Just Who Are Russia's Cyber Warriors?

Western intelligence services and cyber security firms say they have identified two particular groups involved in the hack of the Democratic National Committee (DNC) that led to a series of embarrassing emails being leaked to the public ahead of the US presidential election.

The first group, known as APT 29, “Cozy Bear,” or “The Dukes,” penetrated the DNC in July 2015. It is believed to be linked to the FSB, the main successor agency to the KGB, the Soviet Union's sprawling intelligence outfit.

The second, which security experts call APT 28, or “Fancy Bear,” hacked in March 2016. Crowdstrike, the security firm hired by the DNC to investigate the hack, concluded it was linked to the Main Intelligence Directorate (GRU), the Russian ministry of defence's intelligence agency.

APT stands for Advanced Persistent Threat, a term cyber security experts use, to refer to known networks of hackers. Cozy and Fancy Bear are not the only ones linked to national governments. APT-1, for example, is believed to be a Chinese government operation.

How do they work?

Both Cozy Bear and Fancy Bear gained access to computers through a technique called “spear phishing,” where attackers use carefully tailored fake emails and websites to trick target individuals into uploading malware onto their computer systems.

But thinking of them as glorified bank scammers would be a big mistake, says Thomas Rid, the author of Rise of the Machines and an expert on espionage at King's College London.

In the DNC hacks, the emails they used were so carefully targeted and convincing that they achieved a success rate of one in seven emails.

“That’s not one in seven people who opened the email or clicked a link, that’s one in seven who actually typed in their passwords, a phenomenal success rate,” said Mr Rid. “It’s extremely sophisticated. Don’t think they wouldn’t fool you.”

So now Russia has divisions of nerds as well as tanks?

No one knows. The German intelligence services have estimated that Russia’s three main intelligence outfits, the FSB, GRU, and SVR (the foreign intelligence service, roughly Russia’s MI6), have up to 4,000 cyber agents. That's not an outlandish number, the United States said in 2014 it would seek to hire 6,000 such staff.

Between them they have targeted foreign political parties, the German parliament, defence companies, and media organisations.

But that doesn’t mean there are thousands of nerds wearing shoulder-board epaulettes. Much more likely, says Andrei Soldatov, co-author of The Red Web, is the use of “informal actors”, activists, criminal groups, and possibly even legitimate cyber tech firms, who are curated by and act for the state, but hold no formal rank or position.

Outsourcing is a tactic Russia has used elsewhere to create plausible deniability and lower the costs and risks of controversial overseas operations.

When Russian troops moved into Crimea and east Ukraine in 2014, they were preceded by nationalist activists who insist they were acting independently.

It also makes it difficult to build an accurate picture of the Russian cyber warfare programme. Given the information publicly available, says Mr Soldatov, it is difficult to see how intelligence agencies are so sure Fancy Bear is definitely the GRU, for example.

What about Mr Putin?

Dmitry Peskov, Vladimir Putin's spokesman, says US officials should "either stop talking about it or finally produce some evidence, otherwise it all begins to look unseemly."

However, it is generally believed that sophisticated cyber operations go up to the Kremlin, and strategic direction and final sign off on large scale operations like the one that targeted the DNC almost certainly sits with Mr Putin or one of his close advisors.

But most experts believe the Russian cyber programme is too big to be micro-managed by one man.

In fact, rival agencies appear to be running rival programmes, and they may not always be coordinating with one another.

APT 29, “Cozy Bear”, supposedly linked the FSB, for example, displayed a stealthy, low-profile modus operandi that you might associate with a civilian spy agency looking to gather intelligence.

They weren’t caught until APT 28, their presumably military colleagues, blundered in and set alarm bells ringing.

How does America fight back?

Barack Obama has promised to respond, but a tit-for-tat retaliation presents obvious risks.

For a start, it is not difficult to image how a war in cyberspace could spill into a war in the real world, said General Lord Richards, a former chief of the defence staff.

"You never really, quite know, where it's going to end up. Are they going to start having a go at our financial system, electricity?” he said on the BBC’s Today programme.

“You have got to be very, very careful and that is why he has been rather cagey, I think, in choosing his words the way he has," Lord Richards added.

And leaking politically compromising information related to the Russian government probably would not be as politically damaging to Vladimir Putin as it was to Hillary Clinton.

That’s partly because the Kremlin maintains a near monopoly on the Russian media landscape, and partly because many Russians have few illusions about their politicians.  

The Panama Papers, which revealed one of Mr Putin’s close friends had been handling suspiciously large sums of money, was largely greeted with a collective shrug, but also with the suspicion that it was a CIA operation trying to discredit the country’s leadership.
 
If anything, a mirror image response from Washington would confirm those suspicions, reinforcing the perception of Mr Putin is a strong leader defending the country against an aggressive US.

Telegraph

You Might Also Read:

Handbook Of Russian Information Warfare:

Bank Attack Hackers Use Russian Decoys:

Russian Military Was Behind Hacking Clinton Campaign:

Meet The Fancy Bears:

 

 

« What Happens If Criminals & Terrorists Get To Use AI
Rapid Detection Is Key To Cyber Attacks On Business »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

FT Cyber Resilience Summit: Europe

FT Cyber Resilience Summit: Europe

27 November 2024 | In-Person & Digital | 22 Bishopsgate, London. Business leaders, Innovators & Experts address evolving cybersecurity risks.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

TBG Security

TBG Security

TBG provides a portfolio of services including cyber security, compliance and continuity solutions.

Tanium

Tanium

Tanium is an endpoint security and systems management company.

Superscript

Superscript

Superscript (formerly Digital Risks) is an insurance broker for small businesses, sole-traders, landlords and high-growth tech firms. Our services include Cyber Liability insurance.

Konfidas

Konfidas

Konfidas provide high-level cybersecurity consulting and professional tailored solutions to meet specific cybersecurity operational needs.

Leibniz-Rechenzentrum (LRZ)

Leibniz-Rechenzentrum (LRZ)

The LRZ supports ground-breaking research and teaching in a wide range of scientific disciplines including information security and data protection.

Verlingue

Verlingue

Verlingue (formerly ICB Group) is a leading corporate insurance broker providing Insurance, Risk Management and related advice to businesses and private clients.

Array Networks

Array Networks

Array Networks, the network functions platform company, develops purpose-built systems for hosting virtual networking and security functions with guaranteed performance.

Eseye

Eseye

Eseye is a global specialist supplier of cellular internet connectivity for intelligent IoT (Internet of Things) devices.

CryptoMill Cybersecurity Solutions

CryptoMill Cybersecurity Solutions

CryptoMill Cybersecurity Solutions provides advanced, innovative data security solutions for enterprises, professionals and individuals.

Soliton

Soliton

Soliton is a leading Japanese technology company and a pioneer in IT security solutions for protecting company resources and data from external IT security threats.

Trustify

Trustify

Trustify is a Managed Security Service Provider offering a suite of world-class Cyber Risk Management services.

Eureka Technology Partners

Eureka Technology Partners

Eureka Technology Partners are committed to helping you focus on your business by taking care of your IT infrastructure and data security needs.

Prime Technology Services

Prime Technology Services

Prime Tech are a group of Red Hat, Microsoft & Cisco Certified IT Professionals with an impressive track record of consistently delivering value to our corporate clients.

Purple Team

Purple Team

Purple Team is an expert cybersecurity and managed security service provider focused on arming your IT infrastructure with both red team and blue team services.

Intraframe US

Intraframe US

Intraframe US is a cybersecurity company in Memphis, specializing in Digital Forensics Incident Response and Managed IT services. We provide SMBs with a 24/7 SOC for proactive Cyber Threat Management.

CyberSG TIG Centre

CyberSG TIG Centre

CyberSG TIG Centre aims to propel Singapore as the world’s premier cybersecurity innovation hub for economic growth.