Russia Stands Accused Of Global Hacking Campaign

Western countries issued coordinated denunciations of Russia, on Thursday 4th October, for running what they described as computer hacking programmes to undermine democracies, targeting institutions from sports anti-doping bodies to the chemical weapons watchdog.

The US Justice Department on Thursday also announced the indictment of seven Russian military spies on cyber hacking charges linked to the leaking of Olympic athletes’ drug-test data in an alleged attempt to undermine international efforts to expose Russian doping.

Four of the officers with Russia’ GRU military intelligence agency also were charged with targeting organisations probing Russia’s alleged use of chemical weapons, including the poisoning of a former Russian spy in Britain. Three were indicted in July for allegedly conspiring to interfere in the 2016 presidential election.

In some of the strongest language aimed at Moscow since the Cold War, Britain said Russia had become a “pariah state”. The United States said Moscow must be made to pay the price for its actions. And their allies around the world issued stark assessments of what they described as a campaign of hacking by Russia’s GRU military intelligence agency. 

Russia denied what its Foreign Ministry spokeswoman called a “diabolical perfume cocktail” of allegations dreamt up by someone with a “rich imagination”. But the accusations deepen Moscow’s isolation at a time when its diplomatic ties with the West have been downgraded over the poisoning of an ex-spy and while it is under U.S. and EU sanctions over actions in Ukraine.

Britain and the Netherlands accused Russia of sending agents with computer gear and WiFi antennas to the Hague, to try to hack into the Organisation for the Prohibition of Chemical Weapons (OPCW). 

The watchdog at the time was looking into the attack on ex-spy Sergei Skripal in Britain and Western reports of chemical weapons being used by Russia’s ally, Syria, against internal opponents. 

The United States indicted seven suspected Russian agents for conspiring to hack computers and steal data to delegitimise international anti-doping organisations and punish officials who had revealed a Russian state-sponsored athlete doping programme. 

The Justice department said one of the Russian intelligence officers also performed reconnaissance of personnel at Westinghouse Electric Co, a nuclear power company that provides atomic fuel and plant designs to customers. 
The accusations were unveiled at briefings around the globe that were held as NATO defence ministers gathered in Brussels to present a united front to their Cold War-era foe. 

“This is not the actions of a great power, these are the actions of a pariah state,” British Defence Secretary Gavin Williamson told reporters. US Defense Secretary Jim Mattis, at a news conference in the Belgian capital, said Russia must pay a price, and a number of response options were available. 

EU officials said in a statement Russia’s “aggressive act demonstrated contempt for the solemn purpose” of the OPCW. Australia, New Zealand and Canada were among other countries which issued strongly worded statements backing the findings of their allies.

Dutch authorities said they had disrupted the attempt to hack into the Hague-based OPCW in April, as it investigated the Skripal nerve agent poisoning and alleged use of chemical weapons in Syria by Russian-backed President Bashar al-Assad. 
Four Russians arrived in the Netherlands on April 10 and were caught three days later with spying equipment at a hotel located next to the OPCW headquarters, the Dutch military intelligence agency said. 

The men had planned to travel on to a laboratory in Spiez, Switzerland used by the OPCW to analyse samples, Dutch Major-General Onno Eichelsheim said. They were expelled to Russia. The Netherlands released copies of passports of the four men, which identified them as Alexey Minin, Oleg Sotnikov, Evgenii Serebriakov and Aleksei Morenets, all in their 30s or 40s. Reuters was not immediately able to contact them. 

Earlier on Thursday, Britain released an assessment based on work by its National Cyber Security Centre (NCSC), which cast Russia’s GRU military intelligence agency as a cyber aggressor which used a network of hackers to sow worldwide discord. 

The GRU, Britain said, was almost certainly behind the BadRabbit and World Anti-Doping Agency hacking attacks of 2017, the hack of the US Democratic National Committee (DNC) in 2016 and the theft of emails from a UK-based TV station in 2015. 

“The GRU’s actions are reckless and indiscriminate: they try to undermine and interfere in elections in other countries,” said British Foreign Secretary Jeremy Hunt. “Our message is clear - together with our allies, we will expose and respond to the GRU’s attempts to undermine international stability.” 

The GRU, now officially known in Russia by a shorter acronym GU, is also the agency Britain has blamed for the attack on former GRU spy Skripal with a nerve agent sprayed on his door. 

Skripal, his daughter and a police officer fell seriously ill and a British woman later died after her partner found the poison in a discarded perfume bottle. Russia says the two men Britain blames for the attack were tourists who twice visited Skripal’s home town for sightseeing during a weekend trip to England, a story Britain has dismissed as far-fetched. 

After the Skripal poisoning, dozens of Western countries launched the biggest expulsion of Russian spies working under diplomatic cover since the height of the Cold War. Moscow replied with tit-for-tat expulsions of Westerners. 

In a separate case on Thursday, a Norwegian court extended for a second two-week period the detention of a Russian citizen suspected of spying on Norway’s parliament. Norway arrested Mikhail Bochkaryov on Sept. 21 as he was about to fly out of the country. Moscow says he is a Russian parliamentary staff member and has demanded Oslo lift the “absurd charges”. 
Britain said the GRU was associated with a host of hackers including APT 28, Fancy Bear, Sofacy, Pawnstorm, Sednit, CyberCaliphate, Cyber Berkut and Voodoo Bear. 

The United States has sanctioned GRU officers including its chief, Igor Korobov, in 2016 and 2018 for attempted interference in the 2016 U.S. election and cyber-attacks.

Reuters:       Washington Post

You Might Also Read

Britian Accuses Russian GRU Spy Agency Of International Cyber Attacks:

Britain Plots Cyber Revenge On Russia For Novichok Poisonings:

Dutch Intelligence Agency Pinpoints Cyberattacks:

 

« Uber Pay $148m Penalty For Breach Cover-Up
US Offers Its Cyber Secrets To NATO »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Security Stronghold

Security Stronghold

Security Stronghold is focused on protecting computers from malicious programs like viruses, Trojans, spyware, adware, trackware, keyloggers and other kinds of online threats.

Vitrociset

Vitrociset

Vitrociset design complex systems for defence, homeland security, space and transport. Activities include secure communications and cybersecurity.

Latvian Information & Communications Technology Association (LIKTA)

Latvian Information & Communications Technology Association (LIKTA)

LIKTA brings together leading Latvian companies, organizations and professionals in the field of Information & Communications Technology

DocAuthority

DocAuthority

DocAuthority automatically discovers and accurately identifies unprotected, sensitive documents, enabling a broad yet business-friendly security policy.

BankVault

BankVault

BankVault is a new type of cyber technology (called remote isolation) which sidesteps your local machine and any possible malware.

Fraugster

Fraugster

Fraugster provides the most precise anti-fraud solution for e-commerce businesses.

Marvell Technology Group

Marvell Technology Group

Marvell is a semiconductor company providing solutions for storage, processing, networking, security and connectivity.

British Blockchain Association (BBA)

British Blockchain Association (BBA)

British Blockchain Association (BBA) is a not-for-profit organisation that promotes evidence-based adoption of Blockchain and Distributed Ledger Technologies (DLT) across the public and private sector

AiCULUS

AiCULUS

AiCULUS is a global technology company that specializes in API security and Risk Management products.

RMRF Tech

RMRF Tech

RMRF is a team of cybersecurity engineers and penetration testers which specializes in the development of solutions for early cyber threat detection and prevention.

OneLayer

OneLayer

OneLayer provide enterprise grade security dedicated for private LTE/5G networks. We ensure that the best IoT security toolkit is implemented in your cellular environment.

Debevoise & Plimpton

Debevoise & Plimpton

Debevoise & Plimpton LLP is a premier law firm with market-leading practices in areas including Data Strategy & Security.

MoogleLabs

MoogleLabs

MoogleLabs leverage AI/ML, Blockchain, DevOps, and Data Science to come up with the best solutions for diverse businesses.

COPA-DATA

COPA-DATA

COPA-DATA is the only independent software manufacturer to combine in-depth experience in automation with new possibilities of digital transformation – reliable, future-proof and operating worldwide.

Tenchi Security

Tenchi Security

Tenchi Security are specialized in Third-Party Cyber Risk Management (TPCRM) and aim to reduce information asymmetry when it comes to third and Nth-Party security and compliance risk management.

Iron Mountain

Iron Mountain

Iron Mountain Incorporated is a global business dedicated to storing, protecting and managing, information and assets.