A Transient Historical past of Russian Hackers’ Evolving False Flags



Deception has at all times been a part of the hacker playbook. But it surely’s one factor for intruders to cover their tracks, and one other to undertake an invented id, and even body one other nation for a cyberattack. Russia’s hackers have carried out the entire above, and now have gone one step additional. In a sequence of espionage circumstances, they hijacked one other nation’s hacking infrastructure and used it to spy on victims and ship malware.

On Monday, the NSA and Britain’s GCHQ published warnings {that a} Russian hacker group referred to as Turla or Waterbug has for years carried out a convoluted new type of espionage: It took over the servers of an Iranian hacker group, referred to as OilRig, and used them to advance Russia’s goals.

Whereas Symantec and different cybersecurity companies had noticed Turla’s piggybacking earlier this 12 months, the US and UK intelligence businesses have now outlined the operation’s sheer scale. The Russian group spied on victims in 35 nations, all of whom might need believed on first inspection that the intruders have been as a substitute Iranian. “We wish to ship a transparent message that even when cyber actors search to masks their id, our capabilities will in the end establish them,” based on the assertion from Paul Chichester, the NCSC’s director of operations.

However whereas Turla was in the end unmasked, the operation provides a brand new dimension of uncertainty for digital investigators. Extra broadly, it exhibits the fast-evolving nature of how hackers disguise behind false flags. Only a few years in the past they have been carrying clumsy masks; now they will virtually put on one other group’s id as a second pores and skin. And whereas different nations have dabbled within the follow—North Korea famously hacked Sony Photos beneath the moniker “Guardians of Peace”—nobody has pushed that progress greater than the Russians.

“Their aggressive cyberactivity sits on a basis of considerable expertise in energetic measures,” says John Hultquist, director of intelligence evaluation at menace intelligence agency FireEye. “There isn’t any query that they’re on the bleeding fringe of the issue.”

Hactivist Impersonators

Beginning as early as 2014, Russian hackers have chosen from a proverbial seize bag of disguises to create a layer of confusion. In Might of that 12 months, as an illustration, a gaggle calling itself Cyber Berkut hacked Ukraine’s Central Election Fee within the midst of the nation’s post-revolution election. “Berkut” is Ukrainian for “eagle,” and in addition the title of a police pressure that supported the pro-Russian regime within the revolution and killed greater than 100 protestors. The Cyber Berkut hackers posted a political message to the fee’s web site beneath the guise of activists accusing the Ukrainian authorities of corruption. They later planted a picture on the fee’s net server that confirmed pretend voting outcomes on election day, placing the ultra-far-right candidate Dmytro Yarosh within the lead.

Although the fee managed to find and delete the picture earlier than the voting outcomes have been launched, Russian media ran with the pretend tally nonetheless, hinting at collaboration between the hackers, Russian TV networks, and the Kremlin. Cyber Berkut was later revealed to be a entrance for the Russian navy intelligence hacker group referred to as APT28 or Fancy Bear.

Over the next years, the GRU would repeat these false flag “hacktivist” assaults repeatedly. Hackers calling themselves Cyber Caliphate hit the French television station TV5Monde in 2015, destroying the station’s computer systems and posting a jihadi message on its web site. The misdirection result in fast hypothesis that ISIS had perpetrated the assault, earlier than the French intelligence company ANSSI pinned it on the GRU. And in 2016, safety agency CrowdStrike recognized the GRU because the spy company behind US-targeted false flag operation, this time the hacking of the Democratic Nationwide Committee and later Hillary Clinton’s presidential marketing campaign. The Fancy Bear hackers accountable had hidden behind fronts like a Romanian hacktivist named Guccifer 2.0, and a whistle-blowing web site referred to as DCLeaks that distributed the stolen paperwork.

Ransomware Fakes

By the top of 2016, GRU hackers started to shift their ways. In December of that 12 months, analysts on the Slovakian cybersecurity agency ESET famous that the GRU hackers they referred to as Telebots, often known as Voodoo Bear or Sandworm, used each hacktivist and cybercriminal fronts of their data-destructive assaults on Ukrainian networks. In some circumstances, they discovered that wiped computer systems displayed a message that stated “WE ARE FSOCIETY, JOIN US,” in a reference to anarchic hacktivists from the tv present Mr. Robotic. However in different incidents across the similar time, ESET discovered the hackers demanded a bitcoin ransomware fee.


Like it? Share with your friends!

0 Comments

Your email address will not be published. Required fields are marked *

Send this to a friend