缅北强奸

Citizen Lab reveals cyber espionage, disinformation campaign with Russian connections

Citizen Lab discovers a massive cyber espionage campaign with more than 200 targets in 39 countries, pointing to Russia (photo by Krystian Dobuszynski/NurPhoto via Getty Images)

缅北强奸's Citizen Lab has uncovered an extensive disinformation and cyber espionage campaign with Russian ties, targeting high-profile individuals around the world. Researchers say they also found similarities to phishing links targeting the 2016 U.S. presidential election and the 2017 French presidential election.

The campaign targets at least 218 individuals, including a former Russian prime minister, ambassadors, members of cabinets from Europe, journalists, CEOs of energy companies and activists from at least 39 countries, as well as the United Nations and NATO. It plants false information within 鈥渓eaks鈥 of stolen official documents. 

鈥淲e do not conclusively attribute the technical elements of this campaign to a particular sponsor, but there are numerous elements in common between the campaign we analyzed and that which has been publicly reported by industry groups as belonging to threat actors affiliated with Russia,鈥 the report states.  

Citizen Lab鈥檚 investigation began with a single targeted phishing operation against American journalist David Satter, whose personal information was stolen, laced with false information and then published in a tainted leaks campaign on a Russian-linked website, named CyberBerkut. Satter, who is known for his book Darkness at Dawn, has written extensively about the rise to power of Russian President Vladimir Putin. 

The tainted leaks plant fake information in between largely accurate information 鈥渋n an attempt to make them credible by association with genuine, stolen documents,鈥 says John Scott-Railton, a senior researcher at Citizen Lab, located at the Munk School of Global Affairs. 

Citizen Lab researchers were able to determine that Satter鈥檚 targeting was part of a larger campaign. In 2015, the Open Society Foundations (OSF) had also experienced a breach of confidential data, and materials from the breach then turned up on CyberBerkut and another leak-branded site. The tainted leaks were all designed to discredit prominent critics of the Russian government and falsely indicated that they received foreign funding.

鈥淭he motivations behind Russian cyber espionage are as much about securing Putin鈥檚 kleptocracy as they are geopolitical competition,鈥 says Ron Deibert, director of the Citizen Lab. 鈥淭his means journalists, activists and opposition figures 鈥 both domestically and abroad 鈥 bear a disproportionate burden of their targeting.鈥 

Researchers also found similarities in domain naming and subdomain structures between the campaign and phishing operations linked to a 鈥渢hreat actor routinely associated with the Russian government.鈥

In France's recent presidential election, tainted leaks appear to have been used in an attempt to discredit Emmanuel Macron. Citizen Lab researchers cite earlier reports indicating that the same threat actor showed up with those leaks. And the link used to phish the emails of John Podesta, the former chairman of the 2016 Hillary Clinton presidential campaign, also shares 鈥渢he distinct naming and subdomain similarities with domains linked to the phishing operation against Satter.鈥 

鈥淲e identify marked similarities to a collection of phishing links now attributed to one of the most publicly visible information operations in recent history: the targeting of the 2016 US Presidential Campaign,鈥 the report states. 鈥淭he phishing URLs in this campaign were encoded with a distinct set of parameters....an identical approach to parameters and encoding has been seen before: in the March 2016 phishing campaign that targeted Hillary Clinton鈥檚 presidential campaign and the Democratic National Committee. This similarity suggests possible code re-use: the two operations may be using the same phishing 鈥榢it.鈥欌

While the researchers do not conclusively link the campaign to a particular Russian government entity, they found many elements of the campaign overlap with previous phishing targets.

鈥淭he targets we found are connected to, or have access to, information concerning issues in which the Russian government has a demonstrated interest. These issues range from investigations of individuals close to the Russian president, to the Ukraine, NATO, foreign think tanks working on Russia and the Crimea, grantmakers supporting human rights and free expression in Russia, and the energy sector in the Caucasus,鈥 the report states.   

鈥淐onsidering this primary Russian focus, as well as the technical evidence pointing to overlaps and stylistic similarities with groups attributed to the Russian government, we believe there is strong circumstantial 鈥 but not conclusive 鈥 evidence for Russian government sponsorship of the phishing campaign, and the tainted leaks.鈥

Topics

The Bulletin Brief logo

Subscribe to The Bulletin Brief

Munk