Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

6/21/2016
06:20 PM
Connect Directly
Twitter
LinkedIn
RSS
E-Mail
50%
50%

Guccifer 2.0: Red Herring Or Third DNC Hacker?

CrowdStrike and Fidelis say all evidence for intrusions at DNC points to Russian-backed groups.

A lone hacker's claims of being behind the recent data breach at the Democratic National Committee—and his release Tuesday of apparently more purloined data from the DNC—has added a new twist to reports about Russian involvement in the breach.

Using the handle Guccifer 2.0, the hacker today published a fresh cache of information related to the Hillary Clinton presidential campaign that was allegedly stolen from a DNC server. It is the second set of similar documents that Guccifer 2.0 has released in the last few days in a bid to prove that he is the one responsible for breaching the DNC -- not two Russian APT groups as reported by security firm CrowdStrike last week.

In a WordPress blog post titled "Dossier on Hillary Clinton from DNC," Guccifer 2.0 listed several documents purporting to contain information on various Clinton campaign-related topics and on big donors. “The DNC collected all info about the attacks on Hillary Clinton and prepared the ways of her defense, memos, etc., including the most sensitive issues like email hacks,” the hacker said by way of describing the contents of the published documents.

The DNC itself has so far not commented on either the purported theft or the authenticity of the published documents.

In a Twitter interview with Motherboard, Guccifer 2.0 identified himself as being from Romania and said he had broken into the DNC server last summer. The hacker claimed to have exploited a security flaw in a software-as-a-service provider’s platform that the DNC uses, which allowed him to gain access to the committee’s servers. Guccifer 2.0 denied any connection to Russia and professed a dislike for both the nation's foreign policies and for being linked to the Russian government in any way.

The hacker’s comments and his continued publishing of data purportedly stolen from the DNC add a new wrinkle to recent reports by a couple of security vendor’s that link the DNC breach to two Russian cyber espionage groups.

The first report released last week was from CrowdStrike and was based on the security vendor’s investigation of a breach at the DNC. CrowdStrike said its analysis of the breach showed clear forensic evidence of two Russian APT groups—Cozy Bear and Fancy Bear—being behind the intrusion.

The two groups appear to have been completely oblivious to each other’s presence on the same network, though they targeted the same systems and the same data, CrowdStrike said. In response to Guccifer 2.0’s claims, CrowdStrike released a statement standing by its analysis and findings that it was two separate Russian intelligence-affiliated adversaries that broke into DNC and stole data.

CrowdStrike and others have raised the possibility that Guccifer 2,0’s claims were part of a Russian intelligence community disinformation campaign to try and divert attention from their role in the DNC hacking.

On Monday, Fidelis Cybersecurity backed CrowdStrike's analysis with a report of its own confirming the DNC breaches as being the work of the Cozy Bear and Fancy Bear Russian APT groups. The company said its investigation was prompted by Guccifer 2.0’s claims about being responsible for the DNC breach.

“The malware samples were similar -- and at times identical -- to malware that other security vendors have associated to these Russian APT groups,” Fidelis said in its report. “Based on our comparative analysis we agree with Crowdstrike and believe that the Cozy Bear and Fancy Bear APT groups were involved in successful intrusions at the DNC.”

CrowdStrike and Fidelis did not immediately respond to a question on whether it is possible that someone else also gained access to the DNC’s systems in addition to the two Russian APT groups.

Phil Burdette, senior security researcher at the Counter Threat Unit at SecureWorks, says it is possible that a lone wolf was able to breach the DNC, as Guccifer 2.0 has claimed.

However, it is also feasible that Guccifer 2.0's claims are a misinformation campaign to divert attention away from Russia’s role in the attacks, Burdette says.

SecureWorks also recently released a report on a Russian Federation-based group called the Threat Group-4127 that has been targeting the Clinton campaign for the past several months.

 

Black Hat USA returns to the fabulous Mandalay Bay in Las Vegas, Nevada July 30 through Aug. 4, 2016. Click for information on the conference schedule and to register.

According to SecureWorks, 108 email addresses associated with the Hillary for America campaign were targeted using 213 malicious bit.ly links between last October and May 2016. In addition, Threat Group-4127 targeted Gmail accounts belonging to individuals linked to the Hillary for America campaign, the DNC, or other aspects of US national politics.

“SecureWorks believes there is substantial overlap between TG-4127 and the Fancy Bear intrusion occurring with the DNC as reported by CrowdStrike,” Burdette says.

Burdette says he, too, is convinced of Russian involvement in the breach, regardless of Guccifer 2.0’s claims. “SecureWorks stands strongly behind its attribution assessment that Threat Group-4127 is operating from the Russia Federation and is gathering intelligence on behalf of the Russian government," Burdette says.

“This does not preclude another threat group or lone wolf from also comprising the DNC. However, it is also feasible that the Guccifer is a misinformation campaign and thus we encourage individuals to draw their own conclusion," he says.

Related stories:

 

Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year ... View Full Bio
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Whoopty
100%
0%
Whoopty,
User Rank: Ninja
6/22/2016 | 7:23:17 AM
Big take home
For me, while I think the identity of "Guccifer 2.0" is very debatable, clearly the documents are real as the DNC has confirmed the Trump ones and refused to comment on the more embarassing ones. That sounds very much like an admission.

However the big take home is that these servers are vulnerable. If the DNC could be hacked, you know for sure Hilary Clinton's private email server was. The evidence for her indictment at this point must be monumental, it will be bizarre if it doesn't happen.
News
Former CISA Director Chris Krebs Discusses Risk Management & Threat Intel
Kelly Sheridan, Staff Editor, Dark Reading,  2/23/2021
Edge-DRsplash-10-edge-articles
Security + Fraud Protection: Your One-Two Punch Against Cyberattacks
Joshua Goldfarb, Director of Product Management at F5,  2/23/2021
News
Cybercrime Groups More Prolific, Focus on Healthcare in 2020
Robert Lemos, Contributing Writer,  2/22/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Building the SOC of the Future
Building the SOC of the Future
Digital transformation, cloud-focused attacks, and a worldwide pandemic. The past year has changed the way business works and the way security teams operate. There is no going back.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-21273
PUBLISHED: 2021-02-26
Synapse is a Matrix reference homeserver written in python (pypi package matrix-synapse). Matrix is an ecosystem for open federated Instant Messaging and VoIP. In Synapse before version 1.25.0, requests to user provided domains were not restricted to external IP addresses when calculating the key va...
CVE-2021-21274
PUBLISHED: 2021-02-26
Synapse is a Matrix reference homeserver written in python (pypi package matrix-synapse). Matrix is an ecosystem for open federated Instant Messaging and VoIP. In Synapse before version 1.25.0, a malicious homeserver could redirect requests to their .well-known file to a large file. This can lead to...
CVE-2021-23345
PUBLISHED: 2021-02-26
All versions of package github.com/thecodingmachine/gotenberg are vulnerable to Server-side Request Forgery (SSRF) via the /convert/html endpoint when the src attribute of an HTML element refers to an internal system file, such as <iframe src='file:///etc/passwd'>.
CVE-2021-21297
PUBLISHED: 2021-02-26
Node-Red is a low-code programming for event-driven applications built using nodejs. Node-RED 1.2.7 and earlier contains a Prototype Pollution vulnerability in the admin API. A badly formed request can modify the prototype of the default JavaScript Object with the potential to affect the default beh...
CVE-2021-21298
PUBLISHED: 2021-02-26
Node-Red is a low-code programming for event-driven applications built using nodejs. Node-RED 1.2.7 and earlier has a vulnerability which allows arbitrary path traversal via the Projects API. If the Projects feature is enabled, a user with `projects.read` permission is able to access any file via th...