WASHINGTON – Russia is the leading suspect in a sophisticated cyberattack on the unclassified email network of the U.S. military’s Joint Staff that prompted the Pentagon last month to restrict access to portions of that network, U.S. officials said on Thursday.
Early reports firmly linked Russia to the attack, said one U.S. official, who declined to be named since the investigation is still underway.
“It was a spearphishing attack traced to that country,” said the official, when asked about Russia’s possible involvement. Spearphishing emails purport to be from colleagues.
A second official, who also spoke on condition of anonymity, described Russia as a leading suspect but cautioned that it would take time for investigators to firmly attribute blame.
The Pentagon declined comment on the investigation.
In late April, U.S. Defense Secretary Ash Carter blamed Russian hackers for a cyberintrusion on an unclassified U.S. military network this year, saying they discovered an old vulnerability that had not been patched.
In that case, Carter said the Pentagon quickly identified the compromise and had incident responders “hunting the intruders within 24 hours.”
In this latest case, the U.S. military’s Joint Staff, which employs about 2,500 civilian and uniformed personnel, have seen their unclassified email access severely restricted since the last weekend of July. The rest of the Pentagon appeared to be unaffected.
Officials told Reuters the attack bore the hallmarks of the actions of a foreign state, as opposed to a less sophisticated hacker.
Dmitri Alperovitch, chief technology officer and co-founder of CrowdStrike, a cybersecurity firm, said his company had seen a “massive escalation” in cyberattacks tied to the Russian government since sanctions were imposed last year over Moscow’s actions in Ukraine.
He said he had no information on the alleged attack on the Joint Chiefs of Staff network, but his firm had detected a large number of attacks against U.S. national security agencies and commercial companies by a hacker group called “Cozy Bear” that had clear ties to the Russian government.
Cozy Bear engaged in a variety of cyberattacks ranging from spearphishing to more sophisticated and complex attacks. The latest set of attacks used hundreds of emails with a zipfile attachment that, if double-clicked, could introduce the malware to an organization’s networks, Alperovitch said.
“Once they get a beachhead, their tradecraft is very, very good,” he said.
In a time of both misinformation and too much information, quality journalism is more crucial than ever.
By subscribing, you can help us get the story right.