Las Vegas Review-Journal

Malware expert could blow the whistle on Russian hacking

- By Andrew E. Kramer and Andrew Higgins New York Times News Service

KIEV, Ukraine — The hacker, known only by his online alias “Profexer,” kept a low profile. He wrote computer code alone in an apartment and quietly sold his handiwork on the anonymous portion of the internet known as the dark web. Last winter, he suddenly went dark entirely.

Profexer’s posts, already accessible only to a small band of fellow hackers and cybercrimi­nals looking for software tips, blinked out in January — just days after U.S. intelligen­ce agencies publicly identified a program he had written as one tool used in Russian hacking in the United States. U.S. intelligen­ce agencies have determined Russian hackers were behind the electronic break-in of the Democratic National Committee.

But while Profexer’s online persona vanished, a flesh-andblood person has emerged: a fearful man who Ukrainian police said turned himself in early this year and has now become a witness for the FBI.

“I don’t know what will happen,” he wrote in one of his last messages posted on a restricted-access website before going to the police. “It won’t be pleasant. But I’m still alive.”

It is the first known instance of a living witness emerging from the arid mass of technical detail that has so far shaped the investigat­ion into the election hacking and the heated debate it has stirred. Ukrainian police declined to divulge the man’s name or other details, other than that he is living in Ukraine and has not been arrested.

There is no evidence that Profexer worked, at least knowingly, for Russia’s intelligen­ce services, but his malware apparently did.

That a hacking operation that Washington is convinced was orchestrat­ed by Moscow would obtain malware from a source in Ukraine — perhaps the Kremlin’s most bitter enemy — sheds considerab­le light on the Russian security services’ modus operandi in what Western intelligen­ce agencies say is their clandestin­e cyberwar against the U.S. and Europe.

It does not suggest a compact team of government employees who write all their own code and carry out attacks during office hours in Moscow or St. Petersburg, but rather a far looser enterprise that draws on talent and hacking tools wherever they can be found.

Also emerging from Ukraine is a sharper picture of what the U.S. believes is a Russian government hacking group known as Advanced Persistent Threat 28 or Fancy Bear. It is this group, which U.S. intelligen­ce agencies believe is operated by Russian military intelligen­ce, that has been blamed, along with a second Russian outfit known as Cozy Bear, for the DNC intrusion.

Rather than training, arming and deploying hackers to carry out a specific mission like just another military unit, Fancy Bear and its twin Cozy Bear have operated more as centers for organizati­on and financing; much of the hard work like coding is outsourced to private and often crime-tainted vendors.

Russia’s testing ground

In more than a decade of tracking suspected Russian-directed cyberattac­ks against a host of targets in the West and in former Soviet territorie­s — NATO, electrical grids, research groups, journalist­s critical of Russia and political parties, to name a few — security services around the world have identified only a handful of people who are directly involved in either carrying out such attacks or providing the cyberweapo­ns that were used.

This absence of reliable witnesses has left ample room for President Donald Trump and others to raise doubts about

 ?? .JUSTIN T. GELLERSON / THE NEW YORK TIMES ?? The Democratic National Headquarte­rs building is seen in December 2016 in Washington. For the first time, an actual, living witness has emerged in the hack of the Democratic National Committee, and he has been interviewe­d by the FBI.
.JUSTIN T. GELLERSON / THE NEW YORK TIMES The Democratic National Headquarte­rs building is seen in December 2016 in Washington. For the first time, an actual, living witness has emerged in the hack of the Democratic National Committee, and he has been interviewe­d by the FBI.

Newspapers in English

Newspapers from United States