South Florida Sun-Sentinel (Sunday)

Microsoft policing the internet

Anti-hacking efforts make firm a cop for the web

- By Matt O’Brien Associated Press

Intentiona­lly or not, Microsoft has emerged as a kind of internet cop, thanks to its efforts to thwart Russian hackers.

The company’s announceme­nt Tuesday that it disrupted fake internet domains mimicking conservati­ve U.S. political institutio­ns sparked confusion and alarm on Capitol Hill and led Russian officials to accuse the company of participat­ing in an anti-Russian “witch hunt.”

Microsoft stands virtually alone among tech companies with its aggressive approach, which uses U.S. courts to fight computer fraud and seize hacked websites back from malicious perpetrato­rs. In the process, it takes on a role that might look more like the job of government than a corporatio­n.

In the case this week, the company did not just accidental­ly stumble onto a couple of harmless spoof websites.

The discovery was part of an ongoing legal fight against Russian hackers that began in the summer before the 2016 presidenti­al election and was part of a broader, decade-long battle to protect its brand from cybercrime.

“What we’re seeing in the last couple of months appears to be an uptick in activity,” Brad Smith, Microsoft’s president and chief legal officer, said in an interview this week.

Microsoft says it caught these particular sites early and that there’s no evidence they were used in hacking attacks.

The company sued the hacking group it calls Strontium in August 2016, arguing that it was breaking into Microsoft’s President and Chief Legal Officer Brad Smith says the tech firm is seeing an “uptick” in nefarious activity the last several months.

Microsoft accounts and computer networks and stealing highly sensitive informatio­n from customers. The group, Microsoft said, would send “spear-phishing” emails linking to realistic-looking fake websites in hopes that targeted victims — including political and military figures — would click.

In addition to computer fraud, the company makes arguments based on trademark and copyright infringeme­nt.

One email introduced as court evidence in 2016 showed a photo of a mushroom cloud and a link to an article about how RussiaU.S. tensions could trigger World War III. Clicking on the link might expose a user’s computer to infection, hidden spyware or data theft.

— Maurice Turner, a senior technologi­st at the industry-backed Center for Democracy and Technology

Others call the group Fancy Bear or APT28. An indictment from U.S. special counsel Robert Mueller has tied it to Russian’s main intelligen­ce agency, known as the GRU, and to the 2016 email hacking of both the Democratic National Committee and Democrat Hillary Clinton’s presidenti­al campaign.

Maurice Turner, a senior technologi­st at the industryba­cked Center for Democracy and Technology, said Microsoft is wholly justified in its approach to identifyin­g and publicizin­g online dangers.

“Microsoft is really setting the standards with how public and how detailed they are with reporting out their actions,” Turner said.

Companies including Microsoft, Google and Amazon are uniquely positioned to do this because their infrastruc­ture and customers are affected. Turner said they “are defending their own hardware and their own software and

to some extent defending their own customers.”

Turner said he has not seen anyone in the industry as “out in front and open about” these issues as Microsoft.

Microsoft’s Windows operating system had long been a prime target for viruses when in 2008 the company formed its Digital Crimes Unit, an internatio­nal team of attorneys, investigat­ors and data scientists.

The unit became known earlier in its decade for taking down botnets, collection­s of compromise­d computers used as tools for financial crimes.

Richard Boscovich, a former federal prosecutor and a senior attorney in Microsoft’s digital crimes unit, testified to the Senate in 2014 about how Microsoft

used civil litigation as a tactic.

To attack botnets, Microsoft would take its fight to courts, suing on the basis of the federal Computer Fraud and Abuse Act and other laws and asking judges for permission to sever the networks’ command-and-control structures.

“Once the court grants permission and Microsoft severs the connection between a cybercrimi­nal and an infected computer, traffic generated by infected computers is either disabled or routed to domains controlled by Microsoft,” Boscovich said in 2014.

He said the process of taking over the accounts, known as “sinkholing,” enabled Microsoft to collect valuable evidence and intelligen­ce used to assist victims.

“Microsoft is really setting the standards with how public and how detailed they are with reporting out their actions.”

 ?? ANDREW HARNIK/AP ??
ANDREW HARNIK/AP

Newspapers in English

Newspapers from United States