Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

6/15/2016
08:05 AM
Connect Directly
Twitter
LinkedIn
RSS
E-Mail
50%
50%

Trump Data Theft Stirs Concerns Of Cyberattacks On Presidential Campaigns

Two Russian cybergroups stole a DNC database containing opposition research on Trump in two unrelated campaigns over past year, Crowdstrike says

News this week that two Russian cybercrime groups managed to break into the Democratic National Committee’s (DNC) network and steal a database containing opposition research on Presidential candidate Donald Trump has surfaced concerns about the resilience of political organizations against sophisticated cyber threats.

Security vendor Crowdstrike on Tuesday said it had been called in by the DNC earlier this year to investigate a suspected breach of the organization’s network. Crowdstrike’s investigation showed that the DNC’s network had been infiltrated, not once but twice, by two separate groups that apparently did not know of each other’s activities.

A Washington Post report based on conversations with people close to the theft, said that the intruders had so thoroughly owned the network that they were able to read all email and chat traffic flowing over it. Yet, in terms of actual theft, the intruders only appear to have stolen data from the Trump database. No personal information, donor data or financial data appears to have been accessed the Post quoted its sources as saying.

News of the breach at the DNC follows recent comments from the Director of National Intelligence James Clapper about threat actors targeting 2016 presidential campaigns with cyber attacks focused on espionage and other nefarious activities.

Clapper has so far not released any specifics but has said that the US intelligence community already has seen indications of hacking attacks against some of the campaigns. He has warned that more are likely on the way and has reportedly briefed the campaigns of the threat. Clapper’s office has described the attacks as being motivated by philosophical differences and espionage.

“It is no surprise that attacks may come from beyond borders or political parties,” says Bob Hansmann, director of security analysis and strategy at security vendor Forcepoint. “In political one-upmanship, access to data often equals an advantage in keeping ahead of or undermining the competition,” he said.

Given the impact that a U.S. president might have on future foreign policies, the interest from nation states and threat actors in learning more about the campaigns is not surprising he says.

The intrusions at the DNC are noteworthy for the sophistication of the groups behind it. One of the intrusions, by a well-known cyberespionage group called Cozy Bear, appears to have happened in the summer of 2015, according to Crowdstrike‘s CTO and co-founder Dmitri Alperovitch. The second breach, involving another Russian group, Fancy Bear, happened in April this year.

Cozy Bear has been previously associated with attacks on the White House and the US. State Department. The group has also been tied to numerous attacks on US defense contractors, government agencies, financial services companies, technology firms and think tanks, Alperovich said.  Fancy Bear, or Sofacy, as the group is also known, is similarly believed responsible for targeted attacks on various government and private sector organizations in multiple countries including the US, Canada, China and Japan, he said.

The two groups did not appear to be collaborating with each other or communicating in any fashion on the DNC attacks. But both targeted the same systems and the same data, employing a variety of sophisticated techniques in the process Crowdstrike’s CTO and co-founder Dmitri Alperovitch said in a blog post.

The Cozy Bear team used a Python-based malware tool dubbed SeaDaddy and another backdoor in Powershell to gain persistence on comprised DNC systems and to remain undetected on them for more than a year. According to Alperovitch, the Powershell backdoor was noteworthy for its use of a one-line command to establish an encrypted connection with command and control servers and for downloading additional modules.

The Fancy Bear group meanwhile used a different malware sample to remotely execute malicious commands on compromised DNC systems, to transmit files and to enable keylogging. The group deployed tactics like periodically clearing event logs and resetting the timestamps in files in an attempt to conceal their activities.

“Both of these groups have demonstrated access to some very sophisticated capabilities,” says John Hultquist, lead, of cyber espionage intelligence at FireEye. “On many occasions they have flooded organizations with spearphishing emails claiming to be efaxes, they have used macros, and they have even leveraged phishing sites designed to resemble webmail or portal access,” he says.

Both groups also appear very interested in US policy towards Russia, he says. “It is not a major surprise they would be interested in either campaigns, given one of them will largely shape the nation’s posture towards Russia for at least four years.”

Related stories

 

Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
97% of Americans Can't Ace a Basic Security Test
Steve Zurier, Contributing Writer,  5/20/2019
How Security Vendors Can Address the Cybersecurity Talent Shortage
Rob Rashotte, VP of Global Training and Technical Field Enablement at Fortinet,  5/24/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Building and Managing an IT Security Operations Program
As cyber threats grow, many organizations are building security operations centers (SOCs) to improve their defenses. In this Tech Digest you will learn tips on how to get the most out of a SOC in your organization - and what to do if you can't afford to build one.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-7068
PUBLISHED: 2019-05-24
Adobe Acrobat and Reader versions 2019.010.20069 and earlier, 2019.010.20069 and earlier, 2017.011.30113 and earlier version, and 2015.006.30464 and earlier have an use after free vulnerability. Successful exploitation could lead to arbitrary code execution .
CVE-2019-7069
PUBLISHED: 2019-05-24
Adobe Acrobat and Reader versions 2019.010.20069 and earlier, 2019.010.20069 and earlier, 2017.011.30113 and earlier version, and 2015.006.30464 and earlier have a type confusion vulnerability. Successful exploitation could lead to arbitrary code execution .
CVE-2019-7070
PUBLISHED: 2019-05-24
Adobe Acrobat and Reader versions 2019.010.20069 and earlier, 2019.010.20069 and earlier, 2017.011.30113 and earlier version, and 2015.006.30464 and earlier have an use after free vulnerability. Successful exploitation could lead to arbitrary code execution .
CVE-2019-7071
PUBLISHED: 2019-05-24
Adobe Acrobat and Reader versions 2019.010.20069 and earlier, 2019.010.20069 and earlier, 2017.011.30113 and earlier version, and 2015.006.30464 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.
CVE-2019-7072
PUBLISHED: 2019-05-24
Adobe Acrobat and Reader versions 2019.010.20069 and earlier, 2019.010.20069 and earlier, 2017.011.30113 and earlier version, and 2015.006.30464 and earlier have an use after free vulnerability. Successful exploitation could lead to arbitrary code execution .