麻豆果冻传媒

Russia and Cyberspace

Just as war is the continuation of politics by other means, for Russia, cyber operations are a continuation of intelligence operations enabled by other means. For decades, the Russian Federation, and before it the Soviet Union, has been a keen observer of developing intelligence and military tactics, which they are prone to adopt and adapt to a relatively contiguous strategy.

In his exposition on Russia鈥檚 spetsnaz (小锌械褑薪邪蟹), or Special Forces, retired Main Intelligence Directorate (GRU) officer Vladimir Kvachkov observed, 鈥淎 new type of war has emerged, in which armed warfare has given up its decisive place in the achievement of military and political objectives of war to another kind of warfare 鈥 information warfare.鈥1 Kvachkov elucidates two types of information warfare: (1) information-psychological warfare, which is 鈥渃onducted in conditions of natural rivalry, i.e. always,鈥 and (2) information technology warfare, which targets IT systems and is conducted 鈥渄uring wars and armed conflict.鈥 This first definition of information warfare largely comports with Western conceptualizations of the same term. The second is what the West often refers to as either cyber or computer network warfare. In recent years, the Kremlin has begun to leverage both methods and has spawned a third, hybrid method between the two in the form cyber-enabled information operations. In Russian parlance, these psychological information operations are referred to as active measures.

Former KGB Major General Oleg Kalugin has described active measures (邪泻褌懈胁薪褘械 屑械褉芯锌褉懈褟褌懈褟) as actions taken by the then-Soviet Union to discredit geopolitical adversaries and 鈥渃onquer world public opinion.鈥2 Active measures are a key tenet in what is often referred to as 鈥渉ybrid warfare鈥 in the West, where non-military measures are used in concert with military measures to achieve a strategic objective. However, according to Russian doctrine they are used during times of peace and war.

In testimony to the Senate Select Committee on Intelligence in March 2017, King鈥檚 College London War Studies professor Thomas Rid described the historical evolution of Russian active measures well, saying they seek to exploit existing cracks in adversaries.3 He further identified three trends necessary to understand today鈥檚 circumstances. First, for the last 60 years, active measures have become the norm. Second, for the last 20 years, aggressive Russian digital espionage campaigns (i.e. hacking key targets to gather intelligence) have become commonplace. Third, in the last two years, we have seen the Kremlin merge these two trends in the form of cyber-enabled active measures, or鈥攑ut simply鈥攈acking and leaking.

Before exploring how strategy has evolved and manifested in the real world in recent years, it is important to note that, like cyber operations, active measures are not an end, but rather a means. Since the Soviet Era, the Kremlin has employed active measures in an attempt to achieve what the West calls 鈥渞eflexive control鈥 over adversaries, or the ability to alter an adversary鈥檚 perception of the world. Russian pursuit of reflexive control is the product of decades of psychological and mathematical research at Russian military universities on how best to manage and influence an opponent鈥檚 perception of the world. Crucially, distorting an adversary鈥檚 conception of reality not only influences that adversary鈥檚 decision-making calculus, but also makes it more predictable.

The General Staff of the Russian Armed Forces is led by General Valery Gerasimov. Like many Russian military strategists before him, Gerasimov is a keen observer of military and strategic trends in and out of combat. In 2014, he authored a short paper entitled 鈥淭he Value of Science in Prediction,鈥 in which he examines鈥攊n great detail鈥擶estern military strategy and outlines the current and future operational environment from his perspective.4 While the document should not be considered ironclad doctrine as some have dubbed it, it does, nonetheless, provide insight into the most powerful military minds in the Kremlin. Gerasimov notes that 鈥渢he use of political, diplomatic, economic and other non-military measures in combination with the use of military forces鈥 will normalize globally as a part of new, non-linear warfare.5 In short, Russia views the world as locked in ongoing and perpetual conflict between powers where the lines between war and peace are blurry at best and nonexistent at worst.

As Charles Bartles observes, 鈥淥ne of the most interesting aspects of Gerasimov鈥檚 article is his view of the relationship on the use of nonmilitary and military measures in war. The leveraging of all means of national power to achieve the state鈥檚 ends is nothing new for Russia, but now the Russian military is seeing war as being something much more than military conflict.鈥6 For Gerasimov, warfare has become decreasingly linear, and the previously well-defined space between wartime and peacetime has been blurred. To Gerasimov, 鈥渨ars are no longer declared and, when they begin, unfold according to an unusual pattern.鈥7 Notably, Gerasimov鈥檚 long-term view appears to have been molded by observations of U.S. military strategy and action, particularly operations rightly and wrongly attributed to the U.S. in the Balkans in the 1990s and more recent actions in Libya.

Against that broader doctrinal backdrop, it鈥檚 important to draw back the curtain and provide insights on how the government of the Russian Federation leverages information and cyber capabilities as influential tools of state power in the digital age. From here, we will describe the major Russian threat actors, their capabilities and past operations, our analysis of where these teams may apply their capabilities in Latin America and the Caribbean, and the broader implications for the United States and its partners in the region.

A complex web of actors from intelligence agencies and the military to industry, criminal organizations, and the media underpins Russian cyber, information, and influence capacity. The pieces of this network have different鈥晊et often overlapping and competing鈥時oles, responsibilities, and influence in implementing cyber-enabled active measures against domestic and foreign adversaries.

Key Actors: The Russian Intelligence Community

The Russian foreign intelligence apparatus consists of the following three primary organizations. These agencies possess overlapping or unclear responsibilities or remits and compete with one another for political influence and funding.8

  • The Main Intelligence Directorate (GRU)
  • The Federal Security Service (FSB)
  • The Foreign Intelligence Service (SVR)

The Main Intelligence Directorate (GRU)

The Main Intelligence Directorate (袚谢邪胁薪芯械 袪邪蟹胁械写褘胁邪褌械谢褜薪芯械 校锌褉邪胁谢械薪懈械 or GRU in Russian) is the sole intelligence agency surviving from the Soviet era. As the long-standing military intelligence agency, the GRU is primarily tasked with gathering military intelligence and conducting active measures, but plays a subsidiary role in political intelligence, economic intelligence, and counterintelligence.9

In the context of offensive cyber operations and cyber-enabled operations, the GRU is staffed with both network operators and information operators. Referred to variously as Sofacy, APT 28, and Fancy Bear in cybersecurity circles, the GRU鈥檚 network operators exhibit characteristics very similar to the National Security Agency in the United States: a very formal code environment with complex research into cyber vulnerabilities, exploits, and code development.10 The GRU contains Unit 26165, the group accused of compromising the U.S. DCCC and Hillary Clinton presidential campaign.11

The GRU鈥檚 information operations team works closely with its network operators to disseminate stolen and sometimes fake information to the press and public. This group, which is separate from those gathering information, consists of regional experts to craft messaging and operational security specialists to obfuscate the source of messaging. Unit 74455, the unit accused of primarily orchestrating the dissemination of DCCC and Hillary Clinton campaign communications via Guccifer 2.0, DCLeaks, and other personas, also sits within the GRU.

In general, GRU teams target political opposition (domestically and internationally) and the fruits of their hacking activity often support in-house information operations. Cybersecurity firm Crowdstrike has assessed with a medium level of confidence that the team known as Fancy Bear or APT28 is the GRU.

The Federal Security Service (FSB)

The Federal Security Service (肖械写械褉邪谢褜薪邪褟 小谢褍卸斜邪 袘械蟹芯锌邪褋薪芯褋褌懈 or FSB in Russian) is the main successor to the Soviet-era KGB and is a jack-of-all-intelligence-trades, though its primary remit is in counterintelligence and political security.12 Like the GRU, network and information operators sit within the agency, likely in the Second Division of FSB Center 18, also known as the FSB Center for Information Security.13

The agency鈥檚 network operators typically utilize a hacking toolkit with add-ons to customize the tool to a given mission.14 This suggests at least some internal code development and research expertise. The activity of the FSB鈥檚 information operators appears to display slightly different traits from that of their military counterparts. Where the GRU typically co-opts well-known brands on social media and works through traditional media, the FSB takes a noisier approach, creating and using a large number of fake social media accounts to spread information and leverages non-state actors, like the Internet Research Agency, to magnify messaging.15

The Foreign Intelligence Service (SVR)

The Foreign Intelligence Service (小谢褍卸斜邪 袙薪械褕薪械泄 袪邪蟹胁械写泻懈 or SVR in Russian) is Russia鈥檚 external intelligence agency. Despite its title and status as the primary foreign intelligence service, little evidence exists that the SVR is involved in cyber or cyber-enabled operations. Instead, the SVR focuses on the cultivation and maintenance of human intelligence networks.

Uncertain Teams鈥擡nergetic Bear, Palmetto Fusion, Sandworm Team

In addition to the known activities of the FSB and GRU, three teams鈥攐ne no longer operating and two conducting active campaigns鈥攈ave yet to be attributed to one of the two agencies, though it is assessed with a high level of confidence that the teams are Russian state actors. These teams are:

  • Energetic Bear: Operating from the late 2000s until 2014, Energetic Bear conducted economic espionage on the oil and natural gas industry. In 2014, the group began gathering information on SCADA and industrial control system vulnerabilities and was exposed by threat researchers. It promptly ceased operations.16
  • Palmetto Fusion: Operating from 2015 to present, the group consistently compromises or attempts to compromise critical infrastructure, focused primarily on energy utilities. Some threat researchers assess with low confidence that Palmetto Fusion is the same group of individuals as Energetic Bear, operating with new tools and techniques17
  • Sandworm Team: Operating from 2015 to present, the Sandworm Team has repeatedly sabotaged the Ukrainian power grid.18 The NotPetya ransomware displayed operational traits led to the belief by some that the Sandworm Team developed and released the worm.19 Because NotPetya has been attributed by multiple intelligence agencies to the GRU, if the Sandworm Team developed and deployed NotPetya, it team likely resides within the GRU.20 It is also likely that Sandworm operators perpetrated the 2018 attacks on the International Olympic Committee at the start of the Winter Games in Pyeongchang, South Korea, and other global sports governing bodies.

Key Actors: Private and Criminal Groups

In 2017, in response to a question about Russian meddling in U.S. elections, Russian President Vladimir Putin denied state involvement but acquiesced that some 鈥減atriotic hackers鈥 may have attempted to influence the American election. President Putin鈥檚 assertion that the Russian state played no role is deemed false with high confidence. However, it is nonetheless important to recognize the non-state groups that support the activity of the intelligence agencies. These 鈥淧atriotic Hackers鈥 private, non-criminal groups include:

  • Concord Consulting: Concord Consulting and Catering is an organization run by Yevgeny Prigozhin, one of President Putin鈥檚 closest confidants. Prigozhin and Concord Consulting provided the financial backing to the Internet Research Agency. Prigozhin also likely funds Wagner Group, the private military firm active in Syria.
  • Internet Research Agency: This agency is the so-called 鈥淩ussian Troll Farm鈥 that targeted and scaled messaging to key constituents in swing states during the 2016 U.S. election.
  • Digital Security: Accused of providing technical support to the FSB.
  • Kvant Scientific Research Institute: Accused of providing technical support to the FSB.
  • Kaspersky Labs: The relationship between the anti-virus and threat intelligence company and Russian security services is unclear.

In addition, the Russian cybercrime network sometimes works in support of Kremlin objectives. The exact level of coordination and direction exercised over these patriotic hackers is unclear from open-source research. However, activities likely fall somewhere on the spectrum between state-integrated and state-ignored:21

  • State-integrated: The national government conducts the attack using integrated non-state and state resources.
  • State-ordered: The national government directs the attack.
  • State-coordinated: The national government coordinates attacks by suggesting operational details.
  • State-shaped: The state provides some support, but third parties shape and control the operations.
  • State-encouraged: The state encourages activity as a matter of policy, but third parties shape, conduct, and control the operations.
  • State-ignored: The state knows about the activity but is unwilling to prevent it.

A shift in the tenor of Russian non-state cyber activity can be observed around the time the Russian Federation annexed the Crimean Peninsula in Ukraine. According to at least one observer, the pre-annexation attitude was one of state-ignorance. Around and following the culmination of the Sochi Olympics and the annexation of Crimea, the activities of the oligarch-led patriotic hackers followed a model of state shaping, coordination, or even integration much more closely.

Overview of Operations

Trends in Russian cyber activity over the past three years suggest that the Kremlin is, and has been, investing significantly in developing strategy, tactics, and tools to leverage cyber capability. A study conducted by Russian data security company Zecurion Analytics posits that the Kremlin controls 邪 鈥渢op 5鈥 cyber army. According to reports on the Zecurion study, the Kremlin dedicates approximately $300 million per year to offensive cyber forces and employs some 1,000 on-keyboard personnel.22 However, beyond Russian-authored reports that may or may not be Kremlin propaganda, experts have observed a steady increase in both the number and sophistication of Russian-originated cyber activity, suggesting that the Kremlin is investing in this space.

Russian state or state co-opted cyber capability generally follows a number of trends. First, a disproportionate number of attacks exploit vulnerabilities in Adobe Flash, Java, and Internet Explorer. Second, campaigns typically reuse vulnerabilities multiple times, relying on the poor patching practices of their targets. Third, while the tools vary depending on the agency in question, some tactics are generally consistent. For example, the process for compromising targets is often:

  1. Sending a spearphishing email with a malicious attachment or with a spoofed URL (often using bit.ly or other link-shortening tools);
  2. Getting the user to download an attachment or visit a compromised URL to install tailored exploit;
  3. Using newly created access to install a dropper with malware, usually an implant with a Remote Access Tool (RAT);
  4. Creating a link with attacker command and control computer infrastructure using RAT.

Finally, if the objective of the campaign is informational, Russian intelligence services have become adept at integrating their network operators with their information operators. What this means is that the knowledge gained via offensive computer network operations is seamlessly integrated into ongoing or new information operations.

While these process and trends generally hold true for Russian state and criminal actors, different teams display unique strengths and abilities as dictated by their mission sets, budgets, and human technical capacity. Figure 4 outlines the cyber and information capabilities of the most prominent actors introduced above.

Figure 4: Russian Actors and the Capabilities

Actor Operational Characteristics Notable Tools Cyber Capability Informational Capability
The GRU (APT 28 or FancyBear) - 97% of work completed during the working week

- 88% of work done between 8 a.m. and 6 p.m. local (Moscow) time

- Build malware in Russian-language settings
- Backdoor/ Exploit: Xagent

- Backdoor/ Exploit/ Dropper: Sofacy

- Credential Harvester: Sasfis
- Modular: developed a suite of tools that they are able to tailor to targets and 鈥減lug and play鈥

- Formal environment and custom code

- Highly obfuscated

- Leverages open-source repositories to accelerate development and provide deniability

- Once inside target network or device, completes multiple lateral movements via manual and 鈥渓egitimate鈥 means

- Targeted
- Regional specialists

- Not co-located with network operators, who are in a separate building about 5km away, but there is close coordination between teams

- Quality over quantity: a tailored approach to information dissemination, using false identities (DCLeaks, Guccifer 2.0) and WordPress blogs to leak information and propagate narratives.
The FSB (APT 29 or CozyBear) - Lots of hacking activity rather than meticulously targeted activity

- Many jobs, suggesting a good deal of behind-the-scenes coordination

- Highly adaptable (able to counter defensive measures)
- Twitter Backdoor: HAMMERTOSS - Modular

- High obfuscation

- Scattershot: lots of hacking of many different accounts

- Use of open-source repositories
-Quantity over quality: use of bots and fake accounts to disseminate information
Grid Teams (Sandworm Team & Palmetto Fusion) - - Energy Grid Malware: Crash Override/ Industryoer

- Energy Grid Malware: Black Energy 3.0

- Ransomware: NotPetya (alleged)
- Highly sophisticated: obfuscated, targeted, modular, and manipulable

- Generally targets industrial sectors and industrial control systems

- May use DDoS or Ransomware attacks to obscure or distract from grid attacks

- Creates persistent grid access (have access to grid infrastructure in the U.S. and elsewhere), but rarely delivers payload to manipulate systems (Ukraine)
-
The Internet Research Agency - - - - The so-called 鈥淭roll Factory鈥

- Non-governmental organization, funded by Yevgeny Prigozhin (aka 鈥淧utin鈥檚 Chef鈥) and his Concord Consulting firm

- Magnifies and amplifies key information to support Kremlin narratives at home and abroad

- Uses a combination of fake social media accounts run by humans and bots; also creates and administers fake 鈥済roups鈥 on social media websites to organize in-person protests and rallies

- Hundreds of employees

- Well financed (monthly budget of over USD$1.2 million for a single project)

Globally, Russia has leveraged cyber capability in three primary ways: (1) operational preparation of the environment (OPE), (2) cyber warfare, and (3) cyber-enabled influence operations. Here, we describe individual operations of each of these types, in order to help build understanding of how a Russian adversary might leverage cyberspace for strategic gain in Latin America and the Caribbean.

Operational Preparation of the Environment (OPE)

Like most tier-1 cyber powers, Russia engages in robust operational preparation of the environment (OPE), largely as a 鈥渏ust in case鈥 exercise, not necessarily as a sign of impending military operations. Russian cyber operators, most likely from Sandworm team and Palmetto Fusion (likely both within the GRU), consistently develop access to key communications systems (military and civil) and critical infrastructure in adversaries they anticipate could one day engage in active hostilities. Because the high degree of research, time, and effort needed to create and maintain access in adversary critical infrastructure systems, Russia seeks to maintain access points should they wish to conduct cyber warfare (as described below) in the future.

In most cases, these accesses are largely benign and have not been used to create any disruption during peacetime. This type of operation is what has led to recent reporting in the United States regarding Russian cyber activity targeting energy and other critical infrastructure sectors.23 It is also possibly the activity that led to an accidental blast furnace explosion in Germany.24 However, access can go from benign to malicious rapidly, and most of the Russian cyber actors outlined above possess the tools and capability to rapidly escalate its actions to cyber warfare.

Cyber Warfare

The clearest case of intentional cyber warfare conducted by Russian services is currently taking place in Ukraine during ongoing kinetic hostilities. In Ukraine, Russian cyber warfare has taken two shapes: information operations and critical infrastructure attacks.

By targeting mobile networks, Wi-Fi, mobile phones, and other military and civilian communications networks, Russian actors are able to conduct extensive in-theatre information operations. In Ukraine, these activities have included:

  • Psychological and friction operations against troops on the front lines鈥攁nd their families鈥攙ia direct text messages to individuals including things like:
    • 鈥淵our battalion commander has retreated. Take care of yourself.鈥
    • 鈥淵ou are encircled. Surrender. This is your last chance.鈥
    • 鈥淯krainian soldier, what are you doing here? Your family needs you alive.鈥
    • 鈥淵ou will not regain Donbas back. Further bloodshed is pointless.鈥
    • 鈥淯krainian soldier, it鈥檚 better to retreat alive than stay here and die.鈥25
  • Distributed Denial of Service (DDoS) attacks against government and non-government communication systems

In addition to compromising communications systems, Russian actors have demonstrated a proclivity for targeting critical national infrastructure systems for compromise and manipulation. This type of operation relies on the robust OPE described above. The most notable case in the Ukraine occurred during the 2015 and 2016 BlackEnergy attacks on its power grid, which shut power off to more than 200,000 Ukrainians during the cold winter months.

Cyber-Enabled Influence Operations

This final brand of operation, a cyber-enabled influence operation, is perhaps the most widely recognized Russian intelligence operation. While the well-documented activity around the 2016 U.S. presidential election elevated the profile of this tactic to the global political level, Russian intelligence services have engaged in similar information operations for the better part of a century, particularly in Eastern Europe.

Citations
  1. Kvachkov, Vladimir. 2004. 鈥溞⌒啃笛喰叫靶 袪芯褋褋懈懈 (Russia鈥檚 Special Forces).鈥 效邪褋褌褜 褌褉械褌褜褟. 孝械芯褉懈褟 褋锌械褑懈邪谢褜薪褘褏 芯锌械褉邪褑懈泄 (Part 3: Theory of Special Operations). 3.1. 小锌械褑懈邪谢褜薪褘泄 屑械褌芯写 胁械写械薪懈褟 胁芯泄薪褘. 肖芯褉屑褘 谐械芯锌芯谢懈褌懈褔械褋泻芯谐芯 锌褉芯褌懈胁芯斜芯褉褋褌胁邪 (Section 3.1 Special Methods of Warfare. Forms of Geopolitical Conflict). 袙芯械薪薪邪褟 谢懈褌械褉邪褌褍褉邪 (Military Literature).
  2. Thomas Boghardt,鈥 Active Measures: The Russian Art of Disinformation,鈥 International Spy Museum, October 2006
  3. Thomas Rid, Disinformation a primer in Russian active measures and influence campaigns (Washington, DC; Select Committee on Intelligence United States Senate, 2017)
  4. Valeriy Gerasimov, 鈥淭he Value of Science in Prediction,鈥 VPK. 27 Feb 2013,
  5. Quote translated from original Russian. See: Valeriy Gerasimov, 鈥淭he Value of Science in Prediction,鈥 VPK. 27 Feb 2013,
  6. Bartles, Charles K; 鈥淕etting Gerasimov Right.鈥 Military Review. 28 Feb 2016.
  7. Quote translated from original Russian. See: Gerasimov, Valeriy; 鈥淭he Value of Science in Prediction.鈥 VPK. 27 Feb 2013. p. 2.
  8. Mark Galeotti,鈥淧utin鈥檚 Hydra: Inside Russia鈥檚 Intelligence Service,鈥 European Council on Foreign Relations; no date _PUTINS_HYDRA_INSIDE_THE_RUSSIAN_INTELLIGENCE_SERVICES_1513.pdf
  9. ibid
  10. Interview with the author.
  11. U.S. District Court for the District of Columbia, Indictment; USA v. Russian Officials, U.S. District Court for the District of Columbia, July 13, 2018,
  12. Mark Galeotti,鈥淧utin鈥檚 Hydra: Inside Russia鈥檚 Intelligence Service,鈥 European Council on Foreign Relations; no date _PUTINS_HYDRA_INSIDE_THE_RUSSIAN_INTELLIGENCE_SERVICES_1513.pdf
  13. Quinta Jurecic, 鈥淕overnment Indicts FSB Officers and Two Others in Yahoo Hacking Case鈥 lawfareblog.com, March 15, 2017,
  14. Interview with the author.
  15. Interview with the author. Also, see: HAMMERTOSS: Stealthy Tactics Define a Russian Cyber Threat Group
  16. Andy Greenberg, 鈥淵our Guide to Russia鈥檚 Infrastructure Hacking Teams,鈥 wired.com, July 17, 2017,
  17. ibid
  18. ibid
  19. Andy Greenberg, 鈥淧etya Ransomware Epidemic May Be Spillover From Cyberwar.鈥 Wired, June, 28, 2017,
  20. Andy Greenberg, 鈥淭he White House Blames Russia for NotPetya, the Most Costly Cyberattack in History,鈥 wired.com, February 25, 2018,
  21. Jason Healy, 鈥淏eyond Attribution: Seeking National Responsibility for Cyber Attacks,鈥 Atlantic Council, January 2012, .
  22. The report does not appear in the public domain in either English or Russian. Coverage of the report is available at: Pravda. 2017. 鈥淥fficial: Russia has one of the five world鈥檚 most powerful cyber armies.鈥 Pravda.ru. 10 Jan.
  23. US-CERT; ALERT (TA18-074A) Russian Government Cyber Activity Targeting Energy and Other Critical Infrastructure Sectors; US-CERT;
  24. Kim Zettter,鈥淎 Cyberattack Has Caused Confirmed Physical Damage for the Second Time Ever, wired.com, January 8, 2015,
  25. Aaron F. Brantly, Nerea M. Cal and Devlin P. Winkelstein, 鈥淒efending the Borderland: Ukrainian Military Experiences with IO, Cyber, and EW,鈥 Army Cyber Institute at West Point, 2017, from
Russia and Cyberspace

Table of Contents

Close