Russian military hackers tried to steal emails from the Ukrainian energy firm where Hunter Biden, the son of Democratic presidential contender Joe Biden, had a seat on the board, a U.S. cybersecurity firm said on Monday.
Energy company Burisma Holdings Ltd was at the center of attempts by U.S. President Donald Trump last July to pressure Ukrainian authorities to announce an investigation into the Bidens for purported corruption, an effort that has led to the Republican being impeached by the U.S. House of Representatives on charges of abuse of power and obstruction of Congress, Reuters said.
California-based Area 1 Security identified the hacking of Burisma and linked it to Russia's Main Directorate of Military Intelligence, or GRU. The same hacking group, known as "Fancy Bear" by cybersecurity researchers, breached the Democratic National Committee in 2016 in what U.S. investigators described as part of an operation to disrupt that year's election.
"You can see this attack really is starting to parallel with what we saw in 2016," Oren Falkowitz, Area 1's chief executive, said in an interview.
The Russian Defense Ministry did not immediately respond to a request for comment. Officials at the U.S. National Security Agency and the Department of Homeland Security declined to comment.
Burisma did not immediately respond to a request for comment.
A source close to Burisma told Reuters the company's website had been subject to multiple break-in attempts over the past six months but did not provide further details.
What data the hackers were looking to steal is not clear, Area 1 said. Breaching Burisma could yield communications from, to, or about Hunter Biden, who served as a director between 2014 and 2019. A leak of stolen data could potentially affect the impeachment process and U.S. electoral contest.
Area 1 said it became aware of the Russian targeting of Burisma after its email security scanning product found suspicious evidence online, including "decoy domains" – websites designed to imitate legitimate email services used by Burisma's subsidiaries.
Publicly available domain registration records examined by Reuters show that the hackers created the decoy domains between November 11, the day before U.S. Democrats began their first public impeachment hearings, and December 3, the day before the House Judiciary Committee took up the issue.
Area 1's report said it discovered the GRU had targeted two subsidiaries of Burisma, KUB Gas LLC and Esko Pivnich, as well as CUB Energy Inc, which was affiliated with the firm, using lookalike domains intended to trick employees into providing their email passwords.
Burisma and its subsidiaries share the same email server, Area 1 said, meaning a breach at any of the companies could expose them all.
The report gave a limited indication of how Area 1 determined that the lookalike domains were the work of the GRU, pointing mainly to similarities in how the hackers had previously set their digital traps. Area 1 co-founder Blake Darche said unpublished data gathered by his firm linked the operation to a specific officer in Moscow, whose identity he was unable to establish.
But Darch said "we are 100 percent certain" that the GRU was behind the hacking.
An outside researcher, Kyle Ehmke of Virginia-based cybersecurity firm ThreatConnect, who reviewed the malicious domains flagged by Area 1, said based on the information he had seen, he believed "with moderate confidence" that the websites were devised by the GRU.
Ehmke said that the hacking operation against Burisma used tools and methods consistent with Russian hackers associated with the GRU, but that a complete picture was lacking.