<span id="hs_cos_wrapper_post_body" class="hs_cos_wrapper hs_cos_wrapper_meta_field hs_cos_wrapper_type_rich_text" style="" data-hs-cos-general-type="meta_field" data-hs-cos-type="rich_text" ><p><span>As attention turns to the cyber threats facing 2018's midterm elections, we're learning hard lessons from what went down in 2016. (Plus, what we can presumably except coming up) There were multiple aspects to my research and human intelligence operations exploring what was going on behind the scenes in 2016, but this article focuses on only one, Guccifer 2.0.</span></p> <!--more--> <p style="text-align: center;">&nbsp;<strong style="background-color: transparent;">So, there were lots of 2016 election related incidents. Just to name a few:</strong></p> <ul> <li>DNC got hacked</li> <li>DCCC got hacked</li> <li>John Podesta’s email got hacked</li> </ul> <p>We know there were four primary election outlets, including Wikileaks, Guccifer 2.0, DC Leaks and Internet Research Agency. Quick org chart breakdown here:</p> <p>&nbsp;</p> <p><img src="https://info.threatstop.com/hubfs/Graph1.png" alt="Graph1.png" width="454" height="205"></p> <p>&nbsp;</p> <p><span style="background-color: transparent;">Investigating these leaks, I turned my attention to Guccifer 2.0, who showed up (timely) after Guccifer 1.0 was arrested for cyber crime. Early on, G2 started dropping docs from the Democratic Congressional Campaign Committee (DCCC). As this is happening, I’m trying to wrap my head around the threat severity we’re facing here. Next question, how do I get more info? Is it possible to now secure thousands of independent election jurisdictions? (Gave up on this, but more on that later) So, how do you collect data on a super-secret information operation? The old-fashioned way, of course. Chat them up.</span></p> <p style="text-align: center;">&nbsp;</p> <p style="text-align: center;"><strong>The Dilemma: How do you develop a fully backstopped persona on short notice to start eliciting a foreign intelligence operative? </strong></p> <p style="text-align: center;"><strong>Spoiler Alert: You play on their own biases.</strong></p> <p style="text-align: center;">&nbsp;</p> <p>Just like that, two months of exchanges between myself and G2 began. Normally, you wouldn’t expose your identity to the “bad guy,” but this exchange was very different. They already knew exactly who I was.</p> <p>&nbsp;</p> <p style="text-align: center;"><strong>Four Main Takeaways:</strong></p> <ol> <li>They should have already known who I was <em>and</em> that I was researching election related issues.</li> <li>Whatever information they had, they were looking for media and, specifically, Republican officials to leak it to.</li> <li>My own identity was the best backdrop.</li> <li>No incremental risk from adversary if I was known.</li> </ol> <p>Now you’re thinking, there’s no way this is going to work, right? Well, I was just as surprised as you are. Let's delve in.</p> <h5 style="text-align: center;"><strong>Exhibit A: The Introduction.</strong></h5> <p><strong><img src="https://info.threatstop.com/hubfs/G2Pic.png" alt="G2Pic.png" width="454" height="281"></strong></p> <p style="text-align: center;">&nbsp;</p> <h5 style="text-align: center;"><strong style="background-color: transparent;">Exhibit B: Guccifer 2.0 Did No Vetting.</strong></h5> <p><strong style="background-color: transparent;"><img src="https://info.threatstop.com/hubfs/image.png" style="width: 177px;"><img src="https://info.threatstop.com/hubfs/image-1.png" style="width: 272px;"></strong></p> <p><span style="background-color: transparent;">With a simple Google search, it would have come up that I’ve been investigating numerous breaches. (No evidence they had any idea until two months later) They did, however, look at the domain of my email (<a href="http://johnbambenek.com/" target="_blank">johnbambenek.com</a>), which is my “political” domain.</span></p> <p>&nbsp;</p> <h5 style="text-align: center;"><strong>Exhibit C: IT TOOK TWO MONTHS FOR HIM TO FIGURE THIS OUT. TWO. MONTHS. (... What!?)</strong></h5> <p><strong><img src="https://info.threatstop.com/hubfs/image-2.png"></strong></p> <p><strong>Key Takeaways: </strong></p> <ol> <li>G2 had no adult supervision.</li> <li>First rule of HUMIT: Always keep them talking.</li> <li>First rule of CI: STFU.</li> </ol> <h5 style="text-align: center;"><strong>Exhibit D: Guccifer 2.0 Had No Media Training &amp; Had No Idea What to Do with The Info He Had.</strong></h5> <p style="text-align: left;">&nbsp;</p> <p><img src="https://info.threatstop.com/hubfs/image-3.png"></p> <p><img src="https://info.threatstop.com/hubfs/image-4.png"></p> <p>&nbsp;</p> <p><span style="background-color: transparent;">Come to find out, the docs he had were worthless. G2 and WikiLeaks made no attempt to package a story. He didn’t release the same docs he sent me and started scrubbing metadata after being “caught” red handed.</span></p> <p>&nbsp;</p> <p><img src="https://info.threatstop.com/hubfs/image-5.png"></p> <p><img src="https://info.threatstop.com/hubfs/image-6.png"></p> <p>&nbsp;</p> <p style="text-align: center;"><strong>After All This, What Are the Key Takeaways?</strong></p> <ul> <li>Guccifer 2.0 didn’t have a deep political understanding, making their efforts way less effective.</li> <li>They didn’t attempt to package or create a narrative.</li> <li>There were no apparent relationships with friendly journalists.</li> <li>There was no “investment” in these operations and they made simple OPSEC mistakes (in part, using an unsupervised cutout)</li> </ul> <p style="text-align: center;">&nbsp;<strong style="background-color: transparent;">So, What Can You Expect Next?</strong></p> <ul> <li>They got better over time – 2016’s influence op was luckier than it was sophisticated.</li> <li>The US is vulnerable because of own doing. We even undermine our own institutions.</li> <li>In politics, if you get under their skin, you get another helping. They’ll be invested next time.</li> </ul> <p><span style="background-color: transparent;">Check out the work I’m doing as ThreatSTOP’s VP of Security &amp; Research with a quick demo </span><a href="http://www.threatstop.com/request-demo" style="background-color: transparent;">here</a><span style="background-color: transparent;">. Subscribe to our blog for more articles from me in my new series. Next up: How we can help secure the 2018 elections.</span></p> <p>&nbsp;</p> <p><span style="background-color: transparent;"><img src="https://info.threatstop.com/hubfs/image-7.png" style="display: block; margin-left: auto; margin-right: auto;"></span></p></span>