Why do Russian hackers cast a shadow over the US by disrupting the presidential election and stealing research on coVID-19 vaccines?

Ever since Hillary Clinton’s disastrous email campaign in 2016, the word “hacker” has been synonymous with one country — Russia.

Back in the presidential war four years ago, had it not been for the crucial moment when The scandal over her use of a private email account by Russian spies sent Mrs Clinton’s popularity plummeting, it would not have been Mr Trump leading America’s response to the epidemic.

But all without if, even if the American people how much regret that year by hackers “instigate”, change the station Chengchuan Jianguo has no help, the biggest winner of the election will always be no feelings of the Russian hackers.
It is also because of this incident, people around the world began to notice the strength of Russian hackers.

According to foreign media reports, cyber crimes originating from Russia have existed for many years.
So just how good are the battle nation’s hackers?
To put it another way, they could have caused hundreds of millions of dollars in economic losses to many of America’s leading companies with a single effort.
Back in 2015, 34-year-old Vladimir Drinkman pleaded guilty to one of the “biggest data breach schemes” ever prosecuted in the United States.

According to a statement from the U.S. Department of Justice at the time, his felony caused hundreds of millions of dollars in corporate damage, including damaging corporate networks at major organizations like Nasdaq, Dow Jones, JCP, Heartland Payment Systems and JetBlue, as well as at least a dozen others…
It was a one-man takeover of the nation’s leading company.

Is this the legendary four two dialing thousand jin?
There are plenty of Russian hackers out there. So how arrogant are they, and why should they be in America’s shadow?

“If someone wants to hack you, they can.”

“If a Russian wants to hack you, they have tools,” Patrick Wald, a former NSA hacker, once told local media.
This comes after a 2016 U.S. Department of Homeland Security report confirmed that 75 percent of ransomware was manufactured in Russia.

In the report, the DEPARTMENT of Homeland Security takes a detailed look back at the classic 2016 election hack, the infamous Trump affair.
How bad could it be?
Even now, Americans are worried about whether the 2020 election will be affected again.

And in the 2016 campaign, the Russian hackers working for the government were elaborate and sophisticated.
It took 10 steps to defeat Hillary Clinton.

The first step is to survey the state voter database.
As early as two months before the election, hackers attacked voter registration systems or national websites in at least 21 states and stole the personal information of hundreds of thousands of voters, according to research by US intelligence agencies.
Absurdly, it wasn’t until a year later that the Department of Homeland Security released that their systems had been scanned by hackers.

In addition, the Senate Intelligence Committee report said that in a few states, Russians had access to restricted electoral infrastructure, or at least the ability to modify or delete voter registration data.

Second, attack the Clinton campaign.
One of the most striking elements of Russia’s plan to influence the ELECTION did not involve votes at all. Instead, the GRU, Russia’s military intelligence agency, hacked into emails of Clinton campaign staffers.

That month, agents sent emails to Clinton campaign staffers resembling Google security notifications.
But instead of helping them lock up their accounts, the emails instructed the recipients to click on a link to change their passwords, allowing Russian agents to access their accounts once the users did so.

Using this method, GRU agents stole tens of thousands of emails from Clinton’s campaign staff.
He then created a fake web group called Guccifer 2.0 and Shared emails with wikileaks.
Making it public before the November election diverts her message to voters in the final days of the campaign.

Step three: Attack the DNC.
In fact, the battle hackers weren’t just targeting the Clinton campaign. They also used malicious emails to gain access to the Democratic Congressional Campaign Committee’s network, stealing thousands of emails and election-related documents.

Step four: Attack the DNC.
In early June 2016, after hackers penetrated the Democratic National Committee’s network, Russia set up DCLeaks.com and published thousands of stolen documents and emails there.
Days later, when the Democratic National Committee announced it had been hacked, Russian hackers rushed to create a Guccifer 2.0 avatar to distract attention from them and disguise the hackers’ identity.

Step five: Attack Senator Rubio and other Republicans.
At the time, Clinton wasn’t the only target.
Just after the 2016 election, Republicans Marco Rubio and Lindsey Graham also said their campaign emails had been hacked.

Step six: Attack the REPUBLICAN National Committee.
In addition to some Republicans, Russian hackers have investigated other Republicans, but their efforts have been more limited and less successful than those of Democrats.
In January 2017, then-FBI Director James Comey said russians had tried to attack the Republican National Committee in 2016.

Step 7: Spread the word on social media.
In fact, Russia’s plans to interfere in the 2016 election began in 2014, when it set up a “troll farm” to spread false and defamatory statements online.
Mueller’s Indictment, filed in February 2018, charged 13 Russian citizens and three Russian companies, including Internet research institutions, with conspiracy to defraud the United States, conspiracy to commit bank fraud and conspiracy to steal identity information.

Step eight: March deep into America.
In addition to getting American voters to pay attention to the Internet and read fake news sites, Russians are turning their social media influence into reality.
Some go deep into the United States and travel as grass-roots activists.
In one classic, he hired an American to dress up as Hillary at a west Palm Beach rally and mock MAX.

Step nine: Start wooing the Trump campaign.
They also tried to recruit Mr. Page, a former foreign policy adviser to Mr. Trump, with whom they remained in touch during the election.
As recently as July 2016, Page personally went to Russia to meet with officials.

Step 10: An attempt to build Trump Tower in Moscow.
Economic interests also played an important role in Russia’s relationship with Mr. Trump during the 2016 election.
Despite Mr. Trump’s repeated denials of any business with Russia, his personal lawyer, Mr. Cohen, spent much of 2016 working on the Trump Tower deal in Moscow.

Cohen’s efforts continued into June 2016, including going directly to the Kremlin for help and notifying Trump’s children, Trump Jr. and Ivanka, about 10 times.
Finally, in November 2018, he formally pleaded guilty and fell out with Trump.

That’s how Russian hackers interfered in the U.S. election four years ago.
It is simply a combination of words from the inside and the outside. In the ancient Chinese book “Thirty-six Stratagies”, the strategy of concealing facts, committing murder, creating something out of nothing, fishing in troubled waters, and taking the bottom out of the water is more successful than anyone else.

Accused of stealing research on coVID-19 vaccines, bitcoin is a runaway hit

With that said, how Russian hackers routinely interfere with the U.S. government, here’s a look at their impact on academia and the general public.

What will be the biggest worry of 2020?
Not the US presidential election, but coVID-19!
Just later this month, US media reported that Russian hackers were trying to steal coronavirus vaccine research and break into healthcare facilities where the vaccine was developed.

It is not just the United States but also The United Kingdom and Canada that have claimed that vaccine research has been hacked by Russia.
As recently as Thursday, intelligence agencies in all three countries said they had seen continued attempts by Russian hackers to break into research on a possible coronavirus vaccine.
Western intelligence agencies immediately said they believed the hackers were part of a Russian organization called Cozy Bear.
Intelligence agencies called it APT29, and it’s been mentioned that they also attacked the presidential election in 2016.

“APT29 has long targeted government, diplomatic, think tank, medical and energy groups for intelligence purposes, so we expect everyone to take this threat seriously, “said Anne Neuberger, director of cybersecurity at the NATIONAL Security Agency.

Russia, of course, denies the charge.
“We can say that Russia has nothing to do with these operations,” President Vladimir Putin’s spokesman was quoted as saying by the state-run TASS news agency.
But despite The Russians’ denials, the Americans are adamant that more than 95% of the group is certain it is part of Russian intelligence.

Cozy Bear was first identified as a significant “threat organization” in 2014, according to US cyber security firm Crowdstrike.
The group’s tactics were “aggressive,” the report said. “If we don’t have a flexible response strategy, we can’t respond because they change tools so frequently.”

After the “scourge” of the academic community, of course, the brave hackers also want to eat, folk chives can not be spared.
For the surfers, cybermoney crime is the place to be.

As recently as last year, there was a massive purge inside the FSB.
According to a local news outlet, two agents involved in a Bitcoin racketeering scheme were successfully caught by police.
Another report said two law enforcement officials, Sergei Belov and Alexei Kolbov, had been charged with fraud totaling 65 million roubles ($1 million).
Funnily enough, the two were originally anti-fraud agents tasked with investigating financial crimes, not carrying them out.
How to say, typical “know the law and break the law”.

And the extortion methods of these people, actually not very clever, or even very traditional, but very classic, simply called “fishing.”

According to a “fraud prevention manual” issued by U.S. authorities, they send anonymous emails to the general public that go something like this:

“Hello!
My nickname on the dark Web is DES53.
I hacked into this email box more than six months ago, infected your operating system with a virus, and monitored you for a long time.
Even if you change your password, I’m still intercepting all the cached data on your computer.
Access to all your accounts, social networks, email, browsing history.
So, I have all your contacts, computer files, photos and videos.
What surprises me most is the record of the adult websites you have visited.

Besides, I know you keep secrets from your wife and other people.
You can either ignore the letter or pay me $8,600 in Bitcoin for confidentiality…”

The words seemed light, but they were enough to send shivers down some people’s backs.
After all, human nature can not stand temptation, taking advantage of moral decay, these hackers successfully made a sum of money.
It’s cheaper than a fairy jump, and even if the hackers are tracked down, the suckers who pay out the money are mostly out of luck.

Viewed this way, Russian hackers are simply so powerful that they are as free as if they were in the middle of nowhere, whether in government or private domain.
Come gently and walk with a bowl full of water.
So what has Russia done to make itself fertile ground for hackers?

Train hackers. Russia started out as a baby

On the one hand, the reason why Russian hackers became the top hacker in the world is inseparable from the strength of many people.

It is well known that Russia was founded in 1991, and the country has just experienced great economic difficulties in its history. From the beginning of the economic collapse, coupled with several economic recessions, the whole Russia has been hit particularly hard.

As the saying goes, adversity leads to change.
With the development of the Internet economy in the 1990s, Russian hackers emerged.
In the early days, hackers made western Banks and consumers who used credit CARDS an easy target.
So in the 1990s and early 2000s, the Russian-speaking hacker community flourished.

Fueled by trillions of dollars in cyber money and a generation of money raised online, Russian hacking is booming.

Around 2005, the Russian government also began investing heavily in private technology companies, encouraging them to expand abroad.
Even the government has created its own technology companies, such as Rostekhnologii: founded in November 2007 as a holding company, it has consolidated more than 700 companies, 80% of which operate in the defence sector.
The company, now known as Rostec, employs 453,000 people and operates in more than 60 countries.

Except how bold men are and how productive they are.
Russia is also keen to train hackers to start with babies, which makes it a good time to compare them with other people’s children.

Compared with the United States, a much higher percentage of Russian high school students choose to major in information technology.
One way to measure this is to look at the number of high school students taking advanced Placement computer Science exams in both countries.

According to an analysis by the College Board (PDF), between 2005 and 2016, a total of 270,000 U.S. high school students chose to take the National Computer Science Entrance Exam.

In Russia, by contrast, a 2014 study of computer science by The Perm National Research University found that about 60,000 Russian students a year were registered to take the national equivalent of the U.S. AP.
Over the past decade, 600, 000 Russians have sat high school computer science exams, based on a figure of 60, 000 a year for a decade.

In the National Talent Strategy, an in-depth analysis of information technology job prospects by Microsoft corp., the authors warn that despite the critical importance of computer technology, it is becoming increasingly important.
But computer science is taught in only a few schools in the United States.
While there are more than 42,000 high schools in the U.S. today, only 2,100 qualified to teach AP computer science in 2011, according to the Microsoft study.

In Russia, computer tests start in high school.
According to the education standards of the Russian Federation, informatics is a compulsory subject in secondary schools, and any school can freely choose to include it in the basic or advanced courses of high schools.
The University paper points out that every primary school in Russia has the right to include informatics in its curriculum.
The core contents of THE FES Informatics curriculum in Russian middle schools are as follows:

The theoretical basis, principles of computer function, information technology, network technology, algorithmic approach, programming languages and methods, modeling, information and society.
Starting programming in middle school is like training every kid like Musk.
So winning at the starting line is probably really important.

In addition to the above two reasons, the drive of huge profits is also a big factor.
U.S. Trend Micro has been studying Russian hackers for years, and in 2012, the company released a study called Russia Underground 101 that detailed the tools and services available in their online marketplace, with a clear price tag.

The report notes that the price of the service may depend on who the programmer is.
The price is usually negotiated between the buyer and the programmer, depending on complexity, time, and other factors.
Here are some examples of cybercriminals providing programming services: Perl, PHP, C, Java, etc. Price: $100;
Web server hacker: Starting at $250.

The price of writing and selling Trojans and other malware is on a par, from $1,300 for a Trojan that steals bank accounts to $850 for a Trojan that replaces web data in a customer’s browser.
To put it another way, these are 2012 prices, and with inflation now, Russian hackers are at risk.

It is for all these reasons that the Russian hacking industry has come first, as this group believes: every mess is an opportunity and a node.
So for the United States, Russian hackers are bound to be a shadow of their own for a long time to come.

Leave a Comment

Your email address will not be published.