US reexamines cybersecurity after Russian hack

Russian hackers attacked at least 87 people working on advanced US defense technology including drones and rockets, according to an Associated Press investigation. The hackers, identified by the moniker 'Fancy Bear,' largely targeted personal Gmail accounts.

|
Marina Lopicic/Kurir/AP/File
Russian Deputy Prime Minister Dmitry Rogozin holds a press conference on Jan. 11, 2016 in Belgrade, Serbia. In May 2015, Mr. Rogozin said that Russia's space program was falling behind the US. Soon after, hackers tried to penetrate the Gmail account of a space engineer at Boeing.

Russian hackers exploited a key vulnerability in United States cyber defenses to come within reach of stealing some of the nation's most secret and advanced defense technology, an Associated Press investigation has found.

What may have been stolen is uncertain, but the cyberspies clearly took advantage of poorly protected email and scant direct notification of victims.

The hackers known as Fancy Bear, who also intruded in the US election, went after at least 87 people working on military drones, missiles, rockets, stealth fighter jets, cloud-computing platforms, or other sensitive activities, the AP found. Thirty-one agreed to interviews.

Employees at both small companies and defense giants like Lockheed Martin Corp., Raytheon Co., Boeing Co., Airbus Group, and General Atomics were targeted. Contacted by the AP, those companies offered no comment.

"The programs that they appear to target and the people who work on those programs are some of the most forward-leaning, advanced technologies," said Charles Sowell, a former senior adviser in the Office of the US Director of National Intelligence, who reviewed the list of names for the AP. "And if those programs are compromised in any way, then our competitive advantage and our defense is compromised."

"That's what's really scary," added Mr. Sowell, who was himself one of the hacking targets.

The AP identified Fancy Bear's prey from about 19,000 lines of the hackers' email phishing data collected by the US-based cybersecurity company Secureworks, which calls the hackers Iron Twilight. The data is partial and extends from March 2015 to May 2016.

Most of the people on the target list worked on classified projects. Yet as many as 40 percent clicked on the hackers' phishing links, the AP analysis indicates. That's the first step in potentially opening their accounts or computer files to digital theft.

Hackers predominantly targeted personal Gmail, with a few corporate accounts mixed in. Personal accounts can convey classified information – whether through carelessness or expediency – and lead to more valuable targets or carry embarrassing personal details that can be used for blackmail or to recruit spies.

Among their interests, the Russians seemed to be eyeing the X-37B, an American unmanned space plane that looks like a miniature shuttle.

Referring to an X-37B flight in May 2015, Russian Deputy Prime Minister Dmitry Rogozin invoked it as evidence that his country's space program was faltering. "The United States is pushing ahead," he warned Russian lawmakers.

Less than two weeks later, Fancy Bear tried to penetrate the Gmail account of a senior engineer on the X-37B project at Boeing.

The hackers also chased people who work on cloud-based services, the off-site computer networks that enable collaborators to work with data that is sometimes classified. For example, the cyberspies tried to get into the Gmail of an employee at Mellanox Federal Systems, which helps the government with high-speed storage networks, data analysis, and cloud computing. Its clients include the FBI and other intelligence agencies.

Yet of the 31 targets reached by AP, just one got any warning from US officials.

The FBI declined to give on-the-record details of its response to this Russian operation. Agency spokeswoman Jillian Stickels said the FBI does sometimes notify individual targets. "The FBI takes ... all potential threats to public and private sector systems very seriously," she said in an email.

However, three people familiar with the matter – including a current and a former government official – previously told the AP the FBI knew the details of Fancy Bear's phishing campaign for more than a year.

Pressed about notification in that case, a senior FBI official, who was not authorized to publicly discuss the hacking operation because of its sensitivity, said the bureau was overwhelmed by the sheer number of attempted hacks. "It's a matter of triaging to the best of our ability the volume of the targets who are out there," he said.

A Pentagon spokeswoman, Heather Babb, said the department recognizes the evolving cyber threat and continues to update training and technology for military, civilian, and contract personnel. But she declined to comment on this hacking operation.

The Defense Security Service, which protects classified US technology, focuses on safeguarding corporate computer networks.

"We simply have no insight into or oversight of anyone's personal email accounts or how they are protected or notified when something is amiss," spokeswoman Cynthia McGovern said in an email.

This story was reported by The Associated Press.

You've read  of  free articles. Subscribe to continue.
Real news can be honest, hopeful, credible, constructive.
What is the Monitor difference? Tackling the tough headlines – with humanity. Listening to sources – with respect. Seeing the story that others are missing by reporting what so often gets overlooked: the values that connect us. That’s Monitor reporting – news that changes how you see the world.

Dear Reader,

About a year ago, I happened upon this statement about the Monitor in the Harvard Business Review – under the charming heading of “do things that don’t interest you”:

“Many things that end up” being meaningful, writes social scientist Joseph Grenny, “have come from conference workshops, articles, or online videos that began as a chore and ended with an insight. My work in Kenya, for example, was heavily influenced by a Christian Science Monitor article I had forced myself to read 10 years earlier. Sometimes, we call things ‘boring’ simply because they lie outside the box we are currently in.”

If you were to come up with a punchline to a joke about the Monitor, that would probably be it. We’re seen as being global, fair, insightful, and perhaps a bit too earnest. We’re the bran muffin of journalism.

But you know what? We change lives. And I’m going to argue that we change lives precisely because we force open that too-small box that most human beings think they live in.

The Monitor is a peculiar little publication that’s hard for the world to figure out. We’re run by a church, but we’re not only for church members and we’re not about converting people. We’re known as being fair even as the world becomes as polarized as at any time since the newspaper’s founding in 1908.

We have a mission beyond circulation, we want to bridge divides. We’re about kicking down the door of thought everywhere and saying, “You are bigger and more capable than you realize. And we can prove it.”

If you’re looking for bran muffin journalism, you can subscribe to the Monitor for $15. You’ll get the Monitor Weekly magazine, the Monitor Daily email, and unlimited access to CSMonitor.com.

QR Code to US reexamines cybersecurity after Russian hack
Read this article in
https://www.csmonitor.com/USA/Military/2018/0207/US-reexamines-cybersecurity-after-Russian-hack
QR Code to Subscription page
Start your subscription today
https://www.csmonitor.com/subscribe