July 8, 2025

Russian Cyberthreat Extends to Coronavirus Vaccine Research

072120-10-Russia-Hacking


The Russian cyberthreat goes back over three decades in many areas and shows no signs of letting up.


By Dr. Dorothy Denning
Emeritus Distinguished Professor of Defense Analysis
Naval Postgraduate School


A Russian cyberespionage group that hacked into election networks before the 2016 U.S. presidential election is now attempting to steal coronavirus vaccine information from researchers in the U.S., U.K. and Canada. The governments of those three countries issued a warning on July 16 saying that the group known as APT29 or “Cozy Bear” is targeting vaccine development efforts. The group, which is connected with the FSB, Russia’s internal security service, had gotten inside the Democratic National Committee networks prior to the 2016 election.

This latest incident illustrates yet again how, beyond carrying all of our phone, text and internet communications, cyberspace is an active battleground, with cybercriminals, government agents and even military personnel probing weaknesses in corporate, national and even personal online defenses. Some of the most talented and dangerous cybercrooks and cyberwarriors come from Russia, which is a longtime meddler in other countries’ affairs.

Over decades, Russian operators have stolen terabytes of data, taken control of millions of computers and raked in billions of dollars. They’ve shut down electricity in Ukraine and meddled in elections in the U.S. and elsewhere. They’ve engaged in disinformation and disclosed pilfered information such as the emails stolen from Hillary Clinton’s campaign chairman, John Podesta, following successful spearphishing attacks.

Who are these operators, why are they so skilled, and what are they up to?

Back to the 1980s

Who are in the hoodies? / BeeBright/iStock/Getty Images Plus

The Russian cyberthreat dates back to at least 1986 when Cliff Stoll, then a system administrator at Lawrence Berkeley National Laboratory, linked a 75-cent accounting error to intrusions into the lab’s computers. The hacker was after military secrets, downloading documents with important keywords such as “nuclear.” A lengthy investigation, described in Stoll’s book “The Cuckoo’s Egg,” led to a German hacker who was selling the stolen data to what was then the Soviet Union.

By the late 1990s, Russian cyberespionage had grown to include the multi-year “Moonlight Maze” intrusions into U.S. military and other government computers, foretelling the massive espionage from Russia today.

The 1990s also saw the arrest of Vladimir Levin, a computer operator in St. Petersburg. Levin tried to steal more than US$10 million by hacking Citibank accounts, foreshadowing Russia’s prominence in cybercrime. And Russian hackers defaced U.S. websites during the Kosovo conflict, portending Russia’s extensive use of disruptive and damaging cyberattacks.

Russian cyber intrusions in the U.S. and around the world

Since at least 1986, Russians – and others acting on Russia’s behalf – have been finding their ways into U.S. government, military and civilian computer systems. Click through the timeline to explore what they’ve done over the years. / rzoze19/Shutterstock.com

The ‘Cuckoo’s Egg’ case

American systems administrator Cliff Stoll traces a 75-cent accounting error on a Lawrence Berkeley National Laboratory computer server, and discovers German hacker Markus Hess stealing military and government documents and selling them to the KGB. / NOVA/PBS

The first online bank robbery

Vladimir Levin, who worked at a computer company in St. Petersburg, Russia, attempts to steal US$10.7 million by hacking into Citibank’s cash management computer system. / Complex.com

Moonlight Maze

A series of intrusions traced to a computer in the former Soviet Union probes university, military and government systems in the U.S. and around the world, retrieving military maps, troop details and equipment designs. / Kaspersky Labs

U.S. and NATO computers in Kosovo targeted

A U.S. Navy website is hacked and defaced by Russians objecting to NATO’s bombing of Serbs in Kosovo; NATO web and email servers are also targeted. / U.S. Army

Malware for bank fraud spreads

Russian computer programmer Evgeniy Bogachev (aka “Slavik” or “lucky12345”) writes, distributes, improves and exploits a piece of malicious software called “Zeus,” allowing hackers to take over target computers and discover passwords and other sensitive information. The program is ultimately linked to the theft of more than $100 million from victims all over the world. / FBI

Anger at Estonia

After Estonia moves a monument honoring Soviet soldiers from World War II, a massive cyberattack targets multiple government departments, political parties, media organizations, banks and communications firms over the course of three weeks. In 2009, a member of a Kremlin-backed group claims responsibility for some of the attacks. / The Bronze Soldier of Tallinn, the Soviet monument whose move sparked a cyberattack, photo by Carl-Johan Sveningsson

Support for military action

In the weeks before and during a Russian military incursion into Georgia, unknown hackers sympathetic to Russian interests, and coordinating in the Russian language and on Russian online forums, flood Georgian government, media and financial websites with traffic, and take over and deface key sites, including the website of the Georgian president, the country’s national bank and its foreign ministry. / A Georgian parliament website after being defaced, New York Times

Russian cybersecurity students’ accomplishments noted

Russian Defense Minister Sergei Shoigu tells colleagues to work with Russian university students who have repeatedly placed well in international cybersecurity competitions. / Sergei Shoigu, Russian Ministry of Defense

Election systems in Ukraine compromised

Less than an hour before the results of Ukraine’s national election were to be publicly announced, government cybersecurity experts removed a piece of malicious software that would have portrayed the election’s right-wing loser as the winner. / Not the real winner: Dmytro Yarosh, Right Sektor

Masquerading as the “Cyber Caliphate”

Russian attackers pretending to be supporters of ISIS take over French television station TV5 Monde, shutting down broadcasting operations and defacing the company’s websites. / A TV5 Monde Twitter account defaced with pro-ISIS graphics, SecurityAffairs.co

Meddling in the U.S. presidential election

Ukraine power grid attacked

When hackers take over a portion of the power grid serving Kiev, Ukraine’s capital, 230,000 people are left without power for as long as six hours. / U.S. Air Force

Ukraine president complains of Russian “cyberwar”

Multiple intrusions target various government agencies in Ukraine, as well as the Kiev power grid. / Ukrainian President Petro Poroshenko, Ukraine government

Conducting advanced attacks

In more recent years, Russia has been behind some of the most sophisticated cyberattacks on record. The 2015 cyberattack on three of Ukraine’s regional power distribution companies knocked out power to almost a quarter-million people. Cybersecurity analysts from the Electricity Information Sharing and Analysis Center and the SANS Institute reported that the multi-staged attacks were conducted by a “highly structured and resourced actor.” Ukraine blamed the attacks on Russia.

The attackers used a variety of techniques and adapted to the targets they faced. They used spearphishing email messages to gain initial access to systems. They installed “BlackEnergy” malware to establish remote control over the infected devices. They harvested credentials to move through the networks. They developed custom malicious firmware to render system control devices inoperable. They hijacked the Supervisory Control and Data Acquisition system to open circuit breakers in substations. They used “KillDisk” malware to erase the master boot record of affected systems. The attackers even went so far as to strike the control stations’ battery backups and tie up the energy company’s call center with thousands of calls.

The Russians returned in 2016 with more advanced tools to take down a major artery of Ukraine’s power grid. Russia is believed to have also invaded energy companies in the U.S., including those operating nuclear power plants.

Top-notch cybereducation

Russia has many skilled cyberoperators, and for good reason: Their educational system emphasizes information technology and computer science, more so than in the U.S.

Every year, Russian schools take a disproportionate number of the top spots in the International Collegiate Programming Contest. In the 2016 contest, St. Petersburg State University took the top spot for the fifth time in a row, and four other Russian schools also made the top 12. In 2017, St. Petersburg ITMO University won, with two other Russian schools also placing in the top 12. The top U.S. school ranked 13th.

As Russia prepared to form a cyberbranch within its military, Minister of Defense Sergei Shoigu took note of Russian students’ performance in the contest. “We have to work with these guys somehow, because we need them badly,” he said in a public meeting with university administrators.

Who are these Russian cyberwarriors?

Russia employs cyberwarriors within its military and intelligence services. Indeed, the cyberespionage groups dubbed APT28 (aka Fancy Bear) and APT29 (aka Cozy Bear and The Dukes) are believed to correspond to Russia’s military intelligence agency GRU and its state security organization FSB, respectively. Both groups have been implicated in hundreds of cyberoperations over the past decade, including U.S. election hacking.

Russia recruits cyberwarriors from its colleges, but also from the cybersecurity and cybercrime sectors. It is said to turn a blind eye to its criminal hackers as long as they avoid Russian targets and use their skills to aid the government. According to Dmitri Alperovitch, co-founder of the security firm CrowdStrike, when Moscow identifies a talented cybercriminal, any pending criminal case against the person is dropped and the hacker disappears into the Russian intelligence services. Evgeniy Mikhailovich Bogachev, wanted by the FBI with a reward of $3 million for cybercrimes, is also on the Obama administration’s list of people sanctioned in response to interference in the U.S. election. Bogachev is said to work “under the supervision of a special unit of the FSB.”

Allies outside official channels

Besides its in-house capabilities, the Russian government has access to hackers and the Russian media. Analyst Sarah Geary at cybersecurity firm FireEye reported that the hackers “disseminate propaganda on behalf of Moscow, develop cybertools for Russian intelligence agencies like the FSB and GRU, and hack into networks and databases in support of Russian security objectives.”

Many seemingly independent “patriotic hackers” operate on Russia’s behalf. Most notably, they attacked critical systems in Estonia in 2007 over the relocation of a Soviet-era memorial, Georgia in 2008 during the Russo-Georgian War and Ukraine in 2014 in connection with the conflict between the two countries.

At the very least, the Russian government condones, even encourages, these hackers. After some of the Estonian attacks were traced back to Russia, Moscow turned down Estonia’s request for help – even as a commissar in Russia’s pro-Kremlin youth movement Nashi admitted launching some of the attacks. And when Slavic Union hackers successfully attacked Israeli websites in 2006, Deputy Duma Director Nikolai Kuryanovich gave the group a certificate of appreciation. He noted that “a small force of hackers is stronger than the multi-thousand force of the current armed forces.”

While some patriotic hackers may indeed operate independently of Moscow, others seem to have strong ties. Cyber Berkut, one of the groups that conducted cyberattacks against Ukraine, including its central election site, is said to be a front for Russian state-sponsored cyberactivity. And Russia’s espionage group APT28 is said to have operated under the guise of the ISIS-associated CyberCaliphate while attacking the French station TV5 Monde and taking over the Twitter account of U.S. Central Command.

One of many cyberthreats

Although Russia poses a major cyberthreat, it is not the only country that threatens the U.S. in cyberspace. China, Iran and North Korea are also countries with strong cyberattack capabilities, and more countries will join the pool as they develop their people’s skills.

The good news is that actions to protect an organization’s cybersecurity (such as monitoring access to sensitive files) that work against Russia also work against other threat actors. The bad news is that many organizations do not take those steps. Further, hackers find new vulnerabilities in devices and exploit the weakest link of all – humans. Whether cyberdefenses will evolve to avert a major calamity, from Russia or anywhere else, remains to be seen.


Originally published by The Conversation, 07.21.2020, under the terms of a Creative Commons Attribution/No derivatives license.