DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Russian Hackers Indicted

Posted on October 4, 2018 by Dissent

Seven Russian government operatives have been charged with hacking into the computer networks of organizations working to investigate and stop Russian athletic doping, just after Russia was banned from the Olympics due to state-sponsored doping revelations. The hackers also allegedly targeted other international entities seen as thwarting Russia’s strategic interests.

According to an indictment unsealed today in federal court in Pittsburgh, beginning in 2014, the defendants, who worked in Russia’s Main Intelligence Directorate (GRU), engaged in “persistent and sophisticated criminal cyber intrusions.” The GRU operatives hacked U.S. and international anti-doping agencies, anti-doping officials, other international organizations, and one major corporation. The charges against the defendants include conspiracy to commit computer fraud, conspiracy to commit wire fraud, wire fraud, aggravated identity theft, and conspiracy to commit money laundering.

After Russia was found to have engaged in state-sponsored doping during the 2014 Sochi Winter Games, the International Olympic Committee limited Russian athletes’ participation in the 2016 Games. The IOC also banned Russia from the 2018 Olympics, though some Russian athletes, who were not doping, were allowed to participate under the Olympic flag.

When anti-doping organizations began investigating and speaking out publicly against Russia’s actions, the hackers began intruding into their networks, according to the indictment. The FBI investigation found that these hackers worked remotely from Russia as well as on the ground in several other countries.

For example, during the 2016 Summer Games in Rio de Janeiro, Brazil, the GRU agents sent spear-phishing e-mails that enabled them to find the credentials of an anti-doping official, providing access to sensitive databases. Additionally, coordinating with hackers back in Russia, two members of the group traveled to Rio on another occasion to engage in “close access” cyber operations on a hotel Wi-Fi network that anti-doping officials were using. This gave them access to an anti-doping official’s e-mail account with sensitive information in it.

The hacks were conducted as part of an influence and disinformation campaign designed to undermine and delegitimize organizations that exposed Russia’s state-sponsored doping, expose private health information about athletes from other countries, and damage the reputations of other international athletes by falsely claiming they were using banned substances.

“The GRU is breaking traditional international norms—and the law—in using cyber tools and resources in the fashion that they have.”

Eric Welling, deputy assistant director, FBI Cyber Division

After the 2016 Olympics, according to the indictment, the Russians published the private information they stole—including nearly 250 athletes’ personal medical information—using the Fancy Bears hacktivist group website and social media accounts. In some cases, the Russians modified the information to make it look as though non-Russian athletes were doping who were not actually doing so.

“This began with a disclosure of a Russian state-sponsored doping program for its athletes. In other words, Russia cheated,” said U.S. Attorney Scott W. Brady of the Western District of Pennsylvania at a news conference today at the Department of Justice in Washington, D.C. “They cheated; they got caught. They were banned from the Olympics. They were mad, and they retaliated. And in retaliating, they broke the law—so they are criminals.”

The indictment describes a variety of tactics used by the Russian hackers during this campaign, including spear-phishing, distributed denial of service attacks, spoofing legitimate web domains, and using cryptocurrencies to cover their tracks.

As a result of the indictment, the operatives, all of whom are Russian citizens and are believed to be living in Russia, will no longer have the benefit of anonymity—which is prized among state-sponsored cyber criminals. Publicly identifying the hackers in an indictment, known as “naming and shaming,” hampers their ability to operate, particularly in traveling outside Russia.

Screenshot of Wanted Poster for seven Russian GRU agents wanted for their efforts to undermine anti-doping efforts through hacking.

“These activities by Russian GRU officers move well beyond acceptable government intelligence operations. The GRU is breaking traditional international norms—and the law—in using cyber tools and resources in the fashion that they have,” said FBI Cyber Division Deputy Assistant Director Eric Welling. “The FBI considers any criminal activity conducted by nation-state actors, especially those leading to the violation of Americans’ privacy or interference in our economy, to be a matter of national security.”

In addition to the sports-related hacking, beginning in 2014, the Russian conspirators allegedly targeted, via spear-phishing attacks, a Pittsburgh-based nuclear energy company that provides nuclear fuel to Ukraine. The Russians also allegedly targeted an anti-chemical weapons organization in the Netherlands, and later planned to target a Swiss chemical laboratory, but they were disrupted by Dutch authorities.

The FBI investigated the intrusions in close partnership with the United Kingdom National Security and Intelligence Agencies, the Defense Intelligence and Security Service of the Netherlands, the Royal Canadian Mounted Police, and the Office of the Attorney General of Switzerland.

Resources

  • U.S. Charges Russian GRU Officers with International Hacking and Related Influence and Disinformation Operations
  • Poster: GRU Hacking to Undermine Anti-Doping Efforts
  • FBI, This Week: Russian Military Intelligence Officers Charged with Hacking

Source: FBI

Category: HackHealth Data

Post navigation

← Vancouver-based Burgerville hit by data breach
Toyota notifies employees and health plan participants of data breach →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Researchers Scrape 2 Billion Discord Messages and Publish Them Online
  • Privilege Under Fire: Protecting Forensic Reports in the Wake of a Data Breach
  • Hacker who breached communications app used by Trump aide stole data from across US government
  • Massachusetts hacker to plead guilty to PowerSchool data breach
  • Cyberattack brings down Kettering Health phone lines, MyChart patient portal access (1)
  • Gujarat ATS arrests 18-year-old for cyberattacks during Operation Sindoor
  • Hackers Nab 15 Years of UK Legal Aid Applicant Data
  • Supplier to major UK supermarkets Aldi, Tesco & Sainsbury’s hit by cyber attack with ransom demand
  • UK: Post Office to compensate hundreds of data leak victims
  • How the Signal Knockoff App TeleMessage Got Hacked in 20 Minutes

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Researchers Scrape 2 Billion Discord Messages and Publish Them Online
  • GDPR is cracking: Brussels rewrites its prized privacy law
  • Telegram Gave Authorities Data on More than 20,000 Users
  • Police secretly monitored New Orleans with facial recognition cameras
  • Cocospy stalkerware apps go offline after data breach
  • Drugmaker Regeneron to acquire 23andMe out of bankruptcy
  • Massachusetts Senate Committee Approves Robust Comprehensive Privacy Law

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.