Who is behind the Russian cyberattacks on coronavirus vaccine research?
A cybersecurity and defence expert on the history and development of Russian cyberwarfare
Dorothy Denning, emeritus distinguished professor of Defense Analysis at the Naval Postgraduate School, California, on the history and individuals behind Russia’s cyberwarfare.
A Russian cyberespionage group that hacked into election networks before the 2016 US presidential election is now attempting to steal coronavirus vaccine information from researchers in the US, U.K. and Canada.
The governments of those three countries issued a warning on July 16 saying that the group known as APT29 or “Cozy Bear” is targeting vaccine development efforts. The group, which is connected with the FSB, Russia’s internal security service, had gotten inside the Democratic National Committee networks prior to the 2016 election.
Subscribe to The Week
Escape your echo chamber. Get the facts behind the news, plus analysis from multiple perspectives.
Sign up for The Week's Free Newsletters
From our morning news briefing to a weekly Good News Newsletter, get the best of The Week delivered directly to your inbox.
From our morning news briefing to a weekly Good News Newsletter, get the best of The Week delivered directly to your inbox.
This latest incident illustrates yet again how, beyond carrying all of our phone, text and internet communications, cyberspace is an active battleground, with cybercriminals, government agents and even military personnel probing weaknesses in corporate, national and even personal online defenses.
Some of the most talented and dangerous cybercrooks and cyberwarriors come from Russia, which is a longtime meddler in other countries’ affairs.
Over decades, Russian operators have stolen terabytes of data, taken control of millions of computers and raked in billions of dollars. They’ve shut down electricity in Ukraine and meddled in elections in the US and elsewhere. They’ve engaged in disinformation and disclosed pilfered information such as the emails stolen from Hillary Clinton’s campaign chairman, John Podesta, following successful spearphishing attacks.
Who are these operators, why are they so skilled, and what are they up to?
Back to the 1980s
The Russian cyberthreat dates back to at least 1986 when Cliff Stoll, then a system administrator at Lawrence Berkeley National Laboratory, linked a 75-cent accounting error to intrusions into the lab’s computers. The hacker was after military secrets, downloading documents with important keywords such as “nuclear.”
A lengthy investigation, described in Stoll’s book “The Cuckoo’s Egg,” led to a German hacker who was selling the stolen data to what was then the Soviet Union.
By the late 1990s, Russian cyberespionage had grown to include the multi-year “Moonlight Maze” intrusions into US military and other government computers, foretelling the massive espionage from Russia today.
The 1990s also saw the arrest of Vladimir Levin, a computer operator in St. Petersburg. Levin tried to steal more than US$10 million by hacking Citibank accounts, foreshadowing Russia’s prominence in cybercrime. And Russian hackers defaced US websites during the Kosovo conflict, portending Russia’s extensive use of disruptive and damaging cyberattacks.
Conducting advanced attacks
In more recent years, Russia has been behind some of the most sophisticated cyberattacks on record. The 2015 cyberattack on three of Ukraine’s regional power distribution companies knocked out power to almost a quarter-million people.
Cybersecurity analysts from the Electricity Information Sharing and Analysis Center and the SANS Institute reported that the multi-staged attacks were conducted by a “highly structured and resourced actor.” Ukraine blamed the attacks on Russia.
The attackers used a variety of techniques and adapted to the targets they faced. They used spearphishing email messages to gain initial access to systems. They installed “BlackEnergy” malware to establish remote control over the infected devices. They harvested credentials to move through the networks. They developed custom malicious firmware to render system control devices inoperable.
They hijacked the Supervisory Control and Data Acquisition system to open circuit breakers in substations. They used “KillDisk” malware to erase the master boot record of affected systems. The attackers even went so far as to strike the control stations’ battery backups and tie up the energy company’s call center with thousands of calls.
The Russians returned in 2016 with more advanced tools to take down a major artery of Ukraine’s power grid. Russia is believed to have also invaded energy companies in the US, including those operating nuclear power plants.
Top-notch cybereducation
Russia has many skilled cyberoperators, and for good reason: Their educational system emphasises information technology and computer science, more so than in the US. Every year, Russian schools take a disproportionate number of the top spots in the International Collegiate Programming Contest.
In the 2016 contest, St. Petersburg State University took the top spot for the fifth time in a row, and four other Russian schools also made the top 12. In 2017, St. Petersburg ITMO University won, with two other Russian schools also placing in the top 12. The top US school ranked 13th.
As Russia prepared to form a cyberbranch within its military, Minister of Defense Sergei Shoigu took note of Russian students’ performance in the contest. “We have to work with these guys somehow, because we need them badly,” he said in a public meeting with university administrators.
Who are these Russian cyberwarriors?
Russia employs cyberwarriors within its military and intelligence services. Indeed, the cyberespionage groups dubbed APT28 (aka Fancy Bear) and APT29 (aka Cozy Bear and The Dukes) are believed to correspond to Russia’s military intelligence agency GRU and its state security organisation FSB, respectively.
Both groups have been implicated in hundreds of cyberoperations over the past decade, including US election hacking.
Russia recruits cyberwarriors from its colleges, but also from the cybersecurity and cybercrime sectors. It is said to turn a blind eye to its criminal hackers as long as they avoid Russian targets and use their skills to aid the government.
According to Dmitri Alperovitch, co-founder of the security firm CrowdStrike, when Moscow identifies a talented cybercriminal, any pending criminal case against the person is dropped and the hacker disappears into the Russian intelligence services.
Evgeniy Mikhailovich Bogachev, wanted by the FBI with a reward of $3 million for cybercrimes, is also on the Obama administration’s list of people sanctioned in response to interference in the US election. Bogachev is said to work “under the supervision of a special unit of the FSB”.
Allies outside official channels
Besides its in-house capabilities, the Russian government has access to hackers and the Russian media. Analyst Sarah Geary at cybersecurity firm FireEye reported that the hackers “disseminate propaganda on behalf of Moscow, develop cybertools for Russian intelligence agencies like the FSB and GRU, and hack into networks and databases in support of Russian security objectives.”
Many seemingly independent “patriotic hackers” operate on Russia’s behalf. Most notably, they attacked critical systems in Estonia in 2007 over the relocation of a Soviet-era memorial, Georgia in 2008 during the Russo-Georgian War and Ukraine in 2014 in connection with the conflict between the two countries.
At the very least, the Russian government condones, even encourages, these hackers. After some of the Estonian attacks were traced back to Russia, Moscow turned down Estonia’s request for help – even as a commissar in Russia’s pro-Kremlin youth movement Nashi admitted launching some of the attacks.
And when Slavic Union hackers successfully attacked Israeli websites in 2006, Deputy Duma Director Nikolai Kuryanovich gave the group a certificate of appreciation. He noted that “a small force of hackers is stronger than the multi-thousand force of the current armed forces.”
While some patriotic hackers may indeed operate independently of Moscow, others seem to have strong ties. Cyber Berkut, one of the groups that conducted cyberattacks against Ukraine, including its central election site, is said to be a front for Russian state-sponsored cyberactivity.
And Russia’s espionage group APT28 is said to have operated under the guise of the ISIS-associated CyberCaliphate while attacking the French station TV5 Monde and taking over the Twitter account of US Central Command.
One of many cyberthreats
Although Russia poses a major cyberthreat, it is not the only country that threatens the US in cyberspace. China, Iran and North Korea are also countries with strong cyberattack capabilities, and more countries will join the pool as they develop their people’s skills.
The good news is that actions to protect an organisation’s cybersecurity (such as monitoring access to sensitive files) that work against Russia also work against other threat actors.
The bad news is that many organisations do not take those steps. Further, hackers find new vulnerabilities in devices and exploit the weakest link of all – humans. Whether cyberdefenses will evolve to avert a major calamity, from Russia or anywhere else, remains to be seen.
Dorothy Denning, emeritus distinguished professor of Defense Analysis at the Naval Postgraduate School, California.
This article is republished from The Conversation under a Creative Commons license. Read the original article.
Sign up for Today's Best Articles in your inbox
A free daily email with the biggest news stories of the day – and the best features from TheWeek.com
-
The truth behind China’s ‘world-leading’ scientific research
feature Country’s rapid rise in number of cited studies threatens to ‘shift the global balance of power’
By Arion McNicoll Published
-
Pro-Russian hackers say they're behind cyberattacks on U.S. airports
Speed Read
By Theara Coleman Published
-
RAF on mission to vaccinate entire Ascension Island in one swoop
Why Everyone’s Talking About Aircraft failure almost derailed the ambitious jab campaign
By Chas Newkey-Burden Published
-
What Boris Johnson has planned for his £16bn military spending spree
Speed Read Space defence, cyber-offence and artificial intelligence to benefit from funding surge
By Holden Frith Published
-
Coronavirus: GCHQ launches war against Russian anti-vaccine propaganda
Speed Read State-sponsored disinformation campaigns are being blocked and agents locked out of their accounts
By Holden Frith Last updated
-
The Week Unwrapped podcast: Sovereign citizens, troops and suits
In Depth Could we all opt out of the legal system? Why does Germany want to keep its US troops? And why are we all giving up on the suit?
By The Week Staff Published
-
Beijing-linked hackers ‘tried to steal’ coronavirus vaccine data
Speed Read US charges two men accused of targeting drug companies during global cybertheft campaign
By Joe Evans Last updated
-
‘Little doubt’ UK will face life-threatening cyberattack
Speed Read National Cyber Security Centre thwarting upwards of ten attempted breaches every week
By The Week Staff Last updated