BOSTON (AP) A U.S. cybersecurity company says Russian military agents have successfully hacked the Ukrainian gas company at the center of the scandal that led to President Donald Trumps impeachment.
Russian agents launched a phishing campaign in early November to steal the login credentials of employees of Burisma Holdings, the gas company, according to Area 1 Security, a Silicon Valley company that specializes in e-mail security.
Hunter Biden, son of former U.S. vice president and Democratic presidential hopeful Joe Biden, previously served on Burismas board.
It was not clear what the hackers were looking for or may have obtained, said Area 1s CEO, Oren Falkowitz, who called the findings incontrovertible and posted an eight-page report. But the timing of the operation suggests that the Russian agents could be searching for material that damaging to the Bidens.
The House of Representatives impeached Trump in December for abusing the power of his office by enlisting the Ukrainian government to investigate Biden, a political rival, ahead of the 2020 election. A second charge accused Trump of obstructing a congressional investigation into the matter.
Our report doesnt make any claims as to what the intent of the hackers were, what they might have been looking for, what they are going to do with their success. We just point out that this is a campaign thats going on, said Falkowitz, a former National Security Agency offensive hacker whose companys clients include candidates for U.S. federal elected offices.
In an earlier interview, he told The Associated Press that the campaigns of top candidates for the U.S. presidency and House and Senate races in 2020 have in the past few months each been targeted by about a thousand phishing emails.
Falkowitz did not name the candidates. Nor would he name any clients.
Russian hackers from the same military intelligence unit that Area 1 said was behind the operation targeting Burisma have been indicted for hacking emails from the Democratic National Committee and the chairman of Hillary Clintons campaign during the 2016 presidential race.
Stolen emails were released online at the time by Russian agents and WikiLeaks in an effort to favor Trump, special counsel Robert Mueller determined in his investigation.
Area 1 discovered the phishing campaign by the Russian military intelligence unit, known as the GRU, on New Years Eve, said Falkowitz, who would not discuss whom he notified prior to going public. He said he followed the industry standard process of responsible disclosure, which would include notifying Burisma.
In the report, he said the GRU agents used fake, lookalike domains in the phishing campaign that were designed to mimic the sites of real Burisma subsidiaries.
Falkowitz said the operation targeting Burisma involved tactics, techniques and procedures that GRU agents had used repeatedly in other phishing operations, matching several patterns that lots of independent researchers agree mimic this particular Russian actor. Area 1 says it has been tracking the Russian agents for several years.
The discoverys timing just weeks before presidential primaries begin in the United States highlights the need to protect political campaigns from targeted phishing attacks, which are behind 95 percent of all information breaches, said Falkowitz.
This is a real specific, timely case that has real implications, he said. To discover it and potentially get out in front of it is a significant departure from whats typical in the cyber security community, where someone just tells you, yeah, youre dead.