Reporters investigating Russian military intelligence have been targeted by highly sophisticated cyberattacks through their encrypted e-mail accounts, with evidence suggesting Moscow was responsible, the e-mail service provider ProtonMail and journalists said on Saturday.
The phishing attack, which sought to dupe users into sharing their ProtonMail passwords, was aimed at journalists from the award-winning Web site Bellingcat, which helped identify the agents who poisoned former Russian spy Sergei Skripal in Britain.
Geneva-based ProtonMail said in a statement that “the evidence [along with independent third-party assessments] seem to suggest an attack of Russian origin.”
ProtonMail chief executive Andy Yen said that the operation “was one of the best-run phishing attacks we have ever seen.”
Bellingcat journalist Christo Grozev, who led the site’s work on the Skripal case, said he had no doubt Russia’s GRU military intelligence unit was responsible and that it marked “a quantum leap” in terms of their technical sophistication.
“It was very convincing,” he said, noting that no Bellingcat reporters gave up their passwords.
ProtonMail, which describes itself as the world’s most secure e-mail provider, has become increasingly popular among journalists and others who handle sensitive information because user communications are protected by end-to-end encryption.
The Harvard-educated Yen, who worked at the European Organization for Nuclear Research for five years before founding ProtonMail, said that the company could not read users’ e-mails even if it wanted to — in clear contrast with Google’s Gmail.
The phishing attacks against Bellingcat reporters occurred last week, with “e-mails sent to the targeted users claiming to be from the ProtonMail team, asking the targets to enter their ... login credentials,” the company said.
Grozev said that despite his technical savvy and awareness that he was a target, he “would have been fooled” if not for prior warning from a contact who had received a similar phishing email earlier this month.
While the assault on Bellingcat journalists was concentrated over the past few days, Grozen claimed that multiple investigators and researchers from other organizations that work on Russia have received phishing e-mails in their ProtonMail accounts since April.
Yen said that “putting a precise start date as to when other Russia journalists began to be targeted is a bit more complex and not something that we can confirm with full confidence right now.”
Yen said that ProtonMail has alerted the Swiss Federal Police and the government’s computer system security office, MELANI, about the events this week.
The company has not yet received any indication that an investigation will be launched, Yen said, noting that he was not optimistic the perpetrators would face justice, in part because Moscow was likely to protect them.
However, ProtonMail is conducting its own investigation.
Grozen said Switzerland had a duty to act, given that its .ch domain was used to carry out the phishing operation.
“It is essentially a crime within the digital territory of Switzerland,” he said, stressing that the entities who registered the malicious .ch web Wites are “traceable for [Swiss] authorities”.
Swiss Federal Police and MELANI did not immediately respond to a request for comment.
Bellingcat, a highly regarded Britain-based investigative Web site, has used open-source technology to break a series of stories, notably concerning Russia, including major revelations in the downing of MH17 flight over eastern Ukraine on July 17, 2014, which has also been linked to the GRU.
‘TERRORIST ATTACK’: The convoy of Brigadier General Hamdi Shukri resulted in the ‘martyrdom of five of our armed forces,’ the Presidential Leadership Council said A blast targeting the convoy of a Saudi Arabian-backed armed group killed five in Yemen’s southern city of Aden and injured the commander of the government-allied unit, officials said on Wednesday. “The treacherous terrorist attack targeting the convoy of Brigadier General Hamdi Shukri, commander of the Second Giants Brigade, resulted in the martyrdom of five of our armed forces heroes and the injury of three others,” Yemen’s Saudi Arabia-backed Presidential Leadership Council said in a statement published by Yemeni news agency Saba. A security source told reporters that a car bomb on the side of the road in the Ja’awla area in
PRECARIOUS RELATIONS: Commentators in Saudi Arabia accuse the UAE of growing too bold, backing forces at odds with Saudi interests in various conflicts A Saudi Arabian media campaign targeting the United Arab Emirates (UAE) has deepened the Gulf’s worst row in years, stoking fears of a damaging fall-out in the financial heart of the Middle East. Fiery accusations of rights abuses and betrayal have circulated for weeks in state-run and social media after a brief conflict in Yemen, where Saudi airstrikes quelled an offensive by UAE-backed separatists. The United Arab Emirates is “investing in chaos and supporting secessionists” from Libya to Yemen and the Horn of Africa, Saudi Arabia’s al-Ekhbariya TV charged in a report this week. Such invective has been unheard of
US President Donald Trump on Saturday warned Canada that if it concludes a trade deal with China, he would impose a 100 percent tariff on all goods coming over the border. Relations between the US and its northern neighbor have been rocky since Trump returned to the White House a year ago, with spats over trade and Canadian Prime Minister Mark Carney decrying a “rupture” in the US-led global order. During a visit to Beijing earlier this month, Carney hailed a “new strategic partnership” with China that resulted in a “preliminary, but landmark trade agreement” to reduce tariffs — but
SCAM CLAMPDOWN: About 130 South Korean scam suspects have been sent home since October last year, and 60 more are still waiting for repatriation Dozens of South Koreans allegedly involved in online scams in Cambodia were yesterday returned to South Korea to face investigations in what was the largest group repatriation of Korean criminal suspects from abroad. The 73 South Korean suspects allegedly scammed fellow Koreans out of 48.6 billion won (US$33 million), South Korea said. Upon arrival in South Korea’s Incheon International Airport aboard a chartered plane, the suspects — 65 men and eight women — were sent to police stations. Local TV footage showed the suspects, in handcuffs and wearing masks, being escorted by police officers and boarding buses. They were among about 260 South