Russia hackers pursued Putin foes, not just US Democrats

The hackers who disrupted the U.S. presidential election last year had ambitions that stretched across the globe, targeting the emails of Ukrainian officers, Russian opposition figures, U.S. defense contractors and thousands of others of interest to the Kremlin

Posted: Nov 3, 2017 7:44 AM

WASHINGTON (AP) - It wasn't just Hillary Clinton's emails they went after.

The hackers who disrupted the U.S. presidential election last year had ambitions that stretched across the globe, targeting the emails of Ukrainian officers, Russian opposition figures, U.S. defense contractors and thousands of others of interest to the Kremlin, according to a previously unpublished digital hit list obtained by The Associated Press.

The list provides the most detailed forensic evidence yet of the close alignment between the hackers and the Russian government, exposing an operation that went back years and tried to break into the inboxes of 4,700 Gmail users - from the pope's representative in Kiev to the punk band Pussy Riot in Moscow. The targets were spread among 116 countries.

"It's a wish list of who you'd want to target to further Russian interests," said Keir Giles, director of the Conflict Studies Research Center in Cambridge, England, and one of five outside experts who reviewed the AP's findings. He said the data was "a master list of individuals whom Russia would like to spy on, embarrass, discredit or silence."

The AP findings draw on a database of 19,000 malicious links collected by cybersecurity firm Secureworks, dozens of rogue emails, and interviews with more than 100 hacking targets.

Secureworks stumbled upon the data after a hacking group known as Fancy Bear accidentally exposed part of its phishing operation to the internet. The list revealed a direct line between the hackers and the leaks that rocked the presidential contest in its final stages, most notably the private emails of Clinton campaign chairman John Podesta.

The issue of who hacked the Democrats is back in the national spotlight following the revelation Monday that a Donald Trump campaign official, George Papadopoulos, was briefed early last year that the Russians had "dirt" on Clinton, including "thousands of emails."

Kremlin spokesman Dmitry Peskov called the notion that Russia interfered "unfounded." But the list examined by AP provides powerful evidence that the Kremlin did just that.

"This is the Kremlin and the general staff," said Andras Racz, a specialist in Russian security policy at Pazmany Peter Catholic University in Hungary, as he examined the data.

"I have no doubts."

___

THE NEW EVIDENCE

Secureworks' list covers the period between March 2015 and May 2016. Most of the identified targets were in the United States, Ukraine, Russia, Georgia and Syria.

In the United States, which was Russia's Cold War rival, Fancy Bear tried to pry open at least 573 inboxes belonging to those in the top echelons of the country's diplomatic and security services: then-Secretary of State John Kerry, former Secretary of State Colin Powell, then-NATO Supreme Commander, U.S. Air Force Gen. Philip Breedlove, and one of his predecessors, U.S. Army Gen. Wesley Clark.

The list skewed toward workers for defense contractors such as Boeing, Raytheon and Lockheed Martin or senior intelligence figures, prominent Russia watchers and - especially - Democrats. More than 130 party workers, campaign staffers and supporters of the party were targeted, including Podesta and other members of Clinton's inner circle.

The AP also found a handful of Republican targets.

Podesta, Powell, Breedlove and more than a dozen Democratic targets besides Podesta would soon find their private correspondence dumped to the web. The AP has determined that all had been targeted by Fancy Bear, most of them three to seven months before the leaks.

"They got two years of email," Powell recently told AP. He said that while he couldn't know for sure who was responsible, "I always suspected some Russian connection."

In Ukraine, which is fighting a grinding war against Russia-backed separatists, Fancy Bear attempted to break into at least 545 accounts, including those of President Petro Poroshenko and his son Alexei, half a dozen current and former ministers such as Interior Minister Arsen Avakov and as many as two dozen current and former lawmakers.

The list includes Serhiy Leshchenko, an opposition parliamentarian who helped uncover the off-the-books payments allegedly made to Trump campaign chairman Paul Manafort - whose indictment was unsealed Monday in Washington.

In Russia, Fancy Bear focused on government opponents and dozens of journalists. Among the targets were oil tycoon-turned-Kremlin foe Mikhail Khodorkovsky, who spent a decade in prison and now lives in exile, and Pussy Riot's Maria Alekhina. Along with them were 100 more civil society figures, including anti-corruption campaigner Alexei Navalny and his lieutenants.

"Everything on this list fits," said Vasily Gatov, a Russian media analyst who was himself among the targets. He said Russian authorities would have been particularly interested in Navalny, one of the few opposition leaders with a national following.

Many of the targets have little in common except that they would have been crossing the Kremlin's radar: an environmental activist in the remote Russian port city of Murmansk; a small political magazine in Armenia; the Vatican's representative in Kiev; an adult education organization in Kazakhstan.

"It's simply hard to see how any other country would be particularly interested in their activities," said Michael Kofman, an expert on Russian military affairs at the Woodrow Wilson International Center in Washington. He was also on the list.

"If you're not Russia," he said, "hacking these people is a colossal waste of time."

___

WORKING 9 TO 6 MOSCOW TIME

Allegations that Fancy Bear works for Russia aren't new. But raw data has been hard to come by.

Researchers have been documenting the group's activities for more than a decade and many have accused it of being an extension of Russia's intelligence services. The "Fancy Bear" nickname is a none-too-subtle reference to Russia's national symbol.

In the wake of the 2016 election, U.S. intelligence agencies publicly endorsed the consensus view, saying what American spooks had long alleged privately: Fancy Bear is a creature of the Kremlin.

But the U.S. intelligence community provided little proof, and even media-friendly cybersecurity companies typically publish only summaries of their data.

That makes the Secureworks' database a key piece of public evidence - all the more remarkable because it's the result of a careless mistake.

Secureworks effectively stumbled across it when a researcher began working backward from a server tied to one of Fancy Bear's signature pieces of malicious software.

He found a hyperactive Bitly account that Fancy Bear (which Secureworks calls "Iron Twilight") was using to sneak thousands of malicious links past Google's spam filter. Because Fancy Bear forgot to set the account to private, Secureworks spent the next few months hovering over the group's shoulder, quietly copying down the details of the thousands of emails it was targeting.

The AP obtained the data recently, boiling it down to 4,700 individual email addresses, and then connecting roughly half to account holders. The AP validated the list by running it against a sample of phishing emails obtained from people targeted and comparing it to similar rosters gathered independently by other cybersecurity companies, such as Tokyo-based Trend Micro and the Slovakian firm ESET .

The Secureworks data allowed reporters to determine that more than 95 percent of the malicious links were generated during Moscow office hours - between 9 a.m. and 6 p.m. Monday to Friday.

The AP's findings also track with a report that first brought Fancy Bear to the attention of American voters. In 2016, a cybersecurity company known as CrowdStrike said the Democratic National Committee had been compromised by Russian hackers, including Fancy Bear.

Secureworks' roster shows Fancy Bear making aggressive attempts to hack into DNC technical staffers' emails in early April 2016 - exactly when CrowdStrike says the hackers broke in.

And the raw data enabled the AP to speak directly to the people who were targeted, many of whom pointed the finger at the Kremlin.

"We have no doubts about who is behind these attacks," said Artem Torchinskiy, a project coordinator with Navalny's Anti-Corruption Fund who was targeted three times in 2015. "I am sure these are hackers controlled by Russian secret services."

___

THE MYTH OF THE 400-POUND MAN

Even if only a small fraction of the 4,700 Gmail accounts targeted by Fancy Bear were hacked successfully, the data drawn from them could run into terabytes - easily rivaling the biggest known leaks in journalistic history.

For the hackers to have made sense of that mountain of messages - in English, Ukrainian, Russian, Georgian, Arabic and many other languages - they would have needed a substantial team of analysts and translators. Merely identifying and sorting the targets took six AP reporters eight weeks of work.

The AP's effort offers "a little feel for how much labor went into this," said Thomas Rid, a professor of strategic studies at Johns Hopkins University's School of Advanced International Studies.

In response to the AP's investigation, the DNC issued a statement saying the evidence that Russia had interfered in the election was "irrefutable."

Rid said the investigation should put to rest any theories like the one then-candidate Donald Trump floated last year that the hacks could be the work of "someone sitting on their bed that weighs 400 pounds."

"The notion that it's just a lone hacker somewhere is utterly absurd," Rid said.

___

Donn reported from Plymouth, Massachusetts. Myers reported from Chicago. Chad Day, Desmond Butler and Ted Bridis in Washington, Frank Bajak in Houston, Lori Hinnant in Paris, Maggie Michael in Cairo and Erika Kinetz in Shanghai contributed to this report. Novaya Gazeta reporters Nikolay Voroshilov, Yana Surinskaya and Roman Anin in Moscow also contributed.

____

Satter, Donn and Myers can be reached at:

http://raphaelsatter.com , https://twitter.com/jadonn7 and https://twitter.com/myersjustinc

___

Editor's Note: Satter's father, David Satter, is an author and Russia specialist who has been critical of the Kremlin. His emails were published last year by hackers and his account is on Secureworks' list of Fancy Bear targets.

Copyright 2017 The Associated Press. All rights reserved. This material may not be published, broadcast, rewritten or redistributed.

Terre Haute
Few Clouds
90° wxIcon
Hi: 91° Lo: 68°
Feels Like: 91°
Robinson
Broken Clouds
87° wxIcon
Hi: 89° Lo: 66°
Feels Like: 90°
Indianapolis
Broken Clouds
89° wxIcon
Hi: 91° Lo: 71°
Feels Like: 89°
Rockville
Clear
87° wxIcon
Hi: 90° Lo: 67°
Feels Like: 87°
Casey
Clear
90° wxIcon
Hi: 90° Lo: 68°
Feels Like: 91°
Brazil
Few Clouds
90° wxIcon
Hi: 90° Lo: 68°
Feels Like: 91°
Marshall
Few Clouds
90° wxIcon
Hi: 90° Lo: 68°
Feels Like: 91°
Hot Holiday Weekend
WTHI Planner
WTHI Temps
WTHI Radar

WTHI Events

 

Illinois Coronavirus Cases

(Widget updates once daily at 7 p.m. CT)

Confirmed Cases: 144013

Reported Deaths: 6951
CountyConfirmedDeaths
Cook909114581
Lake9752418
DuPage9083472
Kane7733271
Will6744320
Winnebago304695
McHenry206197
St. Clair1906136
Kankakee128565
Kendall96320
Madison94769
Rock Island94729
Champaign88012
Boone59521
DeKalb55818
Peoria49928
Sangamon43132
Jackson33219
Randolph2877
Stephenson2745
McLean26113
Ogle2614
Clinton23717
Macon23122
LaSalle21917
Union19119
Whiteside19115
Coles17017
Grundy1674
Iroquois1575
Warren1380
Tazewell1378
Knox1320
Cass1302
Morgan1283
Monroe12713
Williamson1204
Jefferson10717
McDonough10115
Lee972
Adams931
Henry881
Pulaski760
Marion660
Vermilion662
Perry541
Douglas520
Macoupin523
Unassigned500
Jasper467
Livingston452
Jo Daviess441
Montgomery441
Christian434
Jersey351
Ford331
Woodford332
Bureau292
Menard250
Fayette233
Alexander220
Franklin220
Mason220
Wabash220
Carroll212
Johnson200
Mercer200
Piatt200
Washington200
Hancock191
Crawford180
Moultrie180
Shelby181
Fulton150
Logan150
Clark140
Wayne141
Bond131
Massac130
Schuyler130
Cumberland120
Effingham121
Brown100
Edgar100
Greene90
Saline90
Henderson80
Marshall80
Lawrence70
De Witt60
Hamilton50
White50
Richland40
Stark30
Clay20
Edwards20
Gallatin20
Pike20
Calhoun10
Hardin10
Out of IL10
Pope10
Putnam10
Scott00

Indiana Coronavirus Cases

(Widget updates once daily at 8 p.m. ET)

Confirmed Cases: 46387

Reported Deaths: 2662
CountyConfirmedDeaths
Marion11434680
Lake4985241
Elkhart313343
Allen2695117
St. Joseph185766
Cass16369
Hamilton1502100
Hendricks1371100
Johnson1244118
Porter69037
Tippecanoe6598
Madison64363
Clark62744
Bartholomew58044
Howard55057
LaPorte54125
Kosciusko5003
LaGrange4646
Jackson4583
Vanderburgh4576
Noble45128
Delaware42949
Boone42743
Hancock42535
Marshall4183
Shelby41825
Floyd37044
Morgan32331
Montgomery29020
Grant28726
Clinton2812
Monroe26328
Dubois2616
White25910
Decatur24732
Henry23615
Lawrence23624
Vigo2278
Harrison20822
Warrick20729
Dearborn20622
Greene18432
Miami1802
Jennings16911
Putnam1658
DeKalb1594
Scott1557
Daviess13916
Orange13323
Wayne1296
Franklin1248
Steuben1242
Perry1239
Ripley1148
Jasper1132
Carroll1092
Wabash1092
Fayette967
Newton9610
Whitley814
Randolph774
Starke773
Huntington702
Wells681
Jay670
Fulton661
Jefferson661
Washington651
Knox630
Pulaski621
Clay594
Rush563
Benton480
Adams471
Gibson462
Owen451
Sullivan441
Brown381
Blackford372
Posey360
Spencer331
Tipton301
Crawford290
Fountain292
Switzerland260
Martin220
Parke220
Ohio140
Warren141
Union130
Vermillion130
Pike80
Unassigned0193