Leaked Chats Show Alleged Russian Spy Seeking Hacking Tools
This Tuesday, 31, 2018 photo shows the entrance of the building of the Russian military intelligence service, named in Robert Muellerās July 13 indictment, as home to GRU Unit 26165 in Moscow, Russia. The leak of an alleged Russian hackerās conversations with a security researcher shows more about the shadowy group of 12 Russian spies indicted by the FBI last month for targeting the 2016 U.S. election. (AP Photo/Alexander Zemlianichenko)
MOSCOW (AP) ā Six years ago, a Russian-speaking cybersecurity researcher received an unsolicited email from Kate S. Milton.
Milton claimed to work for the Moscow-based anti-virus firm Kaspersky. In an exchange that began in halting English and quickly switched to Russian, Milton said she was impressed by the researcherās work on exploits ā the digital lock picks used by hackers to break into vulnerable systems ā and wanted to be copied in on any new ones that the researcher came across.
āYou almost always have all the top-end exploits,ā Milton said, after complimenting the researcher about a post to her website, where she often dissected malicious software.
āSo that our contact isnāt one-sided, Iād offer you my help analyzing malicious viruses, and as I get new samples Iāll share,ā Milton continued. āWhat do you think?ā
The researcher ā who works as a security engineer and runs the malware-sharing site on the side ā always had a pretty good idea that Milton wasnāt who she said she was. Last month, she got confirmation via an FBI indictment.
The indictment , made public on July 13, lifted the lid on the Russian hacking operation that targeted the 2016 U.S. presidential election. It identified āKate S. Miltonā as an alias for military intelligence officer Ivan Yermakov, one of 12 Russian spies accused of breaking into the Democratic National Committee and publishing its emails in an attempt to influence the 2016 election.
The researcher, who gave her exchanges with Milton to The Associated Press on condition of anonymity, said she wasnāt pleased to learn she had been corresponding with an alleged Russian spy. But she wasnāt particularly surprised either.
āThis area of research is a magnet for suspicious people,ā she said.
The researcher and Milton engaged in a handful of conversations between April 2011 and March 2012. But even their sparse exchanges, along with a few digital breadcrumbs left behind by Yermakov and his colleagues, offer insight into the men behind the keyboards at Russiaās Main Intelligence Directorate, or GRU.
It isnāt unusual for messages like Miltonās to come in out of the blue, especially in the relatively small world of independent malware analysts.
āThere was nothing particularly unusual in her approach,ā the researcher said. āI had very similar interactions with amateur and professional researchers from different countries.ā
The pair corresponded for a while. Milton shared a piece of malicious code at one point and sent over a hacking-related YouTube video at another, but contact fizzled out after a few months.
Then, the following year, Milton got back in touch.
āItās been all work, work, work,ā Milton said by way of apology, before quickly getting to the point. She needed new lock picks.
āI know that you can help,ā she wrote. āIām working on a new project and I really need contacts that can provide information or have contacts with people who have new exploits. I am willing to pay for them.ā
In particular, Milton said she wanted information on a recently disclosed vulnerability codenamed CVE-2012-0002 - a critical Microsoft flaw that could allow hackers to remotely compromise some Windows computers. Milton had heard that someone had already cobbled together a working exploit.
āIād like to get it,ā she said.
The researcher demurred. The trade in exploits ā for use by spies, cops, surveillance companies or criminals ā can be a seedy one.
āI usually steer clear from any wannabe buyers and sellers,ā she told the AP.
She politely declined - and never heard from Milton again.
Miltonās Twitter account ā whose profile photo features āLostā star Evangeline Lilly ā is long dormant. The last few messages carry urgent, awkwardly worded appeals for exploits or tips about vulnerabilities.
āHelp me find detailed description CVE-2011-0978,ā one message reads, referring to a bug in PHP, a coding language often used for websites. āNeed a work exploit,ā the message continues, ending with a smiley face.
It isnāt clear whether Yermakov was working for the GRU when he first masqueraded as Kate S. Milton. Miltonās Twitter silence ā starting in 2011 ā and the reference to a ānew projectā in 2012 might hint at a new job.
In any case, Yermakov wasnāt working for the anti-virus firm Kaspersky ā not then and not ever, the company said in a statement.
āWe donāt know why he allegedly presented himself as an employee,ā the statement said.
Messages sent by the AP to Kate S. Miltonās Gmail account were not returned.
The exchanges between Milton (Yermakov) and the researcher could be read in different ways.
They might show that the GRU was trying to cultivate people in the information security community with an eye toward getting the latest exploits as soon as possible, said Cosimo Mortola, a threat intelligence analyst at the cybersecurity company FireEye.
Itās also possible that Yermakov might have initially worked as an independent hacker, hustling for spy tools before being hired by Russian military intelligence ā a theory that makes sense to defense and foreign policy analyst Pavel Felgenhauer.
āFor cyber, you have to hire boys that understand computers and everything the old spies at the GRU donāt understand,ā Felgenhauer said. āYou find a good hacker, you recruit him and give him some training and a rank ā a lieutenant or something ā and then he will do the same stuff.ā
The leak of Miltonās conversations shows how the glare of publicity is revealing elements of the hackersā methods ā and perhaps even hints about their private lives.
Itās possible, for example, that Yermakov and many of his colleagues commute to work through the arched entrance to Komsomolsky 22, a military base in the heart of Moscow that serves as home to the alleged hackerās Unit 26165. Photos shot from inside show itās a well-kept facility, with a czarist-era facade, manicured lawns, flower beds and shady trees in a central courtyard.
The AP and others have tried to trace the menās digital lives, finding references to some of those indicted by the FBI in academic papers on computing and mathematics, on Russian cybersecurity conference attendee lists or ā in the case of Cpt. Nikolay Kozachek, nicknamed ākazakā ā written into the malicious code created by Fancy Bear, the nickname long applied to the hacking squad before their identities were allegedly revealed by the FBI.
One of Kozachekās other nicknames also appears on a website that allowed users to mine tokens for new weapons to use in the first-person shooter videogame āCounter Strike: Global Offensiveā ā providing a flavor of the hackersā extracurricular interests.
The AP has also uncovered several social media profiles tied to another of Yermakovās indicted colleagues ā Lt. Aleksey Lukashev, allegedly the man behind the successful phishing of the email account belonging to Hillary Clintonās campaign chairman, John Podesta.
Lukashev operated a Twitter account under the alias āDen Katenberg,ā according to an analysis of the indictment as well as data supplied by the cybersecurity firm Secureworks and Twitterās āFind My Friendsā feature.
A tipster using the Russian facial recognition search engine FindFace recently pointed the AP to a VKontatke account that, while using a different name, appears active and features photos of the same young, Slavic-looking man.
Many of his posts and his friends appear to originate from a district outside Moscow known as Voskresensky. The photos show him cross-country skiing at night, wading in emerald waters somewhere warm and visiting Yaroslavl, an ancient city northwest of Moscow. One video appeared to show Russiaās 2017 Spasskaya Tower Festival, a military music festival popular with officers.
The AP could not establish with certainty that the man on the VKontatke account is Lukashev. Several people listed as friends either declined to comment when approached by the AP or said Lukashevās name was unknown to them.
Shortly thereafter, the profileās owner locked down his account, making his vacation snaps invisible to outsiders.
Satter reported from London. Kate de Pury in Moscow contributed to this report.
Online:
The exchanges between the cybersecurity researcher and Kate S. Milton are available here: https://www.documentcloud.org/documents/4620715-Kate-S-Milton-Chats.html
Satter can be reached at: http://raphaelsatter.com
BY RAPHAEL SATTER & MATHEW BODNER
MOSCOW (AP) ā Six years ago, a Russian-speaking cybersecurity researcher received an unsolicited email from Kate S. Milton.
Milton claimed to work for the Moscow-based anti-virus firm Kaspersky. In an exchange that began in halting English and quickly switched to Russian, Milton said she was impressed by the researcherās work on exploits ā the digital lock picks used by hackers to break into vulnerable systems ā and wanted to be copied in on any new ones that the researcher came across.
āYou almost always have all the top-end exploits,ā Milton said, after complimenting the researcher about a post to her website, where she often dissected malicious software.
āSo that our contact isnāt one-sided, Iād offer you my help analyzing malicious viruses, and as I get new samples Iāll share,ā Milton continued. āWhat do you think?ā
The researcher ā who works as a security engineer and runs the malware-sharing site on the side ā always had a pretty good idea that Milton wasnāt who she said she was. Last month, she got confirmation via an FBI indictment.
The indictment , made public on July 13, lifted the lid on the Russian hacking operation that targeted the 2016 U.S. presidential election. It identified āKate S. Miltonā as an alias for military intelligence officer Ivan Yermakov, one of 12 Russian spies accused of breaking into the Democratic National Committee and publishing its emails in an attempt to influence the 2016 election.
The researcher, who gave her exchanges with Milton to The Associated Press on condition of anonymity, said she wasnāt pleased to learn she had been corresponding with an alleged Russian spy. But she wasnāt particularly surprised either.
āThis area of research is a magnet for suspicious people,ā she said.
The first email from āKate S. Miltonā (AP Photo)
The researcher and Milton engaged in a handful of conversations between April 2011 and March 2012. But even their sparse exchanges, along with a few digital breadcrumbs left behind by Yermakov and his colleagues, offer insight into the men behind the keyboards at Russiaās Main Intelligence Directorate, or GRU.
It isnāt unusual for messages like Miltonās to come in out of the blue, especially in the relatively small world of independent malware analysts.
āThere was nothing particularly unusual in her approach,ā the researcher said. āI had very similar interactions with amateur and professional researchers from different countries.ā
The pair corresponded for a while. Milton shared a piece of malicious code at one point and sent over a hacking-related YouTube video at another, but contact fizzled out after a few months.
Then, the following year, Milton got back in touch.
āItās been all work, work, work,ā Milton said by way of apology, before quickly getting to the point. She needed new lock picks.
āI know that you can help,ā she wrote. āIām working on a new project and I really need contacts that can provide information or have contacts with people who have new exploits. I am willing to pay for them.ā
In particular, Milton said she wanted information on a recently disclosed vulnerability codenamed CVE-2012-0002 - a critical Microsoft flaw that could allow hackers to remotely compromise some Windows computers. Milton had heard that someone had already cobbled together a working exploit.
āIād like to get it,ā she said.
The researcher demurred. The trade in exploits ā for use by spies, cops, surveillance companies or criminals ā can be a seedy one.
āI usually steer clear from any wannabe buyers and sellers,ā she told the AP.
She politely declined - and never heard from Milton again.
Miltonās Twitter account ā whose profile photo features āLostā star Evangeline Lilly ā is long dormant. The last few messages carry urgent, awkwardly worded appeals for exploits or tips about vulnerabilities.
āHelp me find detailed description CVE-2011-0978,ā one message reads, referring to a bug in PHP, a coding language often used for websites. āNeed a work exploit,ā the message continues, ending with a smiley face.
It isnāt clear whether Yermakov was working for the GRU when he first masqueraded as Kate S. Milton. Miltonās Twitter silence ā starting in 2011 ā and the reference to a ānew projectā in 2012 might hint at a new job.
In any case, Yermakov wasnāt working for the anti-virus firm Kaspersky ā not then and not ever, the company said in a statement.
āWe donāt know why he allegedly presented himself as an employee,ā the statement said.
Messages sent by the AP to Kate S. Miltonās Gmail account were not returned.
The exchanges between Milton (Yermakov) and the researcher could be read in different ways.
They might show that the GRU was trying to cultivate people in the information security community with an eye toward getting the latest exploits as soon as possible, said Cosimo Mortola, a threat intelligence analyst at the cybersecurity company FireEye.
Itās also possible that Yermakov might have initially worked as an independent hacker, hustling for spy tools before being hired by Russian military intelligence ā a theory that makes sense to defense and foreign policy analyst Pavel Felgenhauer.
āFor cyber, you have to hire boys that understand computers and everything the old spies at the GRU donāt understand,ā Felgenhauer said. āYou find a good hacker, you recruit him and give him some training and a rank ā a lieutenant or something ā and then he will do the same stuff.ā
The leak of Miltonās conversations shows how the glare of publicity is revealing elements of the hackersā methods ā and perhaps even hints about their private lives.
Itās possible, for example, that Yermakov and many of his colleagues commute to work through the arched entrance to Komsomolsky 22, a military base in the heart of Moscow that serves as home to the alleged hackerās Unit 26165. Photos shot from inside show itās a well-kept facility, with a czarist-era facade, manicured lawns, flower beds and shady trees in a central courtyard.
The AP and others have tried to trace the menās digital lives, finding references to some of those indicted by the FBI in academic papers on computing and mathematics, on Russian cybersecurity conference attendee lists or ā in the case of Cpt. Nikolay Kozachek, nicknamed ākazakā ā written into the malicious code created by Fancy Bear, the nickname long applied to the hacking squad before their identities were allegedly revealed by the FBI.
One of Kozachekās other nicknames also appears on a website that allowed users to mine tokens for new weapons to use in the first-person shooter videogame āCounter Strike: Global Offensiveā ā providing a flavor of the hackersā extracurricular interests.
The AP has also uncovered several social media profiles tied to another of Yermakovās indicted colleagues ā Lt. Aleksey Lukashev, allegedly the man behind the successful phishing of the email account belonging to Hillary Clintonās campaign chairman, John Podesta.
Lukashev operated a Twitter account under the alias āDen Katenberg,ā according to an analysis of the indictment as well as data supplied by the cybersecurity firm Secureworks and Twitterās āFind My Friendsā feature.
A tipster using the Russian facial recognition search engine FindFace recently pointed the AP to a VKontatke account that, while using a different name, appears active and features photos of the same young, Slavic-looking man.
Many of his posts and his friends appear to originate from a district outside Moscow known as Voskresensky. The photos show him cross-country skiing at night, wading in emerald waters somewhere warm and visiting Yaroslavl, an ancient city northwest of Moscow. One video appeared to show Russiaās 2017 Spasskaya Tower Festival, a military music festival popular with officers.
The AP could not establish with certainty that the man on the VKontatke account is Lukashev. Several people listed as friends either declined to comment when approached by the AP or said Lukashevās name was unknown to them.
Shortly thereafter, the profileās owner locked down his account, making his vacation snaps invisible to outsiders.
Satter reported from London. Kate de Pury in Moscow contributed to this report.
Online:
The exchanges between the cybersecurity researcher and Kate S. Milton are available here: https://www.documentcloud.org/documents/4620715-Kate-S-Milton-Chats.html
Satter can be reached at: http://raphaelsatter.com
Comments