Hackers working for Western intelligence agencies broke into Russian Internet search company Yandex late last year and deployed a rare type of malware in an attempt to spy on user accounts, four people with knowledge of the matter said.
The malware, called Regin, is known to be used by the “Five Eyes” intelligence-sharing alliance of the US, Britain, Australia, New Zealand and Canada, the sources said.
Intelligence agencies in the alliance declined to comment. Western cyberattacks against Russia are seldom acknowledged or spoken about in public.
It could not be determined which of the five “Five Eyes” members was behind the attack on Yandex, said sources in Russia and elsewhere, three of whom had direct knowledge of the hack.
The breach took place between October and November last year.
Yandex spokesman Ilya Grabovsky acknowledged the incident in a statement, but declined to provide further details.
“This particular attack was detected at a very early stage by the Yandex security team. It was fully neutralized before any damage was done,” Grabovsky said.
The company also said that “the Yandex security team’s response ensured that no user data was compromised by the attack.”
The company, widely known as “Russia’s Google” for its array of online services from Internet search to e-mail and taxi reservations, says it has more than 108 million monthly users in Russia. It also operates in Belarus, Kazakhstan and Turkey.
The sources who described the attack said that the hackers appeared to be searching for technical information that could explain how Yandex authenticates user accounts. Such information could help a spy agency impersonate a Yandex user and access their private messages.
The hack of Yandex’s research and development unit was intended for espionage purposes rather than to disrupt or steal intellectual property, the sources said.
The hackers covertly maintained access to Yandex for at least several weeks without being detected, they said.
The Regin malware was identified as a “Five Eyes” tool in 2014 following revelations by former US National Security Agency (NSA) contractor Edward Snowden.
Reports by The Intercept, in partnership with a Dutch and Belgian newspaper, tied an earlier version of Regin to a hack at Belgian telecom firm Belgacom in 2013 and said Britain’s Government Communications Headquarters (GCHQ) and the NSA were responsible.
At the time GCHQ declined to comment and the NSA denied involvement.
Security experts say attributing cyberattacks can be difficult because of obfuscation methods used by hackers, but some of the Regin code found on Yandex’s systems had not been deployed in any known previous cyberattacks, the sources said, reducing the risk that attackers were deliberately using known Western hacking tools to cover their tracks.
Yandex called in Russian cybersecurity company Kaspersky, which established the attackers were targeting a group of developers inside Yandex, three sources said.
A private assessment by Kaspersky concluded that the hackers likely tied to Western intelligence breached Yandex using Regin.
A Kaspersky spokeswoman declined to comment.
The US Office of the Director of National Intelligence declined to comment. The White House National Security Council did not respond to a request for comment.
The Kremlin did not immediately respond to a request for comment.
Moscow-based Yandex, listed on the NASDAQ in the US and the Moscow Exchange, has come under tighter regulatory control by the Russian government after the passage of new Internet laws.
Former Russian minister of economics and trade Herman Gref became a Yandex board member in 2014.
US firm Symantec said it had also recently discovered a new version of Regin. It declined to discuss where the sample was discovered, citing client confidentiality.
“Regin is the crown jewel of attack frameworks used for espionage. Its architecture, complexity and capability sits in a ballpark of its own,” Symantec Security Response technical director Vikram Thakur said. “We have seen different components of Regin in the past few months. Based on the victimology coupled with the investment required to create, maintain and operate Regin, we believe there are at best a handful of countries that could be behind its existence.”
An Australian university student who has never visited China and has only a modest social media following would seem an unlikely target for the Chinese government. However, when a Chinese Ministry of Foreign Affairs spokesman personally denounced Drew Pavlou at a news conference, it was just the next phase in an extraordinary campaign against the 21-year-old that has fueled concerns over China’s targeting of critics overseas. Pavlou first placed himself in the superpower’s sights when in July last year he organized a small sit-in at the University of Queensland, where he studies, to protest against various Chinese government policies. Since then, the Global
‘ASKED TO MOVE OUT’: Indonesian coast guard personnel argued with a Chinese vessel over territorial claims after it entered the country’s exclusive economic zone An Indonesian patrol ship confronted a Chinese coast guard vessel that spent almost three days in waters where Indonesia claims economic rights and that are near the southernmost part of China’s disputed claims to the South China Sea. The Indonesian Maritime Security Agency on Friday night detected Chinese ship 5204 entering Indonesia’s exclusive economic zone (EEZ) in what Indonesia calls the North Natuna Sea. The agency sent a patrol ship that closed within 1km of the Chinese coast guard vessel and they communicated to affirm their position and their nation’s claims to the area, Indonesian Maritime Security Agency head Aan Kurnia said. “We
BEFORE WINTER COMES: Snow cuts off roads into Ladakh for four months or more each year, so the crunch is on to get food, tents and high-altitude equipment to Leh From deploying mules to large transport aircraft, the Indian military has activated its entire logistics network to transport supplies to thousands of troops for a harsh winter along a bitterly disputed Himalayan border with China. In the past few months, one of India’s biggest military logistics exercises in years has brought vast quantities of ammunition, equipment, fuel, winter supplies and food into Ladakh, a region bordering Tibet that India administers as a union territory, officials said. The move was triggered by a border standoff with China in the snow deserts of Ladakh that began in May and escalated in June into hand-to-hand
Since her personal telephone number was posted online, Hong Kong democracy advocate and Hong Kong Confederation of Trade Unions chairperson Carol Ng has received menacing calls from strangers and been bombarded with messages calling her a “cockroach.” She is not alone. A sophisticated and shady Web site called HK Leaks has ramped up its “doxxing” — where people’s personal details are published online — of Hong Kong democracy advocates, targeting those it says have broken Hong Kong’s National Security Law. Promoted by groups linked to the Chinese Chinese Communist Party and hosted on Russia-based servers, HK Leaks has become the most prominent “doxxing”