Kuwait Times

How Russian hackers pried into Clinton campaign emails

-

It was just before noon in Moscow on March 10, 2016, when the first volley of malicious messages hit the Hillary Clinton campaign. The first 29 phishing emails were almost all misfires. Addressed to people who worked for Clinton during her first presidenti­al run, the messages bounced back untouched. Except one. Within nine days, some of the campaign’s most consequent­ial secrets would be in the hackers’ hands, part of a massive operation aimed at vacuuming up millions of messages from thousands of inboxes across the world.

An Associated Press investigat­ion into the digital break-ins that disrupted the US presidenti­al contest has sketched out an anatomy of the hack that led to months of damaging disclosure­s about the Democratic Party’s nominee. It wasn’t just a few aides that the hackers went after; it was an all-out blitz across the Democratic Party. They tried to compromise Clinton’s inner circle and more than 130 party employees, supporters and contractor­s.

While US intelligen­ce agencies have concluded that Russia was behind the email thefts, the AP drew on forensic data to report Thursday that the hackers known as Fancy Bear were closely aligned with the interests of the Russian government. The AP’s reconstruc­tion- based on a database of 19,000 malicious links recently shared by cybersecur­ity firm Securework­s - shows how the hackers worked their way around the Clinton campaign’s top-of-the-line digital security to steal chairman John Podesta’s emails in March 2016. It also helps explain how a Russian-linked intermedia­ry could boast to a Trump policy adviser, a month later, that the Kremlin had “thousands of emails” worth of dirt on Clinton.

Phishing for victims

The rogue messages that first flew across the internet March 10 were dressed up to look like they came from Google, the company that provided the Clinton campaign’s email infrastruc­ture. The messages urged users to boost their security or change their passwords while in fact steering them toward decoy websites designed to collect their credential­s.

One of the first people targeted was Rahul Sreenivasa­n, who had worked as a Clinton organizer in Texas in 2008 his first paid job in politics. Sreenivasa­n, now a legislativ­e staffer in Austin, was dumbfounde­d when told by the AP that hackers had tried to break into his 2008 email - an address he said had been dead for nearly a decade. “They probably crawled the Internet for this stuff,” he said. Almost everyone else targeted in the initial wave was, like Sreenivasa­n, a 2008 staffer whose defunct email address had somehow lingered online.

But one email made its way to the account of another staffer who’d worked for Clinton in 2008 and joined again in 2016, the AP found. It’s possible the hackers broke in and stole her contacts; the data shows the phishing links sent to her were clicked several times. Securework­s’ data reveals when phishing links were created and indicates whether they were clicked. But it doesn’t show whether people entered their passwords.

Within hours of a second volley emailed March 11, the hackers hit pay dirt. All of a sudden, they were sending links aimed at senior Clinton officials’ nonpublic 2016 addresses, including those belonging to longtime Clinton aide Robert Russo and campaign chairman John Podesta. The Clinton campaign was no easy target; several former employees said the organizati­on put particular stress on digital safety.

Work emails were protected by two-factor authentica­tion, a technique that uses a second passcode to keep accounts secure. Most messages were deleted after 30 days and staff went through phishing drills. Security awareness even followed the campaigner­s into the bathroom, where someone put a picture of a toothbrush under the words: “You shouldn’t share your passwords either.”

Two-factor authentica­tion may have slowed the hackers, but it didn’t stop them. After repeated attempts to break into various staffers’ hillarycli­nton.com accounts, the hackers turned to the personal Gmail addresses. It was there on March 19 that they targeted top Clinton lieutenant­s - including campaign manager Robby Mook, senior adviser Jake Sullivan and political fixer Philippe Reines. A malicious link was generated for Podesta at 11:28 am Moscow time, the AP found. Documents subsequent­ly published by WikiLeaks show that the rogue email arrived in his inbox six minutes later. The link was clicked twice. Podesta’s messages - at least 50,000 of them - were in the hackers’ hands.

Clinton campaign was profoundly destabiliz­ed by sudden exposures

A serious breach

Though the heart of the campaign was now compromise­d, the hacking efforts continued. Three new volleys of malicious messages were generated on the 22nd, 23rd and 25th of March, targeting communicat­ions director Jennifer Palmieri and Clinton confidante Huma Abedin, among others. The torrent of phishing emails caught the attention of the FBI, which had spent the previous six months urging the Democratic National Committee in Washington to raise its shield against suspected Russian hacking. In late March, FBI agents paid a visit to Clinton’s Brooklyn headquarte­rs, where they were received warily, given the agency’s investigat­ion into the candidate’s use of a private email server while secretary of state.

The phishing messages also caught the attention of Securework­s, a subsidiary of Dell Technologi­es, which had been following Fancy Bear, whom Securework­s codenamed Iron Twilight. Fancy Bear had made a critical mistake. It fumbled a setting in the Bitly link-shortening service that it was using to sneak its emails past Google’s spam filter. The blunder exposed whom they were targeting. It was late March when Securework­s discovered the hackers were going after Democrats.

“As soon as we started seeing some of those hillarycli­nton.com email addresses coming through, the DNC email addresses, we realized it’s going to be an interestin­g twist to this,” said Rafe Pilling, a senior security researcher with Securework­s. By early April Fancy Bear was getting increasing­ly aggressive, the AP found. More than 60 bogus emails were prepared for Clinton campaign and DNC staffers on April 6 alone, and the hackers began hunting for Democrats beyond New York and Washington, targeting the digital communicat­ions director for Pennsylvan­ia Gov Tom Wolf and a deputy director in the office of Chicago Mayor Rahm Emanuel.

The group’s hackers seemed particular­ly interested in Democratic officials working on voter registrati­on issues: Pratt Wiley, the DNC’s then-director of voter protection, had been targeted as far back as October 2015 and the hackers tried to pry open his inbox as many as 15 times over six months. Employees at several organizati­ons connected to the Democrats were targeted, including the Clinton Foundation, the Center for American Progress, technology provider NGP VAN, campaign strategy firm 270 Strategies, and partisan news outlet Shareblue Media.

As the hacking intensifie­d, other elements swung into place. On April 12, 2016, someone paid $37 worth of bitcoin to the Romanian web hosting company THCServers.com to reserve a website called Electionle­aks.com, according to transactio­n records obtained by AP. A botched registrati­on meant the site never got off the ground, but the records show THC received a nearly identical payment a week later to create DCLeaks.com.

By the second half of April, the DNC’s senior leadership was beginning to realize something was amiss. One DNC consultant, Alexandra Chalupa, received an April 20 warning from Yahoo saying her account was under threat from state-sponsored hackers, according to a screengrab she circulated among colleagues. The Trump campaign had gotten a whiff of Clinton email hacking, too. According to recently unsealed court documents, former Trump foreign policy adviser George Papadopoul­os said that it was at an April 26 meeting at a London hotel that he was told by a professor closely connected to the Russian government that the Kremlin had obtained compromisi­ng informatio­n about Clinton. “They have dirt on her,” Papadopoul­os said he was told. “They have thousands of emails.” A few days later, Amy Dacey, then the DNC chief executive, got an urgent call. There’d been a serious breach at the DNC.

‘Don’t even talk to your dog about it’

It was 4 p.m. on Friday June 10 when some 100 staffers filed into the Democratic National Committee’s main conference room for a mandatory, all-hands meeting. “What I am about to tell you cannot leave this room,” DNC chief operating officer Lindsey Reynolds told the assembled crowd, according to two people there at the time. Everyone needed to turn in their laptops immediatel­y; there would be no last-minute emails; no downloadin­g documents and no exceptions. Reynolds insisted on total secrecy. “Don’t even talk to your dog about it,” she was quoted as saying.

Two days later, as the cybersecur­ity firm that was brought in to clean out the DNC’s computers finished its work, WikiLeaks founder Julian Assange told a British Sunday television show that emails related to Clinton were “pending publicatio­n”. “WikiLeaks has a very good year ahead,” he said. On Tuesday, June 14, the Democrats went public with the allegation that their computers had been compromise­d by Russian state-backed hackers, including Fancy Bear. Shortly after noon the next day, William Bastone, the editor-in-chief of investigat­ive news site The Smoking Gun, got an email bearing a small cache of documents marked “CONFIDENTI­AL”. “Hi,” the message said. “This is Guccifer 2.0 and this is me who hacked Democratic National Committee.” —AP

 ??  ??
 ??  ??
 ??  ?? This June 29, 2016 photo shows signs posted in a bathroom at Hillary Clinton’s campaign headquarte­rs in the Brooklyn borough of New York, reminding campaign workers to keep their computers and passwords secure. —AP photos
This June 29, 2016 photo shows signs posted in a bathroom at Hillary Clinton’s campaign headquarte­rs in the Brooklyn borough of New York, reminding campaign workers to keep their computers and passwords secure. —AP photos
 ??  ?? A portion of a phishing email sent to a Hillary Clinton campaign official on March 19, 2016.
A portion of a phishing email sent to a Hillary Clinton campaign official on March 19, 2016.
 ??  ??

Newspapers in English

Newspapers from Kuwait