for our country to move on to bigger and better things," he said he “will meet with leaders of the intelligence community next week in order to be updated on the facts of this situation." As president-elect he’s entitled to see the classified details behind the public report.

ALSO READ: Vladimir Putin says Russia will not expel US diplomats in response to sanctions

Russia denies any role in the cyber-attacks. President Vladimir Putin, in a statement from the Kremlin after his foreign minister asked him to approve a mirror expulsion of US diplomats, said his country wouldn’t “send anyone away."

Foothold into DNC

The initial hackers sent e-mails that appeared to come from legitimate websites and other Internet domains tied to US organizations and educational institutions, according to the report. Those who were fooled into clicking on the “spearphishing" e-mails provided a foothold into the Democratic National Committee—although the party organization wasn’t identified by name in the report—and key e-mail accounts for material that would later be leaked to damage Hillary Clinton in her losing campaign against Trump.

“This activity by Russian intelligence services is part of a decade-long campaign of cyber-enabled operations directed at the US government and its citizens," according to a joint statement from the Federal Bureau of Investigation, DHS and the Office of the Director of National Intelligence.

“The US government seeks to arm network defenders with the tools they need to identify, detect and disrupt Russian malicious cyber activity that is targeting our country’s and our allies’ networks."

Dmitry Peskov, a Kremlin spokesman, rejected the US conclusions. “We categorically disagree with any of the groundless allegations or charges against Russia," he said on a conference call. “These actions by the current administration in Washington are unfortunately a manifestation of an unpredictable and you could even say aggressive policy."

ALSO READ: Why Trump is left with a tough choice by Obama sanctions on Russian hacking

Malware code

In addition to providing evidence, the report was intended to embarrass and stymie the Russian government by making public its tactics, techniques and procedures, according to a US official who asked not to be identified discussing internal deliberations.

Along with the report, the homeland security department released an extensive list of Internet Protocol addresses, computer files, malware code and other “signatures" that it said the Russian hackers have used.

“These actors set up operational infrastructure to obfuscate their source infrastructure, host domains and malware for targeting organizations, establish command and control nodes, and harvest credentials and other valuable information from their targets," the report said.

The initial hackers worked for Russia’s FSB, the successor to the Soviet Union’s KGB. Once inside the DNC, the group dubbed “Advanced Persistent Threat 29" or “APT 29," used stolen credentials to expand its access to directories and other data, and made off with e-mail from several accounts through encrypted communication channels, according to the report.

Second wave

Then, a second wave came in the spring of 2016. Hackers working for Russia’s military intelligence service, the GRU, and dubbed “Advanced Persistent Threat 28" or APT 28, infiltrated the DNC’s networks through more spearphishing e-mails, the report said.

“This time, the spearphishing e-mail tricked recipients into changing their passwords through a fake webmail domain hosted on APT 28 operational infrastructure," according to the report. “Using the harvested credentials, APT 28 was able to gain access and steal content, likely leading to the exfiltration of information from multiple senior party members. The US government assesses that information was leaked to the press and publicly disclosed."

While the report doesn’t name the DNC, US officials and cybersecurity researchers have confirmed that it was a prime target of the Russian hackers.

“A great deal of analysis and forensic information related to Russian government activity has been published by a wide range of security companies," according to the statement from the FBI, DHS and DNI. “The US government can confirm that the Russian government, including Russia’s civilian and military intelligence services, conducted many of the activities generally described by a number of these security companies."

Still hacking

The US government first announced that intelligence agencies had high confidence that the Russian government was behind the hacking a month before the 8 November election. Despite that public declaration, the hacking attacks have apparently continued.

Actors probably associated with Russian civilian and military intelligence services “are continuing to engage in spearphishing campaigns, including one launched as recently as November 2016, just days after the U.S. election," the report said.

Jake Rudnitsky, Henry Meyer and Elizabeth Titus also contributed to this story.

Unlock a world of Benefits! From insightful newsletters to real-time stock tracking, breaking news and a personalized newsfeed – it's all here, just a click away! Login Now!

Catch all the Business News, Market News, Breaking News Events and Latest News Updates on Live Mint. Download The Mint News App to get Daily Market Updates.
More Less
Published: 30 Dec 2016, 10:33 PM IST
Next Story footLogo
Recommended For You
Switch to the Mint app for fast and personalized news - Get App