Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Operational Security //


End of Bibblio RCM includes -->
02:50 PM
Scott Ferguson
Scott Ferguson
News Analysis-Security Now

12 Russian Nationals Indicted in 2016 Hacking of DNC, Clinton Campaign

The DOJ and the Special Counsel's Office indicted 12 Russian nationals, charging them with hacking into the networks of the Democratic Congressional Campaign Committee, the Democratic National Committee and the Hillary Clinton presidential campaign.

The US Justice Department, along with the Special Counsel's Office led by former FBI Director Robert Muller, have indicted 12 Russian nationals, charging them with running an elaborate espionage campaign that hacked the networks of the Democratic National Committee and the presidential campaign of Hillary Clinton in 2016.

Deputy Attorney General Rod J. Rosenstein unsealed the indictment on Friday, July 13.

In a statement, the DOJ charged that all 12 Russian nationals are part of the country's Main Intelligence Directorate, a division within Russia's military. Additionally, all are part of a subgroup called the GRU.

Deputy Attorney General Rod J. Rosenstein\r\n(Source: US Justice Department)\r\n
Deputy Attorney General Rod J. Rosenstein
\r\n(Source: US Justice Department)\r\n

The indictment charges that 12 Russian nationals hacked into the DNC, the Clinton campaign, as well as the Democratic Congressional Campaign Committee, and stole emails and other data, releasing it under the names "DCLeaks" and "Guccifer 2.0."

From a security point of view, the group used simple but effective spear phishing techniques that targeted volunteers and employees within the Clinton campaign, including the chairman. Once the usernames and passwords were stolen, the group then tapped into the networks of the DNC and congressional committee to steal more data, monitor network activity and plant malicious code to steal additional passwords. (See Phishing Attacks Are Increasing & Gaining in Sophistication.)

"The Internet allows foreign adversaries to attack America in new and unexpected ways," Rosenstein wrote in a statement. "Together with our law enforcement partners, the Department of Justice is resolute in its commitment to locate, identify and seek to bring to justice anyone who interferes with American elections."

Two groups of attackers -- they are listed in the indictment as Unit 26165 and Unit 74455 -- coordinated their efforts between hacking into the various systems and stealing passwords, and then disseminating the data they collected through Facebook and Twitter, using fake names, which is where the Guccifer 2.0 persona originated.

Boost your understanding of new cybersecurity approaches at Light Reading's Automating Seamless Security event on October 17 in Chicago! Service providers and enterprise receive FREE passes. All others can save 20% off passes using the code LR20 today!

Also, the indictment charges that members of Unit 74455 also attempted to hack into networks of state boards of elections, secretaries of state, as well as companies that supplied software and other technology for election commissions.

To better help cover their attack, the groups used cryptocurrency and would mine Bitcoin for additional funds.

In the statement, the DOJ notes that there is "no allegation in the indictment" that US citizens were involved or that any US citizen knew they were communicating with Russian spies. "There is no allegation in the indictment that the charged conduct altered the vote count or changed the outcome of the 2016 election," according to the statement.

Muller, along with the Special Counsel's Office, have been investigating Russian interference in the 2016 presidential election for several months, which now includes 100 different criminals charges against 32 different people and three different companies, according to The New York Times.

The Russian government has always denied these allegations.

The news of Friday's indictments comes as President Donald Trump is holding meetings in the UK. He then plans to travel to Finland to hold talks with Russian Vladimir V. Putin.

Related posts:

— Scott Ferguson is the Managing Editor of Light Reading and the Editor of Security Now. Follow him on Twitter @sferguson_LR.

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
Incorporating a Prevention Mindset into Threat Detection and Response
Threat detection and response systems, by definition, are reactive because they have to wait for damage to be done before finding the attack. With a prevention-mindset, security teams can proactively anticipate the attacker's next move, rather than reacting to specific threats or trying to detect the latest techniques in real-time. The report covers areas enterprises should focus on: What positive response looks like. Improving security hygiene. Combining preventive actions with red team efforts.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2022-05-22
OS Command Injection in GitHub repository yogeshojha/rengine prior to 1.2.0.
PUBLISHED: 2022-05-21
Access of Uninitialized Pointer in GitHub repository radareorg/radare2 prior to 5.7.0.
PUBLISHED: 2022-05-21
Gitblit 1.9.2 allows privilege escalation via the Config User Service: a control character can be placed in a profile data field, such as an emailAddress%3Atext '[email protected]\n\trole = "#admin"' value.
PUBLISHED: 2022-05-21
A Path Traversal vulnerability in Gitblit 1.9.3 can lead to reading website files via /resources//../ (e.g., followed by a WEB-INF or META-INF pathname).
PUBLISHED: 2022-05-21
Solana solana_rbpf before 0.2.29 has an addition integer overflow via invalid ELF program headers. elf.rs has a panic via a malformed eBPF program.