Russian hackers targeted Ukrainian company at center of impeachment storm

Reuters
A man with two dogs is shown walking past a five story building in Kyiv, Ukraine.

California-based cybersecurity firm Area 1 Security said Monday that Russian military hackers tried to steal emails from the Ukrainian energy firm where Hunter Biden, the son of Democratic US presidential contender Joe Biden, had a seat on the board.

Energy company Burisma Holdings was at the center of attempts by US President Donald Trump last July to pressure Ukrainian authorities into announcing an investigation into the Bidens for purported corruption, an effort that has led to the Republican being impeached by the US House of Representatives on charges of abuse of power and obstruction of Congress.

Trump denies he did anything wrong by asking Ukrainian officials to investigate Hunter Biden’s relationship with Burisma. There has been no evidence of wrongdoing by the Bidens, who reject Trump’s allegations of graft.

California-based Area 1 Security identified the hacking of Burisma and linked it to Russia’s Main Directorate of Military Intelligence, or GRU. The same hacking group, known as “Fancy Bear” or “APT28” by cybersecurity researchers, breached the Democratic National Committee in 2016 in what US investigators described as part of an operation to disrupt that year’s election.

“You can see this attack really is starting to parallel with what we saw in 2016,” Oren Falkowitz, Area 1’s chief executive, said in an interview.

The Russian Defense Ministry did not immediately respond to a request for comment. Officials at the US National Security Agency and the Department of Homeland Security declined to comment.

Burisma did not immediately respond to a request for comment.

A source close to Burisma told Reuters the company’s website had been subject to multiple break-in attempts over the past six months but did not provide further details.

What data the hackers were looking to steal is not clear, Area 1 said. Breaching Burisma could yield communications from, to, or about Hunter Biden, who served as a director between 2014 and 2019. A leak of stolen data could potentially affect the impeachment process and the 2020 US presidential election.

Area 1 said it became aware of the Russian targeting of Burisma after its email security scanning product found suspicious evidence online, including “decoy domains”: websites designed to imitate legitimate email services used by Burisma’s subsidiaries.

Publicly available domain registration records examined by Reuters show that the hackers created the decoy domains between Nov. 11, the day before the US House of Representatives began their first public impeachment hearings, and Dec. 3, the day before the House Judiciary Committee took up the matter.

The records show that the same people also registered fake domains for a Ukrainian media company, named Kvartal 95, in March and April 2019. Kvartal 95 was founded by Ukrainian President Volodymyr Zelenskiy and multiple employees of the company have since joined his administration.

Kvartal 95 and representatives for Zelenskiy did not immediately respond to requests for comment.

Area 1’s report said it discovered the GRU had targeted two subsidiaries of Burisma — KUB Gas LLC and Esko Pivnich — as well as CUB Energy Inc, which was affiliated with the company, using lookalike domains intended to trick employees into providing their email passwords.

Burisma and its subsidiaries share the same email server, Area 1 said, meaning a breach at any of the companies could expose them all.

The report gave a limited indication of how Area 1 determined that the lookalike domains were the work of the GRU, pointing mainly to similarities in how the hackers had previously set their digital traps. Area 1 co-founder Blake Darche said unpublished data gathered by his firm linked the operation to a specific officer in Moscow, whose identity he was unable to establish.

But Darche said “we are 100 percent certain” that the GRU was behind the hacking.

An outside researcher, Kyle Ehmke of Virginia-based cybersecurity firm ThreatConnect, who reviewed the malicious domains flagged by Area 1, said based on the information he had seen, he believed “with moderate confidence” that the websites were devised by the GRU.

Ehmke said that the hacking operation against Burisma used methods consistent with Russian hackers associated with the GRU, but that a complete picture was lacking.  

John Hultquist, director of intelligence analysis with US cybersecurity firm FireEye, told Reuters the domains discovered by Area 1 are “consistent” with other known APT28 activities.

Russian spies have routinely targeted Ukrainian energy firms with cyberattacks since Russia threw its weight behind a separatist takeover in eastern Ukraine in 2014.  

US intelligence officials have issued warnings that Russia is working to intervene in the November 2020 election. Trump is seeking re-election and Biden is a leading opponent out of a dozen Democrats seeking their party’s nomination.

By Christopher Bing and Raphael Satter/Reuters

Invest in independent global news

The World is an independent newsroom. We’re not funded by billionaires; instead, we rely on readers and listeners like you. As a listener, you’re a crucial part of our team and our global community. Your support is vital to running our nonprofit newsroom, and we can’t do this work without you. Will you support The World with a gift today? Donations made between now and Dec. 31 will be matched 1:1. Thanks for investing in our work!