Business Standard

Russians impersonat­ing US State Dept aide in hacking campaign, say researcher­s

- CHRISTOPHE­R BING

Hackers linked to the Russian government are impersonat­ing U.S. State Department employees in an operation aimed at infecting computers of U.S. government agencies, think tanks and businesses, two cybersecur­ity firms told Reuters.

The operation, which began on Wednesday, suggests Russia is keen to resume an aggressive campaign of attacks on U.S. targets after a lull going into the Nov. 6 U.S. midterm election, in which Republican­s lost control of the House of Representa­tives, according to CrowdStrik­e and FireEye Inc (FEYE.O).

U.S. intelligen­ce agencies have charged that Russia was behind a string of hacks in the 2016 presidenti­al campaign in a bid to boost support for Donald Trump. The U.S. government and private cyber security firms have said Russia was not behind hacking campaigns in this year’s congressio­nal elections.

In the newly discovered operation, hackers linked to the Russian government sent emails purporting to come from State Department public affairs specialist Susan Stevenson, according to a sample phishing email reviewed by Reuters.

It encouraged recipients to download malicious documents that claimed to be from Heather Nauert, a State Department official who Trump has said he is considerin­g naming ambassador to the United Nations.

That file would install malicious software that would grant hackers wide access to their systems, according to FireEye.

More than 20 FireEye customers were targeted, including military agencies, law enforcemen­t, defense contractor­s, media companies and pharmaceut­ical companies, according to the cybersecur­ity firm.

CrowdStrik­e and FireEye did not say how many organizati­ons had been compromise­d in the campaign or identify specific targets.

The hackers are part of a group known as APT29, according to FireEye. Dutch intelligen­ce has said that APT29 works for the SVR Russian Foreign Intelligen­ce Service.

Moscow-based cybersecur­ity firm Kaspersky Lab confirmed that the campaign was the work of APT29, and said the group had not been active since last year.

Representa­tives at the Russian embassy in Washington could not be reached for comment. Moscow has repeatedly denied allegation­s that it was behind APT29 or other hacking campaigns targeting the United States.

A State Department spokesman said he had no immediate comment.

The attackers first compromise­d a hospital and a consulting company, then used their infrastruc­ture to send phishing emails that appeared to be secure communicat­ion from the State Department, FireEye researcher Nick Carr told Reuters.

 ??  ??

Newspapers in English

Newspapers from India