Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cyberwarfare

Iranian Hackers Said to Target Presidential Campaign

Microsoft said Friday that hackers linked to the Iranian government targeted a U.S. presidential campaign, as well as government officials, media targets and prominent expatriate Iranians.

Microsoft said Friday that hackers linked to the Iranian government targeted a U.S. presidential campaign, as well as government officials, media targets and prominent expatriate Iranians.

Overall, the hackers attempted to penetrate 241 accounts — four successfully — though none of those penetrated was associated with presidential campaigns or current or past U.S. officials, Microsoft said. A company spokeswoman declined to identify those targeted, citing customer privacy. 

Reuters and The New York Times reported that the attack targeted President Donald Trump’s reelection campaign, but this could not be independently confirmed. But a review of publicly available internet records by AP showed that the Trump campaign’s official website is linked to Microsoft’s email service.

Tim Murtaugh, spokesman for Trump’s 2020 reelection campaign, said there was “no indication that any of our campaign infrastructure was targeted.”

Microsoft’s announcement is the latest sign that foreign governments are looking for ways to potentially disrupt the 2020 presidential election. U.S. intelligence officials have sounded the alarm about the risks for months.

Russia’s hacking of the Democratic National Committee and the Clinton campaign, as well as the subsequent leaks of emails during the 2016 election roiled the DNC, hurt the Clinton campaign and was a focal point in special counsel Robert Mueller’s probe.

Foreign hackers have long targeted U.S. government and politicians, generally with little notice. But the disruption caused by Russia’s attack has heightened awareness and prompted fears that other nations will try to follow Russia’s example. Iran in particular could have a stake in the outcome of the U.S. election after Trump withdrew the United States from a nuclear agreement and stepped up sanctions against the country.

“The Russians came after us and our election system in 2016 and they paid virtually no price for that activity,” said Jamil N. Jaffer, director of the national security law and policy program at George Mason University, and former chief counsel of the Senate Foreign Relations Committee. “It’s not surprising that China now more aggressively and maybe the Iranians are getting in that game. Why not?”

Advertisement. Scroll to continue reading.

The U.S. Department of Homeland Security said it was working with Microsoft to “assess and mitigate impacts.” Chris Krebs, director of the department’s Cybersecurity and Infrastructure Security Agency, said much of the activity is likely “run-of-the-mill” foreign intelligence service work.

But, “Microsoft’s claims that a presidential campaign was targeted is yet more evidence that our adversaries are looking to undermine our democratic institutions,” Krebs said. 

In a blogpost released Friday, Microsoft’s Tom Burt, corporate vice president for customer security and trust, said that owners of four accounts that were compromised by the hackers have been notified. The company would not identify those accounts.

The attacks by a group Microsoft calls Phosphorous occurred during a 30-day period between August and September.

Burt said the Iranian hackers used password reset and account recovery features to try to take over accounts. For example, they gathered phone numbers belonging to targets to help with a password reset. In other cases, they tried to get into secondary email accounts that might be linked to the Microsoft account to gain access via a verification email.

The hackers researched their targets, making more than 2,700 attempts to identify emails belonging to a specific Microsoft customer. A spokeswoman declined to provide more details.

The company has previously taken legal steps to combat Iran-linked hackers, suing them in federal court in Washington D.C., so Microsoft could take control of websites Phosphorous used to conduct hacking operations and to stop attacks.

The campaigns of Sen. Kamala Harris, Michael Bennet, Pete Buttigieg, and Montana Gov. Steve Bullock also said they had not been targeted. A campaign aide for Sen. Bernie Sanders said the campaign doesn’t comment on matters of technical security.

Republican National Committee spokeswoman Blair Ellis said the RNC is “constantly working to stay ahead of emerging threats.”

Meanwhile, the DNC sent an alert out to campaigns Friday, warning them about the Iran-linked hacking group’s targeting of Microsoft accounts belonging to “journalists, politicians and at least one presidential campaign.”

The DNC has taken several steps to improve the party’s cybersecurity since 2016. The most public move was the hiring of Bob Lord, a veteran of Silicon Valley cybersecurity with stints at Yahoo, Twitter, AOL and Netscape, to serve as its cybersecurity chief.

Lord on Friday declined to provide details on the hacking efforts, deferring to Microsoft. He has worked to improve security protocols for DNC staff, state parties and campaigns with access to the central voter file that DNC maintains.

In July, Microsoft announced that it had detected more than 740 infiltration attempts by nation-state actors in the past year targeting U.S.-based political parties, campaigns and other democracy-focused organizations including think tanks and other nonprofits.

The company declined to name or further characterize the targets or the actors. It said at the time that such targeting had similarly occurred in the early stages of the 2016 and 2018 elections.

A memo prepared by DHS and the FBI was sent to state election officials this week outlining possible ways Russia could seek to interfere in the 2020 elections by discouraging voters or utilizing voter suppression tactics.

The document, which was dated Thursday and reviewed by The Associated Press, outlines a few possible scenarios for state and local election officials to be aware of. Those include the use of social media to exacerbate divisions within political parties during state primaries and the hacking of election websites to spread misinformation on voting processes or to alter voter registration data.

Related: Securing the 2020 Elections From Multifarious Threats

Written By

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Cody Barrow has been appointed as CEO of threat intelligence company EclecticIQ.

Shay Mowlem has been named CMO of runtime and application security company Contrast Security.

Attack detection firm Vectra AI has appointed Jeff Reed to the newly created role of Chief Product Officer.

More People On The Move

Expert Insights

Related Content

Cyberwarfare

WASHINGTON - Cyberattacks are the most serious threat facing the United States, even more so than terrorism, according to American defense experts. Almost half...

Cybercrime

Patch Tuesday: Microsoft calls attention to a series of zero-day remote code execution attacks hitting its Office productivity suite.

Cyberwarfare

Russian espionage group Nomadic Octopus infiltrated a Tajikistani telecoms provider to spy on 18 entities, including government officials and public service infrastructures.

Cyberwarfare

Several hacker groups have joined in on the Israel-Hamas war that started over the weekend after the militant group launched a major attack.

Cyberwarfare

An engineer recruited by intelligence services reportedly used a water pump to deliver Stuxnet, which reportedly cost $1-2 billion to develop.

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...

Application Security

Fortinet on Monday issued an emergency patch to cover a severe vulnerability in its FortiOS SSL-VPN product, warning that hackers have already exploited the...

Cyberwarfare

The war in Ukraine is the first major conflagration between two technologically advanced powers in the age of cyber. It prompts us to question...