CrowdStrike and Fidelis say all evidence for intrusions at DNC points to Russian-backed groups.
A lone hacker’s claims of being behind the recent data breach at the Democratic National Committee—and his release Tuesday of apparently more purloined data from the DNC—has added a new twist to reports about Russian involvement in the breach.
Using the handle Guccifer 2.0, the hacker today published a fresh cache of information related to the Hillary Clinton presidential campaign that was allegedly stolen from a DNC server. It is the second set of similar documents that Guccifer 2.0 has released in the last few days in a bid to prove that he is the one responsible for breaching the DNC — not two Russian APT groups as reported by security firm CrowdStrike last week.
In a WordPress blog post titled “Dossier on Hillary Clinton from DNC,” Guccifer 2.0 listed several documents purporting to contain information on various Clinton campaign-related topics and on big donors. “The DNC collected all info about the attacks on Hillary Clinton and prepared the ways of her defense, memos, etc., including the most sensitive issues like email hacks,” the hacker said by way of describing the contents of the published documents.
The DNC itself has so far not commented on either the purported theft or the authenticity of the published documents.
In a Twitter interview with Motherboard, Guccifer 2.0 identified himself as being from Romania and said he had broken into the DNC server last summer. The hacker claimed to have exploited a security flaw in a software-as-a-service provider’s platform that the DNC uses, which allowed him to gain access to the committee’s servers. Guccifer 2.0 denied any connection to Russia and professed a dislike for both the nation’s foreign policies and for being linked to the Russian government in any way.
The hacker’s comments and his continued publishing of data purportedly stolen from the DNC add a new wrinkle to recent reports by a couple of security vendor’s that link the DNC breach to two Russian cyber espionage groups.
The first report released last week was from CrowdStrike and was based on the security vendor’s investigation of a breach at the DNC. CrowdStrike said its analysis of the breach showed clear forensic evidence of two Russian APT groups—Cozy Bear and Fancy Bear—being behind the intrusion.
The two groups appear to have been completely oblivious to each other’s presence on the same network, though they targeted the same systems and the same data, CrowdStrike said. In response to Guccifer 2.0’s claims, CrowdStrike released a statement standing by its analysis and findings that it was two separate Russian intelligence-affiliated adversaries that broke into DNC and stole data.
CrowdStrike and others have raised the possibility that Guccifer 2,0’s claims were part of a Russian intelligence community disinformation campaign to try and divert attention from their role in the DNC hacking.
On Monday, Fidelis Cybersecurity backed CrowdStrike’s analysis with a report of its own confirming the DNC breaches as being the work of the Cozy Bear and Fancy Bear Russian APT groups. The company said its investigation was prompted by Guccifer 2.0’s claims about being responsible for the DNC breach.
“The malware samples were similar — and at times identical — to malware that other security vendors have associated to these Russian APT groups,” Fidelis said in its report. “Based on our comparative analysis we agree with Crowdstrike and believe that the Cozy Bear and Fancy Bear APT groups were involved in successful intrusions at the DNC.”
CrowdStrike and Fidelis did not immediately respond to a question on whether it is possible that someone else also gained access to the DNC’s systems in addition to the two Russian APT groups.
Phil Burdette, senior security researcher at the Counter Threat Unit at SecureWorks, says it is possible that a lone wolf was able to breach the DNC, as Guccifer 2.0 has claimed.
However, it is also feasible that Guccifer 2.0’s claims are a misinformation campaign to divert attention away from Russia’s role in the attacks, Burdette says.
SecureWorks also recently released a report on a Russian Federation-based group called the Threat Group-4127 that has been targeting the Clinton campaign for the past several months.
Black Hat USA returns to the fabulous Mandalay Bay in Las Vegas, Nevada July 30 through Aug. 4, 2016. Click for information on the conference schedule and to register.
According to SecureWorks, 108 email addresses associated with the Hillary for America campaign were targeted using 213 malicious bit.ly links between last October and May 2016. In addition, Threat Group-4127 targeted Gmail accounts belonging to individuals linked to the Hillary for America campaign, the DNC, or other aspects of US national politics.
“SecureWorks believes there is substantial overlap between TG-4127 and the Fancy Bear intrusion occurring with the DNC as reported by CrowdStrike,” Burdette says.
Burdette says he, too, is convinced of Russian involvement in the breach, regardless of Guccifer 2.0’s claims. “SecureWorks stands strongly behind its attribution assessment that Threat Group-4127 is operating from the Russia Federation and is gathering intelligence on behalf of the Russian government,” Burdette says.
“This does not preclude another threat group or lone wolf from also comprising the DNC. However, it is also feasible that the Guccifer is a misinformation campaign and thus we encourage individuals to draw their own conclusion,” he says.
Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year … View Full Bio