Tuesday, July 09, 2019

Continued from previous entry

2. Intrusions into the DCCC and DNC Networks 

a. Initial Access

By no later than April 12, 2016, the GRU had gained access to the DCCC computer network using the credentials stolen from a DCCC employee who had been successfully spearphished the week before. Over the ensuing weeks, the GRU traversed the network, identifying different computers connected to the DCCC network. By stealing network access credentials along the way (including those of IT administrators with unrestricted access to the system), the GRU compromised approximately 29 different computers on the DCCC network. 119

Approximately six days after first hacking into the DCCC network, on April 18, 2016, GRU officers gained access to the DNC network via a virtual private network (VPN) connection120 between the DCCC and DNC networks. 121 Between April 18, 2016 and June 8, 2016, Unit 26165 compromised more than 30 computers on the DNC network, including the DNC mail server and shared file server. 122

b. Implantation of Malware on DCCC and DNC Networks

Unit 26165 implanted on the DCCC and DNC networks two types of customized malware, 123 known as "X-Agent" and "X-Tunnel"; Mimikatz, a credential-harvesting tool; and rar.exe, a tool used in these intrusions to compile and compress materials for exfiltration. X-Agent was a multi-function hacking tool that allowed Unit 26165 to log keystrokes, take screenshots, and gather other data about the infected computers (e.g., file directories, operating systems). 124 XTunnel was a hacking tool that created an encrypted connection between the victim DCCC/DNC computers and GRU-controlled computers outside the DCCC and DNC networks that was capable of large-scale data transfers. 125 GRU officers then used X-Tunnel to exfiltrate stolen data from the victim computers.

Basically, X-Agent was used for spying and gathering information and X-Tunnel was used for encryption and theft.

119 Investigative Technique

120 A VPN extends a private network, allowing users to send and receive data across public networks (such as the internet) as if the connecting computer was directly connected to the private network. The VPN in this case had been created to give a small number of DCCC employees access to certain databases housed on the DNC network. Therefore, while the DCCC employees were outside the DNC's private network, they could access parts of the DNC network from their DCCC computers.

121 Investigative Technique SM-2589105-HACK, serial 5.

More of the same internal SM numbers that are in evidence files.

122 Investigative Technique  SM-2589105-HACK, serial 5.
middle servers 123 "Malware" is short for malicious software, and here refers to software designed to allow a third party to infiltrate a computer without the consent or knowledge of the computer's user or operator.

124 Investigative Technique

125 Investigative Technique

The Russians went through a lot of trouble and they planned on continuing their harvest of information.

To operate X-Agent and X-Tunnel on the DCCC and DNC networks, Unit 26165 officers set up a group of computers outside those networks to communicate with the implanted malware. 126 The first set of GRU-controlled computers, known by the GRU as "middle servers," sent and received messages to and from malware on the DNC/DCCC networks. The middle servers, in turn, relayed messages to a second set of GRU-controlled computers, labeled internally by the GRU as an "AMS Panel." The AMS Panel Investigative Technique served as a nerve center through which GRU officers monitored and directed the malware's operations on the DNC/DCCC networks. 127

The AMS Panel used to control X-Agent during the DCCC and DNC intrusions was housed on a leased computer near IT       Arizona. 128 Investigative Technique 
129

Investigative Technique  

Footnote 126 In connection with these intrusions, the GRU used computers (virtual private networks, dedicated servers operated by hosting companies, etc.) that it leased from third-party providers located all over the world. The investigation identified rental agreements and payments for computers located in, inter alia, -Investigative Technique all of which were used in the operations targeting the U.S. election.

Footnote 127 Netyksho Indictment ,r 25.

Footnote 128 Netyksho Indictment ,r 24( c ).

Footnote 129 Netyksho Indictment ,r 24(b ). 

The footnotes in this section indicate definitions which the Special Counsel Report does not contain in a dedicated area. So, it is easier to read this way. If there is any lack of understanding Former FBI Director Mueller spells it out at the bottom of the page.

The Arizona-based AMS Panel also stored thousands of files containing keylogging sessions captured through X-Agent. These sessions were captured as GRU officers monitored DCCC and DNC employees' work on infected computers regularly between April 2016 and June 2016. Data captured in these key logging sessions included passwords, internal communications between employees, banking information, and sensitive personal information. 

The DNC, DCCC and the Clinton Campaign didn't have a chance. The Russians had set up a spy network that would follow the users of over 30 computers in their daily activities. That is very scary. Every American should be grateful the FBI is this sophisticated and knows exactly what they are looking at. It is over for the people that Putin's intelligence agency was using to gather information. Just imagine if it wasn't. The FBI performed vital tasks to end the danger to American lives.

I don't want to hear another word about a Deep State, it doesn't exist. What does exist are highly qualified professionals that work very hard with every skill they have to protect this country.

I am going to take a break.