- ‘BoJack Horseman’ hints at a brutal reckoning in its final season 3 Years Ago
- How to stream Barcelona vs. Slavia Praha in the Champions League Today 2:00 AM
- How to stream Chelsea vs. Ajax in the Champions League Today 1:00 AM
- People are using #WheresLindsey to criticize Graham over Trump ‘lynching’ defense Tuesday 8:22 PM
- 2 Proud Boys sentenced to 4 years in prison for attacking antifa protesters Tuesday 7:20 PM
- Paul Joseph Watson is very upset by bartender serving beer with her butt Tuesday 6:24 PM
- Twitter developing a policy to combat deepfakes Tuesday 5:28 PM
- The Nate Diaz vs. Jorge Masvidal bout at UFC 244 is perfect for NYC and its fight mecca Tuesday 5:27 PM
- Alexis Bledel named most dangerous online celebrity Tuesday 5:02 PM
- Kylie Jenner trademarks ‘rise and shine’ after meme success Tuesday 4:50 PM
- ‘Watchmen’ website expands what you know about its alt-history Tuesday 4:31 PM
- Smoke ’em, pass ’em Week 8: Mark Walton szn Tuesday 4:26 PM
- Venmo’s first-ever credit card to launch in 2020 Tuesday 3:46 PM
- Wet Kylo Ren may turn everyone to the dark side Tuesday 3:15 PM
- Man allegedly targeted trans women on dating app, robbed them at knifepoint Tuesday 3:02 PM
CrowdStrike, a California-based cybersecurity firm, now says it is confident that the group who hacked the Democratic National Committee this summer has direct ties to the Kremlin.
The firm was hired by the Democratic Party this summer to investigate an attack that exposed thousands of embarrassing emails, through WikiLeaks and other online outlets, which raised ethical questions about how the party was overseeing its presidential primary election.
Prior to its nominating convention, party leaders were pelted with accusations that the DNC had worked to undermine the campaign of Sen. Bernie Sanders (D-Vt). Ultimately, the scandal led the DNC’s chair, Rep. Debbie Wasserman Schultz (D-Fla.), to resign.
CrowdStrike now claims to have nearly incontrovertible proof that the malware used in the DNC intrusion also helped the attackers break into an Android app used by the Ukrainian field artillery units from late 2014 through 2016.
The malware is said to have been spread by way of Ukrainian military forums “within a legitimate Android application developed by Ukrainian artillery officer Yaroslav Sherstuk.” The purpose of the Sherstuk’s app was to help artillery forces “more rapidly process targeting data for the Soviet-era D-30 Howitzer” used by the Ukrainian forces. More than 9,000 artillery personnel are reported to use the application, according to CrowdStrike, citing press reports.
CrowdStrike co-founder Dmitri Alperovitch told the Washington Post that the firm now has “high confidence” that the unit responsible for hacking the DNC works for the GRU, Russia’s military intelligence service. The hacking group responsible CrowdStrike has dubbed “Fancy Bear.”
Attribution with regards to cyberattacks is difficult and often problematic.
Cybersecurity expert Jeffrey Carr, the founder of Taia Global, raised concerns this summer about the process of attributing the attack to Moscow based solely on the origin of the malware involved.
Of course, malware can be stolen; it can be re-packaged and sold on the black market; and it can be used as well to throw off investigators.
“In the physical world of crime investigation,” Carr wrote, “common sense dictates that the perpetrator of a crime may use any weapon and not just one made in the country of his birth, and that the developer or manufacturer of the weapon most likely isn’t the criminal. And yet, those seemingly crazy assumptions are made every day by cybersecurity companies involved in incident response and threat intelligence.”
“The malware was written in Russian? It was a Russian who attacked you,” continued Carr, sardonically. “Chinese characters in the code? You’ve been hacked by the Peoples Liberation Army.”
Dell Cameron was a reporter at the Daily Dot who covered security and politics. In 2015, he revealed the existence of an American hacker on the U.S. government's terrorist watchlist. He is a co-author of the Sabu Files, an award-nominated investigation into the FBI's use of cyber-informants. He became a staff writer at Gizmodo in 2017.