You are here
Phishing attack on reporters probing Russia: ProtonMail
REPORTERS investigating Russian military intelligence have been targeted by highly sophisticated cyber attacks through their encrypted e-mail accounts, with evidence suggesting Moscow was responsible, e-mail service provider ProtonMail and journalists said on Saturday.
The phishing attack, which sought to dupe users into sharing their ProtonMail passwords, was aimed at journalists from the award-winning website Bellingcat, which helped identify the agents who poisoned former Russian spy Sergei Skripal in Britain.
Geneva-based ProtonMail said in a statement that "the evidence (along with independent third-party assessments) seem to suggest an attack of Russian origin". The company's chief executive Andy Yen told AFP that the operation "was one of the best-run phishing attacks we have ever seen". Bellingcat journalist Christo Grozev, who led the site's work on the Skripal case, said he had no doubt Russia's GRU military intelligence unit was responsible and that it marked "a quantum leap" in terms of their technical sophistication.
"It was very convincing," he told AFP, noting that no Bellingcat reporters gave up their passwords.
ProtonMail, which describes itself as the world's most secure e-mail provider, has become increasingly popular with journalists and others who handle sensitive information because user communications are protected by end-to-end encryption.
The Harvard-educated Mr Yen, who worked at Europe's nuclear research lab CERN for five years before founding ProtonMail, said that the company could not read users' e-mails even if it wanted to - in clear contrast with Google's Gmail.
The phishing attacks against Bellingcat reporters occurred this week, with "e-mails sent to the targeted users claiming to be from the ProtonMail team, asking the targets to enter their... login credentials", the company said.
Mr Grozev said that despite his technical savvy and awareness that he was a target, he "would have been fooled" if not for prior warning from a contact who had received a similar phishing e-mail earlier this month.
While the assault on Bellingcat journalists was concentrated over the past few days, he claimed that multiple investigators and researchers from other organisations that work on Russia have received phishing e-mails in their ProtonMail accounts since April.
Mr Yen said that "putting a precise start date as to when other Russia journalists began to be targeted is a bit more complex and not something that we can confirm with full confidence right now".
He said ProtonMail has alerted the Swiss Federal Police and the government's computer system security office, MELANI, about the events this week.
The company has not yet received any indication that an investigation will be launched, Mr Yen added, noting that he was not optimistic the perpetrators would face justice, in part because Moscow was likely to protect them.
ProtonMail, however, is conducting its own investigation.
But Mr Grozev said the Swiss had a duty to act, given that its .ch domain was used to carry out the phishing operation.
"It is essentially a crime within the digital territory of Switzerland," he said, stressing that the entities who registered the malicious .ch websites are "traceable for (Swiss) authorities".
Swiss Federal Police and MELANI did not immediately respond to a request for comment.
Bellingcat, a highly regarded Britain-based investigative website, has used open-source technology to break a series of stories, notably concerning Russia, including major revelations in the downing of MH17 flight over eastern Ukraine, which has also been linked to Russia's GRU intelligence service. AFP