Russian Hackers Pose an International Persistent Threat

The murky world of highly competitive international sport means that some individual nation state players – and national intelligence agencies will go to extraordinary lengths (and illegal means such as a well-funded and highly effective disinformation campaigns) in order to maintain their positions as world class competitors and players on the global stage. Nations are not averse to bending or even breaking the rules. This is especially true when it comes to the use of performance enhancing drugs. Major transgressors have traditionally included countries from the former Soviet Union – including Russia, as well as China. But these campaigns only remain effective if the hackers are not caught. Recently the United States has exposed state sponsored Russian hackers and accused them of posing a persistent threat across a number of areas – including ‘Black Hat’ operations to engage in disinformation campaigns and discredit anti-doping officials (and U.S. athletes themselves) following negative reporting on the use of illegal performance enhancing drugs during the Sochi Olympics of 2014.

Justice Department allegations against Russian hackers

The American Justice Department claims that GRU officials were hard at work undermining the advocacy actions (aimed at investigating and putting an end to Russian doping) of anti-doping organizations for an extended period. Targets included officials and athletes. The GRU is known as the Main Directorate of the General Staff of the Armed Forces of the Russian Federation – one of the most influential players in the Russian intelligence services and a hotbed of Russian hacker activity and major supporter of the persistent threat that is posed by Russian intelligence operations.

It is claimed that the activities of the GRU are a reaction to the exposure of state sponsored doping campaigns in 2015. According to the U.S. Department of Justice indictment, the defendants stole and disseminated the personal information of several prominent anti-doping officials and 250 athletes following the 2014 Sochi Olympics.

The GRU-trained hackers stand accused of identity theft, including the theft of login credentials via traditional phishing techniques. These login credentials were then supplied to hackers who used the cover of a hacktivist group named the ‘Fancy Bears’. The login credentials could then be used to gain access to the medical profiles of certain athletes.

The hacking activity began just after Russia was banned from the Olympics due to state sponsored doping revelations. The International Olympic Committee limited Russian athletes’ participation in the 2016 Games. The IOC also banned Russia from the 2018 Olympics, though some Russian athletes, who were cleared of doping charges were allowed to participate under the Olympic flag. It was after this embarrassment that the hackers began to target U.S. and international entities (and at least one corporation) seen as being hostile to Russia’s strategic interests.

A campaign of distraction

The purpose of the hacking campaign seems clear. Take the case of four-time Olympic gold medalist runner Mo Farah. The ‘Fancy Bears had gained access to his “biological passport.” This set of information tracks the blood data of athletes in order to monitor the possibility of doping. The group then posted the contents of Farah’s profile over social media, pointing to results that claimed he was “likely doping.” By use of this method, the hackers were able to turn media attention away from accusations of Russia’s structured and well planned campaign of doping. The GRU was focused on pointing the finger at other countries as well. The DoJ indictment claims that the hackers spoke to 186 different reporters in order to “amplify the exposure” of their message. This is only one of the examples of the persistent threat posed by hackers supported by a number of intelligence operations across the globe.

According to Attorney General Jeff Sessions, “State-sponsored hacking and disinformation campaigns pose serious threats to our security and to our open society, but the Department of Justice is defending against them.”

Department of Justice announces further charges

The charges against the seven Russian GRU members have now moved beyond accusations of hacking. The seven GRU operatives now face charges relating to “persistent and sophisticated criminal cyber intrusions.” The additional charges include wire fraud, money laundering and identity theft.


Leave a Reply

Please Login to comment
Notify of

Enjoyed the article?

Get notified of new articles and relevant events.

Thank you for being a part of the CPO Magazine community.

Something went wrong.

Before you go ...

Let us notify you of new articles and relevant events.

Thank you for being a part of the CPO Magazine community.

Something went wrong.

Follow CPO Magazine