Russia Hacking: How A Botched ‘Cleanup’ Operation Helped To Unmask A Global Cyberweb

The dramatic accusations against Russia of waging systematic cyberwarfare internationally, and on a massive scale, came following a complex and extensive investigation which began after the novichok attack in Salisbury.

Repeated attempts by the Kremlin to cover up connections to the attempted assassination of Sergei Skripal as well as the shooting down of a Malaysian airliner over Ukraine, and a chemical attack in Syria, opened up fresh avenues of inquiry and gave renewed impetus to examining previous cases of hacking for which Moscow was thought to be responsible.

And it was the spectacular failure of one such “cleanup” mission, in The Hague, which presented crucial evidence in tracking down the cyberweb created on a global scale by the Kremlin, and the modus operandi of its weapon of choice in hybrid warfare, the military intelligence service the GRU.

While dozens of Russian embassy officials working under diplomatic credentials were expelled by allied countries after the British government provided information on Russian culpability in the novichok attack, a number of suspected intelligence agents were allowed to stay in post, to monitor their links to state security organisations including the GRU. And this, too, say officials proved to be of great value in the unearthing of clandestine plots.

Overall, the investigation involved liaison between Britain, the US, Canada, Ukraine, the Netherlands, Switzerland, France and Germany as well as exchanges of information with a number of other countries including Malaysia and Brazil. Pulling together the intelligence exposed links between plots targeting various institutions and countries which, at times, involved the same personnel, it is claimed.

As an example of this, security officials point to seven Russians charged on Thursday by the US with hacking anti-doping agencies. Three of them were also named by the special counsel investigating Moscow’s interference in the US election that took Donald Trump to the White House. The men, identified as members of the GRU, were indicted by Robert Mueller for hacking Democratic Party emails, including those of Hillary Clinton.

While decrying British charges of its involvement in the Salisbury poisoning, the Kremlin was making increasingly frantic attempts to disrupt the investigation into the attack, say British and other western officials. The Sandworm cybercrime department of the GRU carried out spear-phishing attacks on the Foreign Office in London in March and the Porton Down chemical weapons facility in April. The same month four intelligence officers travelled to The Hague to carry out a cyberattack on the headquarters of the international chemical watchdog analysing the chemical agent used in Salisbury as well as that used in an attack in Douma, Syria, for which Russia’s ally, the Assad regime, was blamed.

The remote attack on the Foreign Office and Porton Down were unsuccessful and the four GRU officers in the Netherlands were detained and then expelled by the Dutch security services after receiving information from London. In a vital breakthrough, search of the men’s belongings found an antenna that had been pointed at the building of the Organisation for the Prohibition of Chemical Weapons (OPCW) as well as a taxi receipt kept, it is believed, for claiming expenses from a GRU office in Moscow to the airport.

The GRU officers, travelling under the names of Aleksei Sergeyvich Morenets, Evgenii Mikhaylovich Serebriakov, Oleg Mikhaylovich Sotnikov and Alexey Valeryevich Minin, are said to be members of Unit 26165, which has also been known as APT 28. They were found to be carrying train tickets to Basel, and their laptops revealed online searches for the Spiez Lab, the Swiss institute for nuclear, biological and chemical protection, the designated facility for the OPCW. At least two of the men, it is claimed, had visited Switzerland in the past.

Checks on computers, modems, a transformer and mobile phones found on the GRU officers showed that some of the party had tried to hack the investigation in Malaysia into the shooting down of the MH17 flight, killing 298 people on board, which had been blamed on Ukrainian separatists and their Russian mentors. According to British and Dutch officials one of those detained in The Hague, using the name Yevgeniy Serebriakov, had been active in Malaysia targeting the headquarters of the Royal Malaysian Police and the office of the attorney general. Records showed he had flown to the capital, Kuala Lumpur, in December 2017, and booked into the Grand Millennium Hotel.

The four GRU officers in The Hague had connected to the wifi at a hotel, the Alpha-Palmiers, where a conference of Wada (the World Anti-Doping Agency) was taking place and delegates from the International Olympics Committee and the Canadian Centre for Ethics in sport were affected by the cyberattack.

The information gleamed from the seized equipment was passed to, among others, the Royal Canadian Mounted Police, which have been carrying out its own investigation into a malware assault on the Canadian Centre for Ethics in Sport in 2016. The Foreign Ministry in Ottawa said on Thursday: “The government of Canada assesses with high confidence that the GRU was responsible for this compromise. Today, Canada joins its allies in identifying and exposing a series of malicious cyber-operations by the Russian military.”

The laptops seized in The Hague also showed they had been used in Brazil. The website of the Court of Arbitration in Sports (CAS) was hacked during the Rio de Janeiro Olympics in 2016. The court had been dealing with cases of Russian athletes who were alleged to be involved in state sponsored doping.

Author: Kim Sengupta

Source: Independent