Breaking News

Russian hackers targeted Ukrainian company

Energy company Burisma was at the centre of attempts by President Trump last July to pressure Ukrainian authorities into announcing an investigation into the Bidens. Area 1 Security identified the hacking of Burisma and linked it to Russia’s Main Directorate of Military Intelligence

Russian military hackers tried to steal emails from the Ukrainian energy firm where Hunter Biden, the son of Democratic US presidential contender Joe Biden, had a seat on the board.

Energy company Burisma Holdings Limited was at the centre of attempts by President Donald Trump last July to pressure Ukrainian authorities into announcing an investigation into the Bidens for purported corruption, an effort that has led to the Republican being impeached by the US House of Representatives on charges of abuse of power and obstruction of Congress.

Trump denies he did anything wrong by asking Ukrainian officials to investigate Hunter Biden’s relationship with Burisma. There has been no evidence of wrongdoing by the Bidens, who reject Trump’s allegations of graft.

California-based Area 1 Security identified the hacking of Burisma and linked it to Russia’s Main Directorate of Military Intelligence, or GRU. The same hacking group, known as Fancy Bear or APT28 by cyber security researchers, breached the Democratic National Committee in 2016 in what US investigators described as

part of an operation to disrupt that year’s election.

“You can see this attack really is starting to parallel with what we saw in 2016,” said Area 1’s chief executive, Oren Falkowitz.

Russian Defense Ministry did not immediately respond to a request for comment. Officials at the US National Security Agency and the Department of Homeland Security

declined to comment.

Burisma did not immediately respond to a request for comment.

A source close to Burisma said the company’s website had been subject to multiple break-in attempts over the past six months but did not provide further details.

What data the hackers were looking to steal is not clear, Area 1 said. Breaching Burisma could yield communications from, to, or about Hunter Biden, who served as a director between 2014 and 2019. A leak of stolen data could potentially affect the impeachment process and the 2020 US presidential election.

Area 1 said it became aware of the Russian targeting of Burisma after its email security scanning product found suspicious evidence online, including “decoy domains”: websites designed to imitate legitimate email services used by Burisma’s

subsidiaries.

Publicly available domain registration records show that the hackers created the decoy domains between November 11, the day before US Democrats began their first public impeachment hearings, and December 3, the day before the House Judiciary Committee took up the matter.

The records show that the same people also registered fake domains for a Ukrainian media company, named Kvartal 95, in March and April 2019. Kvartal 95 was founded by Ukrainian President, Volodymyr Zelenskiy and multiple employees of the company have since joined

his administration.

Kvartal 95 and representatives for Zelenskiy did not immediately respond to requests for comment.

Area 1’s report said it discovered the GRU had targeted two subsidiaries of Burisma – KUB Gas LLC and Esko Pivnich – as well as CUB Energy Inc, which previously did business with the company, using lookalike domains intended to trick employees into providing their email passwords.

Burisma and its subsidiaries share the same email server, Area 1 said, meaning a breach at any of the companies could expose them all.

The report gave a limited indication of how Area 1 determined that the lookalike domains were the work of the GRU, pointing mainly to similarities in how the hackers had previously set their digital traps. Area 1 co-founder Blake Darche said unpublished data gathered by his firm linked the operation to a specific officer in Moscow, whose identity he was unable to establish.

But Darche said “we are 100 per cent certain” that the GRU was

behind the hacking.

An outside researcher, Kyle Ehmke of Virginia-based cyber security firm ThreatConnect, who reviewed the malicious domains flagged by Area 1, said based on the information he had seen, he believed “with moderate confidence” that the websites were devised by the GRU.

Ehmke said that the hacking operation against Burisma used methods consistent with Russian hackers associated with the GRU, but that a complete picture was lacking.

John Hultquist, director of intelligence analysis with US cyber security firm FireEye, told Reuters the domains discovered by Area 1 are “consistent” with other known APT28 activities.

Russian spies have routinely targeted Ukrainian energy firms with cyber attacks since Russia threw its weight behind a separatist takeover in eastern Ukraine in 2014. 

US intelligence officials have issued warnings that Russia is working to intervene in the November 2020 election. Trump is seeking re-election and Biden is a leading opponent out of a dozen Democrats seeking their party’s nomination.

Andrew Bates, a spokesman for Joe Biden, did not comment directly on the hack but said in an email: “Any American president who had not repeatedly encouraged foreign interventions of this kind would immediately condemn this attack on the sovereignty of our elections.”

(HT Media)

Check Also

Bovine tuberculosis: A growing threat

Maneka Sanjay Gandhi Bovine tuberculosis (bTB), a cattle disease, is a major public health threat. …