- Boys’ sleepovers vs. girls’ sleepovers meme takes stereotypes to absurd heights Tuesday 7:30 PM
- Petition wants Keanu Reeves to be named ‘Time Person of the Year’ Tuesday 6:33 PM
- 8 women accuse Max Landis of sexual, emotional abuse Tuesday 5:37 PM
- Taylor Swift accused of copying Beyoncé—again Tuesday 5:00 PM
- Everything you need to know about Libra, Facebook’s new cryptocurrency Tuesday 4:45 PM
- Netflix just renewed ‘Queer Eye’ for 2 more seasons Tuesday 4:32 PM
- YouTube’s queen of failed robots just unveiled a one-of-a-kind Tesla truck Tuesday 3:58 PM
- AOC infuriates conservatives with ‘concentration camps’ remark Tuesday 3:33 PM
- TikTok users explore identity with Lin Manuel Miranda-inspired meme Tuesday 3:24 PM
- TikTok apology video inspires new duet meme Tuesday 2:51 PM
- Man sues brewery after identifying as female to get beer discount Tuesday 2:31 PM
- Here’s what’s coming and going on Hulu in July 2019 Tuesday 2:22 PM
- This biotech company’s logo is almost straight out of Resident Evil Tuesday 1:26 PM
- Trump says mass deportations to start next week Tuesday 12:28 PM
- GOP pollster bothered by broken elevator in Austria blames socialism Tuesday 10:50 AM
Cybersecurity firm ‘highly confident’ Russian military hacked DNC based on new evidence
The malware has been traced to previous attacks in Ukraine.
CrowdStrike, a California-based cybersecurity firm, now says it is confident that the group who hacked the Democratic National Committee this summer has direct ties to the Kremlin.
The firm was hired by the Democratic Party this summer to investigate an attack that exposed thousands of embarrassing emails, through WikiLeaks and other online outlets, which raised ethical questions about how the party was overseeing its presidential primary election.
Prior to its nominating convention, party leaders were pelted with accusations that the DNC had worked to undermine the campaign of Sen. Bernie Sanders (D-Vt). Ultimately, the scandal led the DNC’s chair, Rep. Debbie Wasserman Schultz (D-Fla.), to resign.
CrowdStrike now claims to have nearly incontrovertible proof that the malware used in the DNC intrusion also helped the attackers break into an Android app used by the Ukrainian field artillery units from late 2014 through 2016.
The malware is said to have been spread by way of Ukrainian military forums “within a legitimate Android application developed by Ukrainian artillery officer Yaroslav Sherstuk.” The purpose of the Sherstuk’s app was to help artillery forces “more rapidly process targeting data for the Soviet-era D-30 Howitzer” used by the Ukrainian forces. More than 9,000 artillery personnel are reported to use the application, according to CrowdStrike, citing press reports.
CrowdStrike co-founder Dmitri Alperovitch told the Washington Post that the firm now has “high confidence” that the unit responsible for hacking the DNC works for the GRU, Russia’s military intelligence service. The hacking group responsible CrowdStrike has dubbed “Fancy Bear.”
Attribution with regards to cyberattacks is difficult and often problematic.
Cybersecurity expert Jeffrey Carr, the founder of Taia Global, raised concerns this summer about the process of attributing the attack to Moscow based solely on the origin of the malware involved.
Of course, malware can be stolen; it can be re-packaged and sold on the black market; and it can be used as well to throw off investigators.
“In the physical world of crime investigation,” Carr wrote, “common sense dictates that the perpetrator of a crime may use any weapon and not just one made in the country of his birth, and that the developer or manufacturer of the weapon most likely isn’t the criminal. And yet, those seemingly crazy assumptions are made every day by cybersecurity companies involved in incident response and threat intelligence.”
“The malware was written in Russian? It was a Russian who attacked you,” continued Carr, sardonically. “Chinese characters in the code? You’ve been hacked by the Peoples Liberation Army.”
Dell Cameron was a reporter at the Daily Dot who covered security and politics. In 2015, he revealed the existence of an American hacker on the U.S. government's terrorist watchlist. He is a co-author of the Sabu Files, an award-nominated investigation into the FBI's use of cyber-informants. He became a staff writer at Gizmodo in 2017.