As attention turns to the cyber threats facing 2018's midterm elections, we're learning hard lessons from what went down in 2016. (Plus, what we can presumably except coming up) There were multiple aspects to my research and human intelligence operations exploring what was going on behind the scenes in 2016, but this article focuses on only one, Guccifer 2.0.
So, there were lots of 2016 election related incidents. Just to name a few:
We know there were four primary election outlets, including Wikileaks, Guccifer 2.0, DC Leaks and Internet Research Agency. Quick org chart breakdown here:
Investigating these leaks, I turned my attention to Guccifer 2.0, who showed up (timely) after Guccifer 1.0 was arrested for cyber crime. Early on, G2 started dropping docs from the Democratic Congressional Campaign Committee (DCCC). As this is happening, I’m trying to wrap my head around the threat severity we’re facing here. Next question, how do I get more info? Is it possible to now secure thousands of independent election jurisdictions? (Gave up on this, but more on that later) So, how do you collect data on a super-secret information operation? The old-fashioned way, of course. Chat them up.
The Dilemma: How do you develop a fully backstopped persona on short notice to start eliciting a foreign intelligence operative?
Spoiler Alert: You play on their own biases.
Just like that, two months of exchanges between myself and G2 began. Normally, you wouldn’t expose your identity to the “bad guy,” but this exchange was very different. They already knew exactly who I was.
Four Main Takeaways:
Now you’re thinking, there’s no way this is going to work, right? Well, I was just as surprised as you are. Let's delve in.
With a simple Google search, it would have come up that I’ve been investigating numerous breaches. (No evidence they had any idea until two months later) They did, however, look at the domain of my email (johnbambenek.com), which is my “political” domain.
Key Takeaways:
Come to find out, the docs he had were worthless. G2 and WikiLeaks made no attempt to package a story. He didn’t release the same docs he sent me and started scrubbing metadata after being “caught” red handed.
After All This, What Are the Key Takeaways?
So, What Can You Expect Next?
Check out the work I’m doing as ThreatSTOP’s VP of Security & Research with a quick demo here. Subscribe to our blog for more articles from me in my new series. Next up: How we can help secure the 2018 elections.