Mueller Probe Yields Hacking Indictments for 12 Russian Military Officers

  /     /     /  
Publicated : 22/11/2024   Category : security


Mueller Probe Yields Hacking Indictments for 12 Russian Military Officers


GRU hackers used bitcoin to fund US computer network infrastructure supporting and hiding the operation.



Twelve Russian military officers have been indicted on hacking charges as part of Special Counsel Robert Muellers investigation into Russian meddling in the 2016 presidential election. Assistant Attorney General Rod Rosenstein today announced the indictment handed down by a federal grand jury in the District of Columbia.
The charges come on the eve of President Donald Trumps meeting with Russian president Vladimir Putin on Monday in Helsinki, where Trump has promised to raise US concerns over election-meddling. The indictment says the Russian officials allegedly hacked into the Democratic National Committee (DNC), the Democratic Congressional Campaign Committee (DCCC), and employees of Democratic presidential candidate Hillary Clintons campaign, and waged strategic leaks online in an effort to damage Clintons candidacy.
Eleven of the defendants are charged with conspiracy to commit computer crimes, eight counts of aggravated identity theft, and money-laundering conspiracy. Two of the defendants face charges of conspiracy to commit computer crimes.
The hacking indictment syncs with US intelligence agencies previous conclusion that Russian nation-state actors had engaged in a widespread hacking, leaking, and social media influence campaign to sway the election toward Trump. Muellers team in June accused 13 Russian nationals and three Russian entities for a massive operation intended to interfere with the 2016 US presidential election that included bot operations and named the Internet Research Agency in Russia as the center of the operation.
Todays indictment reveals that the Russian GRU officers also breached a state election boards website and stole information on 500,000 voters, as well as the systems at a company that supplied software that verified voter registration information.
They targeted state and local offices responsible for administering the elections, and they sent spear phishing emails to people involved in administering elections, including attaching malicious software, Rosenstein said in a press conference today.
But like the
historic DoJ indictments
 of Chinese military officers by the US Department of Justice in May 2014, the Russian military indictment is more of a political statement: Its unlikely the named suspects will ever face the US judicial system. US and Russia have no extradition agreements. 
Among some of the key details in the indictment was that to mask their location in Russia, the suspects used a network of US-based computers paid for via bitcoin cryptocurrency.
In addition, the indictment reveals that even after the Russian APT operatives malware was removed from DNC systems in June 2016, some of the malware (X-Agent) remained on a Linux server. Despite these efforts, a Linux-based version of X-Agent, programmed to communicate with the GRU-registered domain linuxkrnel.net, remained on the DNC network until in or around October 2016.
The affected system or systems was, according to the DNC, quarantined, however. This Linux based version of X-agent malware was a remnant of the original hack and had been quarantined during the remediation process in June 2016, a DNC spokesperson said. While programmed to communicate with a GRU-registered domain, we do not have any information to suggest that it successfully communicated, exfiltrated data, corrupted our newly built systems, or breached our voter file following the remediation process.
What the Mueller investigations findings show via the indictment is that even nation-state intelligence officers can be unmasked, says John Bambenek, director of cybersecurity research for ThreatStop. The broader story is how hard privacy is on the Internet. The [investigators] were able to turn them into names because their fingerprints were all over the place. Even intel agencies are having a hard time, Bambenek says.
This is far from over, says Jim Zuffoletti, CEO of Social SafeGuard, a startup that provides a social platform security service. Think of all the different places this stolen data could be, incriminating data. They may be finding it years from now.
Security and intel experts say the next shoe to drop from Muellers investigation is likely to be an indictment of American citizens who interacted with the Russian hackers and operatives. Todays filing doesnt name any US citizens, but it does include a tidbit that a candidate for a US congressional seat in 2016 reached out to the attackers Guccifer 2.0 persona for stolen information on his or her political opponent. Guccifer 2.0 sent the candidate the requested documents.
They are going to have a bad rest of their life when his or her name is released, Bambenek says of the congressional candidate. I think the inclusion of that wasnt accidental. It was probably a way to say it wasnt just the Russians operating alone.
Another tidbit from
the indictment
: More than one GRU unit was behind the hacks. The first of these units, Unit 26165, resembles APT28, the operator who we originally suspected of carrying out the DNC incident. The second of these two units, Unit 74455, is implicated in incidents affecting election systems, says John Hultquist, director on intelligence analysis at FireEye.  
Meantime, Otavio Freire, CTO of Social SafeGuard, says the indictments show how social media played a pivotal role in the Russian militarys attack on the DNC. The visibility of staffers in social media as well as private communications (DMs) and social media accounts needw a major security upgrade to avoid a new cycle in November, he says.  Securing email is only part of the leaked communications challenge.
Related Content:
13 Russians Indicted for Massive Operation to Sway US Election
How Guccifer 2.0 Got Punkd by a Security Researcher
Trump Administration Slaps Sanctions on Russian Hackers, Operatives
Destructive and False Flag Cyberattacks to Escalate
 
 
 
Black Hat USA returns to Las Vegas with hands-on technical Trainings, cutting-edge Briefings, Arsenal open-source tool demonstrations, top-tier security solutions and service providers in the Business Hall. Click for information on the
conference
 and
to register.

Last News

▸ Some DLP Products Vulnerable to Security Holes ◂
Discovered: 23/12/2024
Category: security

▸ Scan suggests Heartbleed patches may not have been successful. ◂
Discovered: 23/12/2024
Category: security

▸ IoT Devices on Average Have 25 Vulnerabilities ◂
Discovered: 23/12/2024
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
Mueller Probe Yields Hacking Indictments for 12 Russian Military Officers