The same Russian government-aligned hackers who penetrated the Democratic Party have spent the past few months laying the groundwork for an espionage campaign against the US Senate, a cybersecurity firm said in a report
Representation pic
ADVERTISEMENT
The same Russian government-aligned hackers who penetrated the Democratic Party have spent the past few months laying the groundwork for an espionage campaign against the US Senate, a cybersecurity firm said in a report. The revelation yesterday suggests the group often nicknamed Fancy Bear, whose hacking campaign scrambled the 2016 US electoral contest, is still busy trying to gather the emails of America's political elite.
"They're still very active -- in making preparations at least -- to influence public opinion again," said Feike Hacquebord, a security researcher at Trend Micro Inc who authoered the report. "They are looking for information they might leak later." The Senate Sergeant at Arms office, which is responsible for the upper house's security, declined to comment, but Nebraska Senator Ben Sasse said it was time for US Attorney General Jeff Sessions to return to Congress to say what action had been taken to help ensure lawmakers' digital safety.
"The Administration needs to take urgent action to ensure that our adversaries cannot undermine the framework of our political debates," he said in a statement. Trend Micro based its report on the discovery of a clutch of suspicious-looking websites dressed up to look like the US Senate's internal email system. The Tokyo-based firm then cross-referenced digital fingerprints associated with those sites to ones used almost exclusively by Fancy Bear, which it dubs "Pawn Storm."
Trend Micro previously drew international attention when it used an identical technique to uncover a set of decoy websites apparently set up to harvest emails from the French presidential candidate Emmanuel Macron's campaign in April 2017. The sites' discovery was followed two months later by a still-unexplained publication of private emails from several Macron staffers in the final days of the race. Hacquebord said the rogue Senate sites -- which were set up in June and September of 2017 -- matched their French counterparts.
"That is exactly the way they attacked the Macron campaign in France," he said. Attribution is extremely tricky in the world of cybersecurity, where hackers routinely use misdirection and red herrings to fool their adversaries. But Tend Micro, which has followed Fancy Bear for years, said there could be no doubt.
"We are 100 per cent sure that it can attributed to the Pawn Storm group," said Rik Ferguson, one of the Hacquebord's colleagues. Like many cybersecurity companies, Trend Micro refuses to speculate publicly on who is behind such groups, referring to Pawn Storm only as having "Russia-related interests."
But the US intelligence community alleges that Russia's military intelligence service pulls the hackers' strings and a months-long Associated Press investigation into the group, drawing on a vast database of targets supplied by the cybersecurity firm Secureworks, has determined that the group is closely attuned to the Kremlin's objectives.
Catch up on all the latest Mumbai, National and International news here
Download the new mid-day Android and iOS apps to get updates on all the latest and trending stories on the go