New Report Details What Dirty Tricks Russian Cyber Hackers Use to Spread Lies and Mayhem

“Fakes in a forest of facts.”

Monika Skolimowska/Zuma

Fight disinformation: Sign up for the free Mother Jones Daily newsletter and follow the news that matters.


Citizen Lab, a Toronto-based human rights research group that focuses on cybersecurity and surveillance, issued a report Thursday offering a detailed look at what they call an “extensive Russia-linked phishing and disinformation campaign” that targeted journalists and others, many of whom could be seen as undermining Russian President Vladimir Putin, those close to him, or Russian geopolitical interests.

Entitled “Tainted Leaks,” the report traces the evolution of how stolen emails are altered and eventually used to disrupt political campaigns or dishonestly shape public opinion. In this case, the emails and other documents were stolen from the targets, modified in subtle but meaningful ways, published by pro-Russian hacktivists, and amplified by pro-Russian media in an attempt to discredit negative reporting about Putin and his inner circle. It showed how critical journalism was made to appear more subversive than it was by having locally based stories appear to be the work of a CIA operation looking to foment revolution. Aimed at Russia’s domestic population, the disinformation campaign appears designed to distract from any anger or distrust that reporting about Putin’s and his associates’ corruption may have created.

“Russia-linked cyber espionage campaigns, particularly those involving targeting around the 2016 US elections, and more recently the 2017 French election, have dominated the media in recent months,” the report’s authors write, noting that the most persistent victims of such campaigns are journalists, academics, activists, researchers, and others. “A healthy, fully-functioning, and vibrant civil society is the antithesis of non-democratic rule, and as a consequence, powerful elites threatened by their actions routinely direct the powerful spying apparatuses toward civil society to infiltrate, anticipate, and even neutralize their activities.”

Beginning with the successful breach of journalist David Satter’s email box in October 2016, researchers traced its consequences to an operation that targeted 218 unique targets in at least 39 countries. Satter had worked in Russia for years as a writer and journalist but was kicked out of the country in December 2013, likely as a response to his investigative reporting on powerful Russian figures and corruption for the Financial Times and other outlets. While analyzing the phishing email used to access Satter’s email, the Citizen Lab researchers discovered that the breach that snared Satter was potentially linked to a target list that included politicians and other government officials, journalists, academics, leaders of energy and mining companies, UN officials, and military personnel from more than a dozen countries, including the United States and NATO. In many cases, the targets of the campaign weren’t directly attacked, but by targeting people close to them, the perpetrators were able to discredit them nonetheless. Here is an outline of what they found:

Citizen Lab

Once Satter’s email account was accessed, the language of some of his emails was altered to change the context, so that it appeared his Radio Liberty reporting project was much bigger than it was. It also gave the impression that Russia-based journalists contributing to the project, who wrote stories critical of Putin and members of his circle, were funded by foreign money. For example, in some cases, the modifications to Satter’s emails made it appear as though Alexei Navalny, an opposition leader in Russia, was receiving foreign funding to carry on his activities.

The text in red represents text removed from the original document. The text in blue represents text that has been added. Citizen Lab

By studying the URLs used to lure Satter into providing his email login credentials, the researchers believe they’ve found similarities between the operation and that which was used to target Hillary Clinton’s campaign and the Democratic National Committee during the 2016 US presidential election. The group that targeted the Clinton campaign is believed by some researchers and the US government to be APT28, an organization some have tied to Russian intelligence operations. “This similarity suggests possible code re-use,” the researchers write. “The two operations may be using the same phishing ‘kit.'”

The net result of operations such as the one detailed by the Citizen Lab is that by modifying authentic documents and emails in subtle ways, doubt can be cast on entire organizations, campaigns, projects, or individuals themselves. In the context of Russian operations, this is known as “dezinformatsiya,” which is propagating forged documents among legitimate documents to taint and call into question the entire batch.

The researchers acknowledge they have no “smoking gun” evidence pointing to a “particular Russian government agency, despite the overlaps between our evidence and that presented by numerous industry and government reports concerning Russian-affiliated threat actors.” But the researchers note the Russian government is known to use proxy hacking groups to go after targets while maintaining plausible deniability, a practice that has been described by Mark Galeotti of the Institute of International Relations Prague as “guerilla geopolitics” based on its insurgent and asymmetric approach to achieving military and political goals.

“Tainted leaks are a growing and particularly troublesome addition to disinformation tactics, and in the current digital environment are likely to become more prevalent,” the researchers wrote. “Tainted leaks—fakes in a forest of facts—test the limits of how media, citizen journalism, and social media users handle fact checking, and the amplification of enticing, but questionable information.”

WE'LL BE BLUNT

It is astonishingly hard keeping a newsroom afloat these days, and we need to raise $253,000 in online donations quickly, by October 7.

The short of it: Last year, we had to cut $1 million from our budget so we could have any chance of breaking even by the time our fiscal year ended in June. And despite a huge rally from so many of you leading up to the deadline, we still came up a bit short on the whole. We can’t let that happen again. We have no wiggle room to begin with, and now we have a hole to dig out of.

Readers also told us to just give it to you straight when we need to ask for your support, and seeing how matter-of-factly explaining our inner workings, our challenges and finances, can bring more of you in has been a real silver lining. So our online membership lead, Brian, lays it all out for you in his personal, insider account (that literally puts his skin in the game!) of how urgent things are right now.

The upshot: Being able to rally $253,000 in donations over these next few weeks is vitally important simply because it is the number that keeps us right on track, helping make sure we don't end up with a bigger gap than can be filled again, helping us avoid any significant (and knowable) cash-flow crunches for now. We used to be more nonchalant about coming up short this time of year, thinking we can make it by the time June rolls around. Not anymore.

Because the in-depth journalism on underreported beats and unique perspectives on the daily news you turn to Mother Jones for is only possible because readers fund us. Corporations and powerful people with deep pockets will never sustain the type of journalism we exist to do. The only investors who won’t let independent, investigative journalism down are the people who actually care about its future—you.

And we need readers to show up for us big time—again.

Getting just 10 percent of the people who care enough about our work to be reading this blurb to part with a few bucks would be utterly transformative for us, and that's very much what we need to keep charging hard in this financially uncertain, high-stakes year.

If you can right now, please support the journalism you get from Mother Jones with a donation at whatever amount works for you. And please do it now, before you move on to whatever you're about to do next and think maybe you'll get to it later, because every gift matters and we really need to see a strong response if we're going to raise the $253,000 we need in less than three weeks.

payment methods

WE'LL BE BLUNT

It is astonishingly hard keeping a newsroom afloat these days, and we need to raise $253,000 in online donations quickly, by October 7.

The short of it: Last year, we had to cut $1 million from our budget so we could have any chance of breaking even by the time our fiscal year ended in June. And despite a huge rally from so many of you leading up to the deadline, we still came up a bit short on the whole. We can’t let that happen again. We have no wiggle room to begin with, and now we have a hole to dig out of.

Readers also told us to just give it to you straight when we need to ask for your support, and seeing how matter-of-factly explaining our inner workings, our challenges and finances, can bring more of you in has been a real silver lining. So our online membership lead, Brian, lays it all out for you in his personal, insider account (that literally puts his skin in the game!) of how urgent things are right now.

The upshot: Being able to rally $253,000 in donations over these next few weeks is vitally important simply because it is the number that keeps us right on track, helping make sure we don't end up with a bigger gap than can be filled again, helping us avoid any significant (and knowable) cash-flow crunches for now. We used to be more nonchalant about coming up short this time of year, thinking we can make it by the time June rolls around. Not anymore.

Because the in-depth journalism on underreported beats and unique perspectives on the daily news you turn to Mother Jones for is only possible because readers fund us. Corporations and powerful people with deep pockets will never sustain the type of journalism we exist to do. The only investors who won’t let independent, investigative journalism down are the people who actually care about its future—you.

And we need readers to show up for us big time—again.

Getting just 10 percent of the people who care enough about our work to be reading this blurb to part with a few bucks would be utterly transformative for us, and that's very much what we need to keep charging hard in this financially uncertain, high-stakes year.

If you can right now, please support the journalism you get from Mother Jones with a donation at whatever amount works for you. And please do it now, before you move on to whatever you're about to do next and think maybe you'll get to it later, because every gift matters and we really need to see a strong response if we're going to raise the $253,000 we need in less than three weeks.

payment methods

We Recommend

Latest

Sign up for our free newsletter

Subscribe to the Mother Jones Daily to have our top stories delivered directly to your inbox.

Get our award-winning magazine

Save big on a full year of investigations, ideas, and insights.

Subscribe

Support our journalism

Help Mother Jones' reporters dig deep with a tax-deductible donation.

Donate