Page 8 - ARUBA TODAY
P. 8

A8   WORLD NEWS
                   Thursday 2 augusT 2018
            Leaked chats show alleged Russian spy seeking hacking tools




            By RAPHAEL SATTER                                                                                                   boys that understand com-
            MATTHEW BODNER                                                                                                      puters  and  everything  the
            MOSCOW (AP) — Six years                                                                                             old spies at the GRU don't
            ago,  a  Russian-speaking                                                                                           understand,"  Felgenhauer
            cybersecurity   researcher                                                                                          said.    "You  find  a  good
            received  an  unsolicited                                                                                           hacker, you recruit him and
            email from Kate S. Milton.                                                                                          give him some training and
            Milton  claimed  to  work  for                                                                                      a  rank  —  a  lieutenant  or
            the  Moscow-based  anti-                                                                                            something — and then he
            virus  firm  Kaspersky.  In  an                                                                                     will do the same stuff."
            exchange  that  began  in                                                                                           ___
            halting  English  and  quickly                                                                                      The  leak  of  Milton's  con-
            switched to Russian, Milton                                                                                         versations  shows  how  the
            said she was impressed by                                                                                           glare of publicity is reveal-
            the  researcher's  work  on                                                                                         ing  elements  of  the  hack-
            exploits  —  the  digital  lock                                                                                     ers'  methods  —  and  per-
            picks  used  by  hackers  to                                                                                        haps even hints about their
            break  into  vulnerable  sys-                                                                                       private lives.
            tems — and wanted to be                                                                                             It's  possible,  for  example,
            copied in on any new ones                                                                                           that  Yermakov  and  many
            that  the  researcher  came                                                                                         of his colleagues commute
            across.                                                                                                             to work through the arched
            "You almost always have all   In this file photo taken on Saturday, July 14, 2018, a man walks past the building of the Russian   entrance  to  Komsomolsky
            the  top-end  exploits,"  Mil-  military intelligence service in Moscow, Russia.                                    20-22,  a  military  base  in
            ton said, after compliment-                                                                        Associated Press  the  heart  of  Moscow  that
            ing the researcher about a                                                                                          serves  as  home  to  the  al-
            post to her website, where  The  researcher  and  Milton  can provide information or  It  isn't  clear  whether  Yer-  leged  hackers'  Unit  26165.
            she  often  dissected  mali-  engaged  in  a  handful  of  have contacts with people  makov was working for the  Photos  shot  from  inside
            cious software.              conversations     between  who  have  new  exploits.  I  GRU when he first masquer-    show it's a well-kept facility,
            "So  that  our  contact  isn't  April 2011 and March 2012.  am willing to pay for them."  aded as Kate S. Milton. Mil-  with  a  czarist-era  facade,
            one-sided, I'd offer you my  But  even  their  sparse  ex-  In  particular,  Milton  said  ton's Twitter silence — start-  manicured  lawns,  flower
            help  analyzing  malicious  changes, along with a few  she wanted information on  ing in 2011 — and the ref-        beds and shady trees in a
            viruses,  and  as  I  get  new  digital  breadcrumbs  left  a recently disclosed vulner-  erence  to  a  "new  project"  central courtyard.
            samples  I'll  share,"  Milton  behind  by  Yermakov  and  ability  codenamed  CVE-    in 2012 might hint at a new  The  AP  and  others  have
            continued.  "What  do  you  his colleagues, offer insight  2012-0002 - a critical Micro-  job.  In  any  case,  Yerma-  tried  to  trace  the  men's
            think?"                      into  the  men  behind  the  soft  flaw  that  could  allow  kov  wasn't  working  for  the  digital  lives,  finding  refer-
            The  researcher  —  who  keyboards at Russia's Main  hackers  to  remotely  com-       anti-virus  firm  Kaspersky  —  ences  to  some  of  those
            works  as  a  security  engi-  Intelligence Directorate, or  promise  some  Windows  not then and not ever, the  indicted by the FBI in aca-
            neer and runs the malware-   GRU.                         computers.    Milton   had  company  said  in  a  state-  demic papers on comput-
            sharing  site  on  the  side  —  ___                      heard  that  someone  had  ment.                          ing  and  mathematics  ,  on
            always  had  a  pretty  good  It isn't unusual for messages  already  cobbled  together  "We don't know why he al-  Russian  cybersecurity  con-
            idea  that  Milton  wasn't  like Milton's to come in out  a working exploit.           legedly  presented  himself  ference  attendee  lists  or
            who she said she was. Last  of  the  blue,  especially  in  "I'd like to get it," she said.  as an employee," the state-  — in the case of Cpt. Niko-
            month,  she  got  confirma-  the  relatively  small  world  The  researcher  demurred.  ment said.                  lay  Kozachek,  nicknamed
            tion via an FBI indictment.  of  independent  malware  The  trade  in  exploits  —  for  Messages sent by the AP to  "kazak"  —  written  into  the
            The  indictment  ,  made  analysts.                       use  by  spies,  cops,  surveil-  Kate  S.  Milton's  Gmail  ac-  malicious  code  created
            public on July 13, lifted the  "There  was  nothing  par-  lance  companies  or  crimi-  count were not returned.   by  Fancy  Bear,  the  nick-
            lid  on  the  Russian  hacking  ticularly  unusual  in  her  ap-  nals — can be a seedy one.  The  exchanges  between  name  long  applied  to  the
            operation  that  targeted  proach,"  the  researcher  "I  usually  steer  clear  from  Milton (Yermakov) and the  hacking squad before their
            the  2016  U.S.  presidential  said. "I had very similar inter-  any  wannabe  buyers  and  researcher  could  be  read  identities were allegedly re-
            election.  It  identified  "Kate  actions  with  amateur  and  sellers," she told the AP.  in different ways.       vealed by the FBI.
            S.  Milton"  as  an  alias  for  professional   researchers  She politely declined - and  They  might  show  that  the  One  of  Kozachek's  other
            military  intelligence  officer  from different countries."  never  heard  from  Milton  GRU was trying to cultivate  nicknames also appears on
            Ivan  Yermakov,  one  of  12  The  pair  corresponded  for  again.                     people  in  the  information  a website that allowed us-
            Russian  spies  accused  of  a  while.  Milton  shared  a  ___                         security community with an  ers to mine tokens for new
            breaking  into  the  Demo-   piece of malicious code at  Milton's  Twitter  account  —  eye toward getting the lat-  weapons to use in the first-
            cratic National Committee  one point and sent over a  whose  profile  photo  fea-      est exploits as soon as possi-  person shooter videogame
            and  publishing  its  emails  hacking-related  YouTube  tures  "Lost"  star  Evangeline  ble, said Cosimo Mortola, a  "Counter  Strike:  Global  Of-
            in an attempt to influence  video at another, but con-    Lilly — is long dormant. The  threat  intelligence  analyst  fensive"  —  providing  a  fla-
            the 2016 election.           tact fizzled out after a few  last few messages carry ur-  at  the  cybersecurity  com-  vor  of  the  hackers'  extra-
            The  researcher,  who  gave  months.                      gent,  awkwardly  worded  pany FireEye.                   curricular interests.
            her  exchanges  with  Milton  Then,  the  following  year,  appeals  for  exploits  or  tips  It's  also  possible  that  Yer-  The  AP  has  also  uncov-
            to The Associated Press on  Milton got back in touch.     about vulnerabilities.       makov  might  have  initially  ered  several  social  media
            condition  of  anonymity,  "It's  been  all  work,  work,  "Help me find detailed de-  worked as an independent  profiles  tied  to  another  of
            said she wasn't pleased to  work,"  Milton  said  by  way  scription   CVE-2011-0978,"  hacker,  hustling  for  spy  Yermakov's  indicted  col-
            learn she had been corre-    of apology, before quickly  one  message  reads,  refer-  tools before being hired by  leagues  —  Lt.  Aleksey  Lu-
            sponding  with  an  alleged  getting  to  the  point.  She  ring to a bug in PHP, a cod-  Russian military intelligence  kashev, allegedly the man
            Russian spy. But she wasn't  needed new lock picks.       ing  language  often  used  —  a  theory  that  makes  behind       the   successful
            particularly surprised either.  "I know that you can help,"  for websites. "Need a work  sense  to  defense  and  for-  phishing  of  the  email  ac-
            "This  area  of  research  is  a  she  wrote.  "I'm  working  on  exploit," the message con-  eign  policy  analyst  Pavel  count  belonging  to  Hillary
            magnet for suspicious peo-   a  new  project  and  I  re-  tinues, ending with a smiley  Felgenhauer.               Clinton's  campaign  chair-
            ple," she said.              ally  need  contacts  that  face.                         "For cyber, you have to hire  man, John Podesta.q
   3   4   5   6   7   8   9   10   11   12   13