HOW WE PROCESS

1 Submit your enquiry.
2 We will get back to you and review your enquiry.
3 We Simulate Penetration testing

If you still have problems, please let us know, by sending an email to support@cybermetrix.co.uk Thank you!

OPENING HOURS

Mon-Fri 9:00AM - 6:00AM
Sat - 9:00AM-5:00PM
Sunday - Appointment only
GET A QUOTE

Don’t Pin the Macron Email Hack on Russia

Posted on by Christian Hendrix
macron - Don’t Pin the Macron Email Hack on Russia

AFTER A HACKED US election covered in Russian fingerprints, it’s easy to assume that Friday’s megaleak of emails from France’s president-elect Emmanuel Macron was the Kremlin’s work, too. Russia, after all, has the motive, the means, and a very fresh track record of meddling in Western elections to sabotage center-left candidates. But this latest breach, for now, lacks conclusive fingerprints—and what few clues there are have only added to the confusion.

On Friday, nine gigabytes of emails from Macron’s En Marche party spilled onto the web in a collection of torrent files. Within hours, the party had issued a statement blaming that leak on hackers intent to disrupt the democratic process. In the days since, armchair cybersecurity analysts and the media have been quick to conclude that the attack and data dump must have been the work of the same Russian hackers who plagued the US election last summer and fall.

But outside observers who have examined the digital evidence say it’s still too early to draw that conclusion. And doing so not only helps other countries and non-state hacker groups who might use Russia as cover, but also cheapens the act of accusing Russia in cases where the evidence is far stronger—like in last year’s brazen US election interference.

Inconclusive

Plenty of clues do point to Russia as the source of the Macron leaks. But unlike in the case of the US election, those clues don’t yet add up to a clear, glowing trail to Red Square, says Thomas Rid, a professor at King’s College London department of War Studies. “I do think this is more likely than not a Russian operation, but I’d put this at more like 60 percent at this stage,” says Rid, who recently testified at a Senate hearing about Russian interference in the US presidential election. In that case, by contrast, Rid says he has zero doubt that the Kremlin—and specifically a hacking group known as Fancy Bear, or APT 28—was the culprit. But in the Macron case, Rid says, “none of the pieces of evidence that has come out so far is particularly strong in forensic terms. We only have circumstantial evidence. We can’t exclude the possibility that someone is trying to frame someone else.”

A stronger case exists that Russian hackers at least tried to hack the Macron campaign. Late last month, the security firm Trend Micro revealed that the Fancy Bear hacker group, which it calls Pawn Storm, had registered a phishing domain in March designed to impersonate a Microsoft file storage URL for Macron’s party. At the time, En Marche denied that phishing attempt had been successful. And on Monday, even Trend Micro wouldn’t definitively link the pre-election leak with the earlier Russian efforts.

“Trend Micro does not have evidence that this is associated with the group known as Pawn Storm,” the company wrote to WIRED in a statement. “The techniques used in this case seem to be similar to previous attacks. However, without further evidence, it is extremely difficult to attribute this hack to any particular person or group.”

Some of the leaked Microsoft Office files contain an even stranger clue: Cyrillic-character metadata, suggesting they were opened at some point by a computer with Russian-language software settings. The Twitter feed for WikiLeaks points to nine instances in the metadata of the name Roshka Georgiy Petrovich, reportedly an employee of the Russian intelligence contractor Eureka. But that apparent metadata slipup was so clear that some cybersecurity analysts discount it as a possible misdirection technique.

sans titre 2 - Don’t Pin the Macron Email Hack on Russia

Christian Hendrix

Cybersecurity Analyst at Cybermetrix
Christian is passionate about cybersecurity, personal and fair. he brings new ideas and challenge things that could be better. His is to be responsible for the monitoring and analysing of cyberthreats activity for cybermetrix customers systems and the external environment to identify, understand and react to relevant activity. Passionate about Cybersecurity he brings the most relevants blogs articles for Cybermetrix.
sans titre 2 - Don’t Pin the Macron Email Hack on Russia
(Visited 16 times, 1 visits today)
Inside Google’s Global Campaign to Shut Down Phishing
A WannaCry Flaw Could Help Some Victims Get Files Back

Leave a Reply

Be the First to Comment!

Notify of
avatar
wpDiscuz

Cybermetrix cybersecurity group
Our experts will provide the best advice and cybersecurity service in a quick response.

Cybermetrix cybersecurity group
INCIDENT RESPONSE

Our experts will provide the best advice and cybersecurity service in a quick response.

  • SALES ENQUIRY

    04324324///
  • Cyber Incident Helpline

    07804325///
  • EMAIL US

    sales@cybermetrix.co.uk
TOP
Download Free 10 Tips to secure your company PDFGET IT NOW
+