Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Operational Security //

Law

7/13/2018
02:50 PM
Scott Ferguson
Scott Ferguson
News Analysis-Security Now
50%
50%

12 Russian Nationals Indicted in 2016 Hacking of DNC, Clinton Campaign

The DOJ and the Special Counsel's Office indicted 12 Russian nationals, charging them with hacking into the networks of the Democratic Congressional Campaign Committee, the Democratic National Committee and the Hillary Clinton presidential campaign.

The US Justice Department, along with the Special Counsel's Office led by former FBI Director Robert Muller, have indicted 12 Russian nationals, charging them with running an elaborate espionage campaign that hacked the networks of the Democratic National Committee and the presidential campaign of Hillary Clinton in 2016.

Deputy Attorney General Rod J. Rosenstein unsealed the indictment on Friday, July 13.

In a statement, the DOJ charged that all 12 Russian nationals are part of the country's Main Intelligence Directorate, a division within Russia's military. Additionally, all are part of a subgroup called the GRU.

The indictment charges that 12 Russian nationals hacked into the DNC, the Clinton campaign, as well as the Democratic Congressional Campaign Committee, and stole emails and other data, releasing it under the names "DCLeaks" and "Guccifer 2.0."

From a security point of view, the group used simple but effective spear phishing techniques that targeted volunteers and employees within the Clinton campaign, including the chairman. Once the usernames and passwords were stolen, the group then tapped into the networks of the DNC and congressional committee to steal more data, monitor network activity and plant malicious code to steal additional passwords. (See Phishing Attacks Are Increasing & Gaining in Sophistication.)

"The Internet allows foreign adversaries to attack America in new and unexpected ways," Rosenstein wrote in a statement. "Together with our law enforcement partners, the Department of Justice is resolute in its commitment to locate, identify and seek to bring to justice anyone who interferes with American elections."

Two groups of attackers -- they are listed in the indictment as Unit 26165 and Unit 74455 -- coordinated their efforts between hacking into the various systems and stealing passwords, and then disseminating the data they collected through Facebook and Twitter, using fake names, which is where the Guccifer 2.0 persona originated.


Boost your understanding of new cybersecurity approaches at Light Reading's Automating Seamless Security event on October 17 in Chicago! Service providers and enterprise receive FREE passes. All others can save 20% off passes using the code LR20 today!

Also, the indictment charges that members of Unit 74455 also attempted to hack into networks of state boards of elections, secretaries of state, as well as companies that supplied software and other technology for election commissions.

To better help cover their attack, the groups used cryptocurrency and would mine Bitcoin for additional funds.

In the statement, the DOJ notes that there is "no allegation in the indictment" that US citizens were involved or that any US citizen knew they were communicating with Russian spies. "There is no allegation in the indictment that the charged conduct altered the vote count or changed the outcome of the 2016 election," according to the statement.

Muller, along with the Special Counsel's Office, have been investigating Russian interference in the 2016 presidential election for several months, which now includes 100 different criminals charges against 32 different people and three different companies, according to The New York Times.

The Russian government has always denied these allegations.

The news of Friday's indictments comes as President Donald Trump is holding meetings in the UK. He then plans to travel to Finland to hold talks with Russian Vladimir V. Putin.

Related posts:

— Scott Ferguson is the Managing Editor of Light Reading and the Editor of Security Now. Follow him on Twitter @sferguson_LR.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
How to Better Secure Your Microsoft 365 Environment
Kelly Sheridan, Staff Editor, Dark Reading,  1/25/2021
Attackers Leave Stolen Credentials Searchable on Google
Kelly Sheridan, Staff Editor, Dark Reading,  1/21/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
2020: The Year in Security
Download this Tech Digest for a look at the biggest security stories that - so far - have shaped a very strange and stressful year.
Flash Poll
Assessing Cybersecurity Risk in Today's Enterprises
Assessing Cybersecurity Risk in Today's Enterprises
COVID-19 has created a new IT paradigm in the enterprise -- and a new level of cybersecurity risk. This report offers a look at how enterprises are assessing and managing cyber-risk under the new normal.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-3331
PUBLISHED: 2021-01-27
WinSCP before 5.17.10 allows remote attackers to execute arbitrary programs when the URL handler encounters a crafted URL that loads session settings. (For example, this is exploitable in a default installation in which WinSCP is the handler for sftp:// URLs.)
CVE-2021-3326
PUBLISHED: 2021-01-27
The iconv function in the GNU C Library (aka glibc or libc6) 2.32 and earlier, when processing invalid input sequences in the ISO-2022-JP-3 encoding, fails an assertion in the code path and aborts the program, potentially resulting in a denial of service.
CVE-2021-22641
PUBLISHED: 2021-01-27
A heap-based buffer overflow issue has been identified in the way the application processes project files, allowing an attacker to craft a special project file that may allow arbitrary code execution on the Tellus Lite V-Simulator and V-Server Lite (versions prior to 4.0.10.0).
CVE-2021-22653
PUBLISHED: 2021-01-27
Multiple out-of-bounds write issues have been identified in the way the application processes project files, allowing an attacker to craft a special project file that may allow arbitrary code execution on the Tellus Lite V-Simulator and V-Server Lite (versions prior to 4.0.10.0).
CVE-2021-22655
PUBLISHED: 2021-01-27
Multiple out-of-bounds read issues have been identified in the way the application processes project files, allowing an attacker to craft a special project file that may allow arbitrary code execution on the Tellus Lite V-Simulator and V-Server Lite (versions prior to 4.0.10.0).