Published in News

Microsoft stops Russian hackers

by on21 August 2018


Attacking anti-Russian conservative groups which promote democracy and cybersecurity

Microsoft said it had recently thwarted hackers associated with the Russian government attempting to steal user information from conservative groups that promote democracy and advocate for cybersecurity.

The company’s digital crimes unit (DCU) acted on a court order last week, disrupting and transferring control of a total of six internet domains created by a group known as Strontium, also known as Fancy Bear or APT28, which is associated with the Russian government.

Writing in its bog Vole said: “We’re concerned that these and other attempts pose security threats to a broadening array of groups connected with both American political parties in the run-up to the 2018 elections.”

Microsoft’s announcement comes amid increasing cyber-tensions between Moscow and Washington and rising concerns regarding security ahead of the 2018 mid-term elections in the United States. Both the main parties are worried about hacking. While the Republicans have made every effort to withdraw funding from cyber-security initiatives hoping that Putin will put them in power, Trump is more worried that the Democrats will start a hacking campaign of their own, or that Putin might be miffed about the sanctions he has put in place.

In this attack the hackers created websites to mimic three US Senate websites along with the Microsoft’s Office 365 website and the sites of the International Republican Institute and the Hudson Institute.

The International Republican Institute promotes democratic principles around the globe and has a board of directors that includes six Republican senators and a senatorial candidate.

The Hudson Institute, another conservative group, has hosted discussions on topics including cybersecurity, according to Microsoft. It has also examined the rise of kleptocracy, especially in Russia and has been critical of the Russian government.

The attackers created websites and URLs that closely resembled the sites that their victims would expect to receive email from or visit, Microsoft said. The type of attack is known as “spear fishing”, in which the hackers trick victims to enter their user name and password into the fake site to steal their credentials.

Last modified on 21 August 2018
Rate this item
(0 votes)