For Russian journalists fighting hacks is part of the job

When news emerged that Kremlin-linked hackers attempted to breach The New York Times Moscow bureau, it probably didn't surprise any journalists working in Russia.

In fact, press freedom advocates say the Russian government constantly monitors independent journalists and aggressively attacks or shuts down controversial news sites.

"The Russian surveillance system is absolutely extensive," says Johann Bihr, who heads up the Eastern Europe and Central Asia desk for press advocacy group Reporters Without Borders. "The [Federal Security Service] has access to the servers of each and every internet server provider at the regional level, so it's quite easy for them to intercept any communication."

Recently, CNN reported that US officials were investigating attacks on Times reporters believed to be carried out by Russian hackers. But the Times subsequently said no systems were breached and it hadn't hired an outside security firm to investigate the incident, contrary to CNN’s report.

The Times' account lead some experts to suggest the apparent attack may have been a failed fraudulent email campaign aimed at the newspaper's office.

While Mr. Bihr said he would not be surprised if Russian spies targeted major US media outlets, he said Russia’s Federal Security Service (known as the FSB) typically takes aim at homegrown journalists.

"Usually [the FSB] is focusing their efforts on outlets that are digging into sensitive stories, such as what RBC were doing,” Bihr said, referring to Russia's largest independent media organization.

After RBC covered corruption allegations linked to President Vladimir Putin’s son-in-law in the Panama Papers leak, Russian authorities searched the offices of RBC's owner and began a criminal investigation examining the company's chief executive.

According to the World Press Freedom Index 2016 by Reporters Without Borders, Russia ranks 148 out of 180 countries. "The climate has become very oppressive for those who question the new patriotic and neoconservative discourse or just try to maintain quality journalism,” the report stated.

While hacking the email accounts of journalists may not be an everyday occurrence, many experts believe the FSB has access to all the communications data stored in Russia, which means gaining access to the emails of most journalists in Russia may be a trivial matter.

The FSB does run into roadblocks when western tech companies don't store data inside Russia. The Russian government is seeking to put pressure on Google and other tech giants such as Facebook and Twitter to store data within its borders, and while Google is believed to have moved some databases to Russian servers, most data remains outside of the government’s purview.

But the Kremlin also has many non-tech tools to clamp down on journalists.

Once a blog has more than 3,000 daily readers, the writes must register with the mass media regulator, Roskomnadzor, and abide by regulations that have been labeled "draconian" by Human Rights Watch.

Distributed denial of service (DDoS) attacks against independent publications that can render websites or blogs inaccessible for hours are also frequently linked to the Kremlin. These attacks typically take place during a major event such as a protest or election, and can serve to silence opposition voices.

Some hacktivist groups are beginning to fight back. The online collective Anonymous International recently hacked into the email accounts of journalists at the pro-government publication Life Media, revealing details of how government-funded operations work.

Many press and privacy organizations are also working to train journalists working in Moscow and elsewhere how to protect themselves from hackers.

“There is increased awareness of the risk of surveillance and increased awareness of the circumvention tools,” said Bihr of Reporters Without Borders. "Several NGOs and associations exist in Russia promoting these tools, but still I would say the general level of awareness is not huge."

CSMonitor

 

 

« Russian Cyber Spies & Hackers Are The New Normal
French Submarine Builder Admits Data-Warfare Breach »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Opengear

Opengear

Opengear ensures network resilience to enterprises by enabling business continuity with the Network Resilience Platform.

Zurich

Zurich

Zurich is a leading multi-line insurer providing a wide range of property and casualty, and life insurance products and services in more than 210 countries and territories.

Magic Software Enterprises

Magic Software Enterprises

Magic provide Mobile Device Management (MDM) for Secure Enterprise Mobility. Magic MDM overcomes the challenges of mobile device management security by protecting all of your devices, data and content

SonicWall

SonicWall

SonicWall provide products for network security, access security, email security & encryption.

Center for Cyber Safety and Education

Center for Cyber Safety and Education

The Center for Cyber Safety and Education works to ensure that people across the globe have a positive and safe experience online through our educational programs, scholarships, and research.

ATIA

ATIA

ATIA provides consulting services in the design and implementation of IT system, Information Security, ISO certification, and professional IT training and education.

Meterian

Meterian

The Meterian Platform is a fuss-free solution to protect you against vulnerabilities in your app’s software supply chain.

Industrial Defender

Industrial Defender

Committed to ICS Cybersecurity. Industrial Defender provides a fully automated solution to discover, track and report on assets across your ICS footprint.

WhiteHawk

WhiteHawk

WhiteHawk is the first online Cyber Security Exchange. We help you understand your cyber risk and match you to tailored and affordable solutions.

Kontron

Kontron

Kontron offers a combined portfolio of secure hardware, middleware and services for Internet of Things (IoT) and Industry 4.0 applications.

Cyber Protection Group (CPG)

Cyber Protection Group (CPG)

Cyber protection Group specialize in Penetration Testing. We work with enterprise level companies as well as small to medium sized businesses.

TachTech

TachTech

TachTech is passionate about trust, security and privacy in the digital world. We create tailored security and compliance solutions to improve your business.

EPAM Systems

EPAM Systems

Since 1993, EPAM Systems has leveraged its advanced software engineering heritage to become a leading global digital transformation services provider.

5S Technologies

5S Technologies

5S Technologies is a regional IT solutions and services provider based in Cary, NC and serving the Carolinas.

Vorlon

Vorlon

Vorlon's agentless patent-pending solution facilitates risk profiling of apps, and provides AI-driven behavioral analytics with response recommendations.

ThreatView by Turaco Labs

ThreatView by Turaco Labs

ThreatView combines extensive experience in digital forensics with advanced analytics and threat detection capabilities to protect eCommerce websites.