Sun Sentinel Broward Edition

Russian agents used servers in U.S. to hack Democrats

- By Tami Abdollah

WASHINGTON — Exactly seven months before the 2016 presidenti­al election, Russian government hackers made it onto a Democratic committee’s network.

One of their carefully crafted fraudulent emails hadhit paydirt, enticing an employee to click a link and enter her password.

That breach of the Democratic Congressio­nal Campaign Committee was the first significan­t step in gaining access to the Democratic National Committee network.

To steal politicall­y-sensitive informatio­n, prosecutor­s say, the hackers exploited some of the United States’ own computer infrastruc­ture against it, using servers they leased in Arizona and Illinois. The details were included in an indictment released Friday by special counsel Robert Mueller, who accused the GRU, Russia’s military intelligen­ce agency, of taking part in awide-ranging conspiracy to interfere in the 2016 presidenti­al election. The companies operating the servers were not identified in the court papers.

The Russians are accused of exploiting their access to inexpensiv­e, powerful servers worldwide— convenient­ly available for rental — that can be used to commit crimes with impunity. Reaching across oceans and into networks without borders can obfuscate their origins.

The indictment painstakin­gly reconstruc­ts the hackers’movements.

Two Russian hacking units were charged with tasks, including the creation and management of a hacking tool called “Xagent” that was implanted onto computers. The software allowed them to monitor activity on computers by individual­s, steal passwords and maintain access to hacked networks. It captured each keystroke on infected computers and took screenshot­s of activity displayed on computer screens, including an employee viewing the DCCC’s online banking informatio­n.

FromApril toJune2016, the hackers installed updated versions of their software on at least 10 Democratic computers. The software transmitte­d informatio­n from the infected computers to a GRU-leased server in Arizona, the indictment said. The hackers also created an overseas computer to act as a “middle server” to obscure the connection between the DCCC and the hackers’ Arizona-based server.

Once hackers gained access to theDCCCnet­work, it searched one computer for terms that included “hillary,” “cruz,” and “trump” and copied select folders, including “Benghazi Investigat­ions.”

In emails, the hackers embedded a link that purported to be a spreadshee­t of Clinton’s favorabili­ty ratings, but instead it directed the computers to send data to a GRU-createdweb­site.

Meanwhile, around the same time, the hackers broke into 33 DNC computers and installed their software on their network. Captured keystrokes and screenshot­s from the DCCC and DNC computers, including an employee viewing the DCCC’s banking informatio­n, were sent back to the Arizona server.

The Russian hackers used other software they developed calledX-Tunnel to move stolen documents through encrypted channels to another computer theGRUleas­ed in Illinois.

Despite the use of U.S.based servers, such vendors typically aren’t legally liable for criminal activities unless it canbeprove­d in federal court that the operator was party to criminal activity.

A 1996 federal statute protects internet vendors from being held liable for how customers use their service, and except for a few exceptions, provides immunity to the providers. Thelawis considered­akey part of the legal infrastruc­ture of the internet.

When the DNC and DCCC became aware they had been hacked, they hired a cybersecur­ity firm, Crowdstrik­e, to determine the extent of the intrusions. Crowdstrik­e, referred to as “Company 1” in the indictment, took steps to kick the hackers off the networks around June 2016. But for months the Russians eluded their investigat­ors and a version of the malware remained on the network through October — communicat­ing back to a GRU-registered internet address that appeared to be in Missouri, according to internet records.

As the companywor­ked to kick them off, GRU officials allegedly searched online for informatio­n on Company 1 and what it had reported about its use of X-Agent malware and tried to delete their traces on the DCCC network by using commercial software known as CCleaner. Though Crowdstrik­e disabled X-agent on the DCCC network, the hackers spent seven hours unsuccessf­ully trying to connect to their malware and tried using previously stolen credential­s to access the network on June 20, 2016.

The indictment also shows the reliance of Russian government hackers on American technology companies such asTwitter, to spread its stolen documents.

Newspapers in English

Newspapers from United States