U.S. accuses Russian military hackers of attack on email servers | Honolulu Star-Advertiser
WASHINGTON >> The National Security Agency publicly accused Russian government hackers of targeting email servers around the world in an unusual announcement today, showing that the agency is becoming more aggressive in calling out Moscow’s action as the presidential election approaches.
While the Trump administration has publicly attributed cyberattacks to Russia before — including for its 2016 election hack and for paralyzing Ukraine in 2017, which damaged the operations of shippers Maersk and FedEx — this allegation was unusually specific. It singled out Russia’s military intelligence unit, widely known as the GRU, demonstrating the intelligence agencies’ concern that Russia intends to interfere in the election only a little more than five months away.
But it also comes as President Donald Trump has renewed his baseless claims that the investigation into Russia’s activities was part of a “hoax” intended by Democrats to paralyze him. He has publicly questioned Russia’s culpability in the election hacking and appeared to accept President Vladimir Putin’s argument that Russia was so good at cyberoperations that it would never have been caught.
“There has been a reluctance to be critical of Russia because of echoes of investigations,” said retired Gen. Martin E. Dempsey, former chairman of the Joint Chiefs of Staff. “For the NSA to do that, in this climate, they must have absolutely incontrovertible evidence.”
The “Sandworm Team,” a group of GRU hackers, tried to use a vulnerability in computer networks to gain access to them, the NSA said. It did not say which networks were compromised.
But the software targeted by the hackers, Exim, is a commonly used email transfer program, used by some Unix computers. Exim was developed at Cambridge University and is frequently used in Britain.
The vulnerability allowed attackers to execute commands and run their own code on compromised networks, an NSA official said. It was, the agency said in its announcement, “pretty much any attacker’s dream access.”
The Russian Embassy in Washington did not respond to a request for comment.
Since before the 2018 midterm elections, the NSA and its sister agency, U.S. Cyber Command, have stepped up efforts to identify and deter Russian interference. They have taken down internet networks used to spread divisive messages, warned the people behind troll farms against spreading disinformation and carried out other undisclosed operations. They also began an operation to put malware in the Russian electrical grid, as a warning about what kind of retaliation could happen if Moscow tried to attack the U.S. grid.
The GRU’s continued malicious activity shows that the U.S. counterattacks have had only a modest effect, even as the NSA persists in pressuring Russia. “When you are looking at some of the actions that have been done, they haven’t quite made their mark,” Scott Jasper, a lecturer at the U.S. Naval Postgraduate School and the author of a new book, “Russian Cyber Operations,” said at a Cato Institute event Thursday.
Hackers from the GRU were behind both the theft of documents on the Democratic National Committee’s servers and the hack of Hillary Clinton’s campaign in 2016. Russia publicly released those documents in an attempt to promote the election of Trump, the U.S. government concluded.
The ability to exploit the software was first identified publicly in June 2019, and the GRU team began using it two months later, targeting unpatched systems, according to the NSA. The agency urged companies using the Exim software to update it to remove the vulnerability.
In February, the State Department called out the GRU and the Sandworm Team, accusing them of conducting electronic attacks on the Republic of Georgia in 2019 that defaced government websites and interrupted television broadcasts.
For the agency to accuse a Russian intelligence agency is a sign that, at least for now, it can operate outside of direct political pressure from Trump, former officials said.
NSA officials have insisted that their agency is able to operate apolitically, without political influence changing their intelligence judgments. But that often involves acting against Russia without first seeking explicit permission from the president.
Under a presidential order issued in 2018, Gen. Paul M. Nakasone, the head of the agency and the commander of the U.S. Cyber Command, can operate on his own authority in operations short of war, including the kind that involve pushing back on Moscow.