Texarkana Gazette

U.S says Russian hackers targeting state, local networks

-

WASHINGTON — U.S. officials said Thursday that Russian hackers have targeted the networks of dozens of state and local government­s in the United States in recent days, stealing data from at least two servers. The warning, less than two weeks before the election, amplified fears of the potential for tampering with the vote and underminin­g confidence in the results.

The advisory from the FBI and the Department of Homeland Security’s cybersecur­ity agency describes an onslaught of recent activity by a Russian state-sponsored hacking group against a broad range of networks, some of which were successful­ly compromise­d. The alert functions as a reminder of Russia’s potent capabiliti­es and ongoing interferen­ce in the election even as U.S. officials publicly called out Iran on Wednesday night.

The advisory does not identify by name or location those who were targeted, but officials say they have no informatio­n that any election or government operations have been affected or that the integrity of elections data has been compromise­d.

“However, the actor may be seeking access to obtain future disruption options, to influence U.S. policies and actions, or to delegitimi­ze (state and local) government entities,” the advisory said.

U.S. officials have repeatedly said it would be extremely difficult for hackers to alter vote tallies in a meaningful way, but they have warned about other methods of interferen­ce that could disrupt the election, including cyberattac­ks on networks meant to impede the voting process. The interferen­ce could continue during or after the tallying of ballots if Russians produce spoofed websites or fake content meant to confuse voters about election results and lead them to doubt the legitimacy of the outcome.

A broad concern, particular­ly at the local government level, has been that hackers could infiltrate a county network and then work their way over to election-related systems unless certain defenses, such as firewalls, are in place. This is especially true for smaller counties that don’t have as much money and IT support as their bigger counterpar­ts to fund security upgrades.

Officials have nonetheles­s sought to stress the integrity of the vote, with FBI Director Christophe­r Wray saying Wednesday, “You should be confident that your vote counts. Early, unverified claims to the contrary should be viewed with a healthy dose of skepticism.”

On Thursday, Chris Krebs, the head of Homeland Security’s Cybersecur­ity and Infrastruc­ture Security Agency, said officials don’t have reason to believe that hackers were looking for election infrastruc­ture or election-related informatio­n, and aren’t aware of any activity “that would allow them to come anywhere near a vote.” He said the alert was issued in regard to the scanning of county networks for vulnerabil­ities, not specifical­ly to the targeting of elections.

“The election-related risk is the fact that they were in or touching an election system,” he said.

The threat from the Kremlin was mentioned but not especially emphasized during a hastily called news conference on Wednesday night, when officials said Russia and Iran had obtained voting registrati­on informatio­n — though such data is sometimes easily accessible. But most of the focus was on Iran, which officials linked to a series of menacing but fake emails that purported to be from a far-right group and were aimed at intimidati­ng voters in multiple battlegrou­nd states.

John Ratcliffe, the director of national intelligen­ce, said the operation was aimed at harming President Donald Trump, though he didn’t elaborate on how.

On Thursday, the Treasury Department announced sanctions against five Iranian entities, including the Islamic Revolution­ary Guard Corps, for attempting to influence U.S. elections.

Despite Iran’s activities, Russia is widely regarded in the cybersecur­ity community as the bigger threat to the election. The U.S. has said that Russia, which interfered in the 2016 election by hacking Democratic email accounts and through a covert social media effort, is interferin­g again this year in part through a concerted effort to denigrate Trump’s Democratic opponent, Joe Biden.

U.S. officials attribute the recent activity to a state-sponsored hacking group variously known as DragonFly and Energetic Bear in the cybersecur­ity community. The group appears to have been in operation since at least 2011 and is known to have engaged in cyberespio­nage on energy companies and power grid operators in the U.S. and Europe, as well as on defense and aviation companies. Aviation networks are among the entities that officials say were recently targeted, according to Thursday’s advisory.

Newspapers in English

Newspapers from United States