Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cybercrime

DNC: Russian Hackers Attacked Us Again After Midterm Elections

Hackers believed to be associated with the Russian government targeted the US Democratic National Committee (DNC) shortly after the 2018 midterm elections, court documents show.

Hackers believed to be associated with the Russian government targeted the US Democratic National Committee (DNC) shortly after the 2018 midterm elections, court documents show.

The DNC, the formal governing body for the U.S. Democratic Party, was targeted by hackers in 2015 and 2016, before the presidential elections. An investigation of the attacks concluded that they were most likely launched by Russia-linked groups known as CozyDuke (APT29) and Fancy Bear, (APT28, Pawn Storm, Strontium, Sofacy, Sednit and Tsar Team).

It has been widely believed that, through these cyberattacks and other campaigns, the Russian government had attempted to influence the presidential election in favor of Republican candidate Donald Trump. In the summer of 2018, the US government charged 12 Russian intelligence officers over their alleged role in the hacking of the DNC.

The DNC last year filed a civil lawsuit against Russia, WikiLeaks, Julian Assange, Donald Trump, and people involved in Trump’s presidential campaign, accusing them of violating over a dozen laws.

In an amended complaint filed last week, the organization revealed that in addition to the first round of attacks, it was also targeted in November 2018, shortly after the midterm elections that helped the Democrats take control of the House of Representatives.

“On November 14, 2018, dozens of DNC email addresses were targeted in a spear-phishing campaign, although there is no evidence that the attack was successful. The content of these emails and their timestamps were consistent with a spear-phishing campaign that leading cybersecurity experts have tied to Cozy Bear (APT 29). Therefore, it is probable that Cozy Bear again attempted to unlawfully infiltrate DNC computers in November 2018,” the DNC’s updated complaint reads.

Those spear-phishing attacks on the DNC were part of a campaign whose existence was made public in November by FireEye and CrowdStrike. Researchers from the security firms said the attacks were aimed at think tanks, law enforcement, media, military, transportation, government and defense organizations.

The attacks involved emails purporting to come from the U.S. Department of State. Victims who took the bait were served a tool that gave the attackers access to their systems.

Advertisement. Scroll to continue reading.

While both FireEye and CrowdStrike had found clues suggesting a link to Cozy Duke, Microsoft later said there wasn’t enough evidence to attribute the campaign to this threat actor.

Related: Attack on DNC Part of Simulated Phishing Test

Related: The DNC Hacker Indictment – A Lesson in Failed Misattribution

Related: Former Yahoo CISO Bob Lord Joins DNC

Written By

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join this event as we dive into threat hunting tools and frameworks, and explore value of threat intelligence data in the defender’s security stack.

Register

Learn how integrating BAS and Automated Penetration Testing empowers security teams to quickly identify and validate threats, enabling prompt response and remediation.

Register

People on the Move

Tabitha Craig has been named the CISO of the Congressional Budget Office (CBO).

Life360 has appointed Vari Bindra, former Amazon cybersecurity lead, as Chief Information Security Officer.

Forcepoint has appointed Guy Shamilov as CISO, Bakshi Kohli as CTO and Naveen Palavalli as CPO and CMO.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.