Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Operational Security //


// // //
02:50 PM
Scott Ferguson
Scott Ferguson
News Analysis-Security Now

12 Russian Nationals Indicted in 2016 Hacking of DNC, Clinton Campaign

The DOJ and the Special Counsel's Office indicted 12 Russian nationals, charging them with hacking into the networks of the Democratic Congressional Campaign Committee, the Democratic National Committee and the Hillary Clinton presidential campaign.

The US Justice Department, along with the Special Counsel's Office led by former FBI Director Robert Muller, have indicted 12 Russian nationals, charging them with running an elaborate espionage campaign that hacked the networks of the Democratic National Committee and the presidential campaign of Hillary Clinton in 2016.

Deputy Attorney General Rod J. Rosenstein unsealed the indictment on Friday, July 13.

In a statement, the DOJ charged that all 12 Russian nationals are part of the country's Main Intelligence Directorate, a division within Russia's military. Additionally, all are part of a subgroup called the GRU.

Deputy Attorney General Rod J. Rosenstein\r\n(Source: US Justice Department)\r\n
Deputy Attorney General Rod J. Rosenstein
\r\n(Source: US Justice Department)\r\n

The indictment charges that 12 Russian nationals hacked into the DNC, the Clinton campaign, as well as the Democratic Congressional Campaign Committee, and stole emails and other data, releasing it under the names "DCLeaks" and "Guccifer 2.0."

From a security point of view, the group used simple but effective spear phishing techniques that targeted volunteers and employees within the Clinton campaign, including the chairman. Once the usernames and passwords were stolen, the group then tapped into the networks of the DNC and congressional committee to steal more data, monitor network activity and plant malicious code to steal additional passwords. (See Phishing Attacks Are Increasing & Gaining in Sophistication.)

"The Internet allows foreign adversaries to attack America in new and unexpected ways," Rosenstein wrote in a statement. "Together with our law enforcement partners, the Department of Justice is resolute in its commitment to locate, identify and seek to bring to justice anyone who interferes with American elections."

Two groups of attackers -- they are listed in the indictment as Unit 26165 and Unit 74455 -- coordinated their efforts between hacking into the various systems and stealing passwords, and then disseminating the data they collected through Facebook and Twitter, using fake names, which is where the Guccifer 2.0 persona originated.

Boost your understanding of new cybersecurity approaches at Light Reading's Automating Seamless Security event on October 17 in Chicago! Service providers and enterprise receive FREE passes. All others can save 20% off passes using the code LR20 today!

Also, the indictment charges that members of Unit 74455 also attempted to hack into networks of state boards of elections, secretaries of state, as well as companies that supplied software and other technology for election commissions.

To better help cover their attack, the groups used cryptocurrency and would mine Bitcoin for additional funds.

In the statement, the DOJ notes that there is "no allegation in the indictment" that US citizens were involved or that any US citizen knew they were communicating with Russian spies. "There is no allegation in the indictment that the charged conduct altered the vote count or changed the outcome of the 2016 election," according to the statement.

Muller, along with the Special Counsel's Office, have been investigating Russian interference in the 2016 presidential election for several months, which now includes 100 different criminals charges against 32 different people and three different companies, according to The New York Times.

The Russian government has always denied these allegations.

The news of Friday's indictments comes as President Donald Trump is holding meetings in the UK. He then plans to travel to Finland to hold talks with Russian Vladimir V. Putin.

Related posts:

— Scott Ferguson is the Managing Editor of Light Reading and the Editor of Security Now. Follow him on Twitter @sferguson_LR.

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
The 10 Most Impactful Types of Vulnerabilities for Enterprises Today
Managing system vulnerabilities is one of the old est - and most frustrating - security challenges that enterprise defenders face. Every software application and hardware device ships with intrinsic flaws - flaws that, if critical enough, attackers can exploit from anywhere in the world. It's crucial that defenders take stock of what areas of the tech stack have the most emerging, and critical, vulnerabilities they must manage. It's not just zero day vulnerabilities. Consider that CISA's Known Exploited Vulnerabilities (KEV) catalog lists vulnerabilitlies in widely used applications that are "actively exploited," and most of them are flaws that were discovered several years ago and have been fixed. There are also emerging vulnerabilities in 5G networks, cloud infrastructure, Edge applications, and firmwares to consider.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2023-03-27
In Delta Electronics InfraSuite Device Master versions prior to 1.0.5, an attacker could use URL decoding to retrieve system files, credentials, and bypass authentication resulting in privilege escalation.
PUBLISHED: 2023-03-27
In Delta Electronics InfraSuite Device Master versions prior to 1.0.5, an attacker could use Lua scripts, which could allow an attacker to remotely execute arbitrary code.
PUBLISHED: 2023-03-27
Delta Electronics InfraSuite Device Master versions prior to 1.0.5 contains an improper access control vulnerability in which an attacker can use the Device-Gateway service and bypass authorization, which could result in privilege escalation.
PUBLISHED: 2023-03-27
Delta Electronics InfraSuite Device Master versions prior to 1.0.5 are affected by a deserialization vulnerability targeting the Device-DataCollect service, which could allow deserialization of requests prior to authentication, resulting in remote code execution.
PUBLISHED: 2023-03-27
Heap-based Buffer Overflow in GitHub repository gpac/gpac prior to 2.4.0.