Somebody figured out that if the US intelligence community uses relatively hackable contractors that could be weak information security leaks, the same scenario applies to our Russian friends as well.
Red faces in Moscow this weekend, with the news that hackers have successfully targeted FSB—Russia's Federal Security Service, making off with 7.5 terabytes of data which exposed secret projects to de-anonymize Tor browsing, scrape social media, and help the state split its internet off from the rest of the world. The data was passed to mainstream media outlets for publishing.
A week ago, on July 13, hackers under the name 0v1ru$ reportedly breached SyTech, a major FSB contractor working on a range of live and exploratory internet projects. With the data stolen, 0v1ru$ left a smiling Yoba Face on SyTech's homepage alongside pictures purporting to showcase the breach. 0v1ru$ then passed the data itself to the larger hacking group Digital Revolution, which shared the files with various media outlets and the headlines with Twitter—taunting FSB that the agency should maybe rename one of its breached activities "Project Collander."
Digital Revolution has targeted FSB before. It is unknown how tightly the two hacking groups are linked.
BBC Russia broke the news that 0v1ru$ had breached SyTech's servers and shared details of contentious cyber projects, projects that included social media scraping (including Facebook and LinkedIn), targeted collection and the "de-anonymization of users of the Tor browser." The BBC described the breach as possibly "the largest data leak in the history of Russian intelligence services."
As well as defacing SyTech's homepage with the Yoba Face, 0v1ru$ also detailed the project names exposed: "Arion", "Relation", "Hryvnia," alongside the names of the SyTech project managers. The BBC report claims that no actual state secrets were exposed.
The projects themselves appear to be a mix of social media scraping (Nautilus), targeted collection against internet users seeking to anonymize their activities (Nautilus-S), data collection targeting Russian enterprises (Mentor), and projects that seem to relate to Russia's ongoing initiative to build an option to separate the internal internet from the world wide web (Hope and Tax-3). The BBC claims that SyTech's projects were mostly contracted with Military Unit 71330, part of FSB's 16th Directorate which handles signals intelligence, the same group accused of emailing spyware to Ukranian intelligence officers in 2015.
Nautilus-S, the Tor de-anonymization project, was actually launched in 2012 under the remit of Russia's Kvant Research Institute, which comes under FSB's remit. Russia has been looking for ways to compromise nodes within Tor's structure to either prevent off-grid communications or intercept those communications. None of which is new news. It is believed that some progress has been made under this project. Digital Revolution claims to have hacked the Kvant Research Institute before
The preparatory activities for splitting off a "Russian internet," follow Russian President Vladimir Putin signing into law provisions for "the stable operation of the Russian Internet (Runet) in case it is disconnected from the global infrastructure of the World Wide Web." The law set in train plans for an alternative domain name system (DNS) for Russia in the event that it is disconnected from the World Wide Web, or, one assumes, in the event that its politicians deem disconnection to be beneficial. Internet service providers would be compelled to disconnect from any foreign servers, relying on Russia's DNS instead.
There is nothing newsworthy in the projects exposed here, everything was known or expected. The fact of the breach itself, its scale and apparent ease is of more note. Contractors remain the weak link in the chain for intelligence agencies worldwide—to emphasize the point, just last week, a former NSA contractor was jailed in the U.S. for stealing secrets over two decades. And the fallout from Edward Snowden continues to this day.
As anyone who works in the information security field can tell you, the biggest problem is people slipping up and putting data where it can be accessed, not getting around firewalls and security measures. Doesn't take much to break into your house if you leave the key under the mat.
Shame though that the Russians got hit by their own game. Just a crying shame.