fb-pixel Skip to main content

Russia appears to carry out hack through system used by US aid agency

The headquarters for the US Agency for International Development is seen in Washington. The state-backed Russian cyber spies behind the SolarWinds hacking campaign launched a targeted spear-phishing assault on US and foreign government agencies and think tanks using an email marketing account of the US Agency for International Development, Microsoft said, late Thursday.
The headquarters for the US Agency for International Development is seen in Washington. The state-backed Russian cyber spies behind the SolarWinds hacking campaign launched a targeted spear-phishing assault on US and foreign government agencies and think tanks using an email marketing account of the US Agency for International Development, Microsoft said, late Thursday.J. David Ake/Associated Press

Hackers linked to Russia’s main intelligence agency surreptitiously seized an email system used by the State Department’s international aid agency to burrow into the computer networks of human rights groups and other organizations of the sort that have been critical of President Vladimir Putin, Microsoft Corp. disclosed Thursday.

Discovery of the breach comes only three weeks before President Biden is scheduled to meet Putin in Geneva, and at a moment of increased tension between the two nations — in part because of a series of increasingly sophisticated cyberattacks emanating from Russia.

The newly disclosed attack was also particularly bold: By breaching the systems of a supplier used by the federal government, the hackers sent out genuine-looking emails to more than 3,000 accounts across more than 150 organizations that regularly receive communications from the United States Agency for International Development. Those emails went out as recently as this week, and Microsoft said it believes the attacks are ongoing.

The email was implanted with code that would give the hackers unlimited access to the computer systems of the recipients, from “stealing data to infecting other computers on a network,” Tom Burt, a Microsoft vice president, wrote Thursday night.

Advertisement



Last month, Biden announced a series of new sanctions on Russia and the expulsion of diplomats for a sophisticated hacking operation, called SolarWinds, that used novel methods to breach at least seven government agencies and hundreds of large US companies.

That attack went undetected by the US government for nine months, until it was discovered by a cybersecurity firm. In April, Biden said he could have responded far more strongly, but “chose to be proportionate” because he did not want “to kick off a cycle of escalation and conflict with Russia.”

The Russian response nonetheless seems to have been escalation. The malicious activity was underway as recently as the past week. That suggests that the sanctions and whatever additional covert actions the White House carried out — part of a strategy of creating “seen and unseen” costs for Moscow — has not choked off the Russian government’s appetite for disruption.

Advertisement



A spokesperson for the Cybersecurity and Infrastructure Security Agency at the Department of Homeland Security said late Thursday that the agency was “aware of the potential compromise” at the Agency for International Development and that it was “working with the FBI and USAID to better understand the extent of the compromise and assist potential victims.”

Microsoft identified the Russian group behind the attack as Nobelium, and said it was the same group responsible for the SolarWinds hack. Last month, the American government explicitly said that SolarWinds was the work of the SVR, one of the most successful spinoffs from the Soviet-era KGB.

The same agency was involved in the hacking of the Democratic National Committee in 2016, and before that, in attacks on the Pentagon, the White House email system, and the State Department’s unclassified communications.

It has grown increasingly aggressive and creative, federal officials and experts say. The SolarWinds attack was never detected by the US government, and was carried out through code implanted in network management software that the government and private companies use widely. When customers updated the SolarWinds software — much like updating an iPhone overnight — they were unknowingly letting in an invader.

Among the victims last year were the departments of Homeland Security and Energy, as well as nuclear laboratories.

Advertisement



When Biden came to office, he ordered a study of the SolarWinds case, and officials have been working to prevent future “supply chain” attacks, in which adversaries infect software used by federal agencies. That is similar to what happened in this case, when Microsoft’s security team caught the hackers using a widely used email service, provided by a company called Constant Contact, to send malicious emails that appeared to come from genuine Agency for International Development addresses.

But the content was, at times, hardly subtle. In one email sent through Constant Contact’s service Tuesday, the hackers highlighted a message claiming that “Donald Trump has published new emails on election fraud.” The email bore a link that, when clicked, drops malicious files onto the computers of the recipients.

Microsoft noted that the attack differed “significantly” from the SolarWinds hack, using new tools and tradecraft in an apparent effort to avoid detection. It said that the attack was still in progress and that the hackers were continuing to send spearphishing emails, with increasing speed and scope. That is why Microsoft took the unusual step of naming the agency whose email addresses were being used and of publishing samples of the fake email.

In essence, the Russians got into the Agency for International Development email system by routing around the agency and going directly after its software suppliers. Constant Contact manages mass emails and other communications on the aid agency’s behalf.

Advertisement



“Nobelium launched this week’s attacks by gaining access to the Constant Contact account of USAID,” Burt of Microsoft wrote. Constant Contact could not be reached for comment.

Microsoft, like other major firms involved in cybersecurity, maintains a vast sensor network to look for malicious activity on the internet, and is frequently a target itself. It was deeply involved in revealing the SolarWinds attack.

In this case, Microsoft reported, the goal of the hackers was not to go after the State Department or the aid agency, but to use their connections to get inside groups that work in the field — and in many cases rank among Putin’s most potent critics.