Thursday, July 19, 2018

in or around, & you turn it all about





We can't seem to figure out what the puzzle is supposed to look like.  John Mitchell resigns as the head of CREEP -- and says he wants to spend more time with his family.


That sounds like bullshit.


We don't exactly believe that.


No, but it's touching.  Forget the myths that the media has created about the White House.  The truth is, these are not very bright guys -- and things got out of hand.


Hunt's come in from the cold.  Supposedly, he's got a lawyer with $25,000 in a brown paper bag.


Follow the money.


What do you mean?  Where?


Oh, I can't tell you that.


But you could tell me, then.


No, I have to do this my way.  You tell me what you know, and I'll confirm.  I'll keep you in the right direction if I can, but that's all.  Just -- follow the money.


----------------- dialogue, All The President's Men, 1976 film




_____________________________________


Mueller indictment (continued)


Object of the Conspiracy


20.     The object of the conspiracy was to hack into the computers of U.S. persons and entities involved in the 2016 U.S. presidential election, steal documents from those computers, and stage releases of the stolen documents to interfere with the 2016 U.S. presidential election.


Manner and Means of the Conspiracy


Spearphishing Operations


21.  ANTONOV, BADIN, YERMAKOV, LUKASHEV, and their co-conspirators targeted victims using a technique known as spearphishing to steal victims' passwords or otherwise gain access to their computers.  Beginning by at least March 2016, the Conspirators targeted over 300 individuals affiliated with the Clinton Campaign, DCCC, and DNC.

     a.     For example, on or about March 19, 2016, LUKASHEV and his co-conspirators created and sent a spearphishing email to the chairman of the Clinton Campaign.  LUKASHEV used the account "john356gh" at an online service that abbreviated lengthy website addresses (referred to as a "URL-shortening service").  

LUKASHEV used the account to mask a link contained in the spearphishing email, which directed the recipient to a GRU-created website.  LUKASHEV altered the appearance of the sender email address in order to make it look like the email was a security notification from Google (a technique known as "spoofing"), instructing the user to change his password by clicking the embedded link.  

Those instructions were followed.  On or about March 21, 2016, LUKASHEV, YERMAKOV, and their co-conspirators stole the contents of the chairman's email account, which consisted of over 40,000 emails.


     b.     Starting on or about March 19, 2016, LUKASHEV and his co-conspirators sent spearphishing emails to the personal accounts of other individuals affiliated with the Clinton Campaign, including its campaign manager and a senior foreign policy advisor. 

 On or about March 25, 2016, LUKASHEV used the same john356gh account to mask additional links included in spearphishing emails sent to numerous individuals affiliated with the Clinton Campaign, including victims 1 and 2.  LUKASHEV sent these emails from the Russia-based email account [email address] that he spoofed to appear to be from Google.



     c.     On or about March 28, 2016, YERMAKOV researched the names of Victims 1 and 2 and their association with Clinton on various social media sites.  Through their spearphishing operations, LUKASHEV, YERMAKOV, and their co-conspirators successfully stole email credentials and thousands of emails from numerous individuals affiliated with the Clinton Campaign.  

Many of these stolen emails, including those from Victims 1 and 2, were later released by the Conspirators through DCLeaks.


     d.     On or about April 6, 2016, the Conspirators created an email account in the name (with a one-letter deviation from the actual spelling) of known members of the Clinton Campaign.  The Conspirators then used that account to send spearphishing emails to the work accounts of more than thirty different Clinton Campaign employees.  

In the spearphishing emails, LUKASHEV and his co-conspirators embedded a link purporting to direct the recipient to a document titled "Hillary-Clinton-favorable-rating.xlsx."  In fact, this link directed the recipients' computers to a GRU-created website.




22.     The Conspirators spearphished individuals affiliated with the Clinton Campaign throughout the summer of 2016.  For example, on or about July 27, 2016, the conspirators attempted after hours to spearphish for the first time email accounts at a domain hosted by a third-party provider and used by Clinton's personal office.  At or around the same time, they also targeted seventy-six email addresses at the domain for the Clinton Campaign.


Hacking into the DCCC Network


23.     Beginning in or around March 2016, the conspirators, in addition to their spearphishing efforts, researched the DCCC and DNC computer networks to identify technical specifications and vulnerabilities.



     a.     For example, beginning on or about March 15, 2016, YERMAKOV ran a technical query for the DNC's internet protocol configurations to identify connected devices.

     b.     On or about the same day, YERMAKOV searched for open-source information about the DNC network, the Democratic Party, and Hillary Clinton.

     c.     On or about April 7, 2016, YERMAKOV ran a technical query for the DCCC's internet protocol configurations to identify connected devices.


24.     By in or around April 2016, within days of YERMAKOV's searches regarding the DCCC, the Conspirators hacked into the DCCC computer network.  Once they gained access, they installed and managed different types of malware to explore the DCCC network and steal data.




     a.     On or about April 12, 2016, the Conspirators used the stolen credentials of a DCCC Employee ("DCCC Employee 1") to access the DCCC network.  DCCC Employee 1 had received a spearphishing email from the Conspirators on or about April 6, 2016, and entered her password after clicking on the link.


     b.     Between in or around April 2016 and June 2016, the Conspirators installed multiple versions of their X-Agent malware on at least ten DCCC computers, which allowed them to monitor individual employees' computer activity, steal passwords, and maintain access to the DCCC network.


     c.     X-Agent malware implanted on the DCCC network transmitted information from the victims' computers to a GRU-leased server located in Arizona.  The Conspirators referred to this server as their "AMS" panel.  KOZACHEK, MALYSHEV, and their co-conspirators logged into the AMS panel to use X-Agent's keylog and screenshot functions in the course of monitoring and surveilling activity on the DCCC computers.  


The keylog function allowed the Conspirators to capture keystrokes entered by DCCC employees.  The Screenshot function allowed the Conspirators to take pictures of the DCCC employees' computer screens.




     d.     For example, on or about April 14, 2016, the Conspirators repeatedly activated X-Agent's keylog and screenshot functions to surveil DCCC Employee 1's computer activity over the course of eight hours.  During that time, the Conspirators captured DCCC Employee 1's communications with co-workers and the passwords she entered while working on fundraising and voter outreach projects.  

Similarly, on or about April 22, 2016, the Conspirators activated X-Agent's keylog and screenshot functions to capture the discussions of another DCCC Employee ("DCCC Employee 2") about the DCCC's finances, as well as her individual banking information and other personal topics.

_____________________________

(to be continued...)




-30-

No comments:

Post a Comment