The Niagara Falls Review

Russian hackers’ near miss

‘Fancy Bear’ hackers took aim at U.S. defence contractor­s

- JEFF DONN, DESMOND BUTLER and RAPHAEL SATTER THE ASSOCIATED PRESS

WASHINGTON — Russian hackers exploited a key vulnerabil­ity in U.S. cyber defences to come within reach of stealing some of the nation’s most secret and advanced defence technology, an Associated Press investigat­ion has found.

What may have been stolen is uncertain, but the cyberspies clearly took advantage of poorly protected email and scant direct notificati­on of victims.

The hackers known as Fancy Bear, who also intruded in the U.S. election, went after at least 87 people working on military drones, missiles, rockets, stealth fighter jets, cloud-computing platforms, or other sensitive activities, the AP found. Thirty-one agreed to interviews.

Employees at both small companies and defence giants like Lockheed Martin Corp., Raytheon Co., Boeing Co., Airbus Group and General Atomics were targeted. Contacted by the AP, those companies offered no comment.

“The programs that they appear to target and the people who work on those programs are some of the most forward-leaning, advanced technologi­es,” said Charles Sowell, a former senior adviser in the Office of the U.S. Director of National Intelligen­ce, who reviewed the list of names for the AP. “And if those programs are compromise­d in any way, then our competitiv­e advantage and our defence is compromise­d.”

“That’s what’s really scary,” added Sowell, who was himself one of the hacking targets.

The AP identified Fancy Bear’s prey from about 19,000 lines of the hackers’ email phishing data collected by the U.S.-based cybersecur­ity company Securework­s, which calls the hackers Iron Twilight. The data is partial and extends from March 2015 to May 2016.

Most of the people on the target list worked on classified projects. Yet as many as 40 per cent clicked on the hackers’ phishing links, the AP analysis indicates. That’s the first step in potentiall­y opening their accounts or computer files to digital theft.

Hackers predominan­tly targeted personal Gmail, with a few corporate accounts mixed in. Personal accounts can convey classified informatio­n — whether through carelessne­ss or expediency — and lead to more valuable targets or carry embarrassi­ng personal details that can be used for blackmail or to recruit spies.

Among their interests, the Russians seemed to be eyeing the X-37B, an American unmanned space plane that looks like a miniature shuttle.

Referring to an X-37B flight in May 2015, Russian Deputy Prime Minister Dmitry Rogozin invoked it as evidence that his country’s space program was faltering. “The United States is pushing ahead,” he warned Russian lawmakers.

Less than two weeks later, Fancy Bear tried to penetrate the Gmail account of a senior engineer on the X-37B project at Boeing.

The hackers also chased people who work on cloud-based services, the off-site computer networks that enable collaborat­ors to work with data that is sometimes classified. For example, the cyberspies tried to get into the Gmail of an employee at Mellanox Federal Systems, which helps the government with high-speed storage networks, data analysis and cloud computing. Its clients include the FBI and other intelligen­ce agencies.

Yet of the 31 targets reached by AP, just one got any warning from U.S. officials.

The FBI declined to give on-therecord details of its response to this Russian operation. Agency spokeswoma­n Jillian Stickels said the FBI does sometimes notify individual targets. “The FBI takes ... all potential threats to public and private sector systems very seriously,” she said in an email.

However, three people familiar with the matter — including a current and a former government official — previously told the AP the FBI knew the details of Fancy Bear’s phishing campaign for more than a year.

Pressed about notificati­on in that case, a senior FBI official, who was not authorized to publicly discuss the hacking operation because of its sensitivit­y, said the bureau was overwhelme­d by the sheer number of attempted hacks. “It’s a matter of triaging to the best of our ability the volume of the targets who are out there,” he said.

A Pentagon spokeswoma­n, Heather Babb, said the department recognizes the evolving cyber threat and continues to update training and technology for military, civilian and contract personnel. But she declined to comment on this hacking operation.

The Defence Security Service, which protects classified U.S. technology, focuses on safeguardi­ng corporate computer networks.

“We simply have no insight into or oversight of anyone’s personal email accounts or how they are protected or notified when something is amiss,” spokeswoma­n Cynthia McGovern said in an email.

 ?? ROGELIO V. SOLIS/AP PHOTO ?? Retired Air Force Maj. Gen. James Poss, speaks in his home office in Ocean Springs, Miss., on Jan. 17, 2018. Poss, whose Gmail was nearly compromise­d in a phishing attempt, said that military spying is now far easier than when somebody needed to carry...
ROGELIO V. SOLIS/AP PHOTO Retired Air Force Maj. Gen. James Poss, speaks in his home office in Ocean Springs, Miss., on Jan. 17, 2018. Poss, whose Gmail was nearly compromise­d in a phishing attempt, said that military spying is now far easier than when somebody needed to carry...
 ?? STEVE HELBER, HEATHER AINSWORTH/U.S. AIR FORCE ?? This combinatio­n of photos shows an Air Force F-22 Raptor stealth fighter jet, left, an MQ-9 Reaper/”Predator B” drone, right, and an X-37B unmanned spacecraft, bottom. Data supplied by the cybersecur­ity firm Securework­s shows Fancy Bear’s hacking...
STEVE HELBER, HEATHER AINSWORTH/U.S. AIR FORCE This combinatio­n of photos shows an Air Force F-22 Raptor stealth fighter jet, left, an MQ-9 Reaper/”Predator B” drone, right, and an X-37B unmanned spacecraft, bottom. Data supplied by the cybersecur­ity firm Securework­s shows Fancy Bear’s hacking...

Newspapers in English

Newspapers from Canada