www.washingtonpost.com
Open in
urlscan Pro
2.19.32.96
Public Scan
URL:
https://www.washingtonpost.com/national-security/2023/03/30/russian-cyberwarfare-documents-vulkan-files/
Submission: On April 13 via api from US — Scanned from DE
Submission: On April 13 via api from US — Scanned from DE
Form analysis
0 forms found in the DOMText Content
Accessibility statementSkip to main content Democracy Dies in Darkness Subscribe Sign in National SecurityForeign Policy Intelligence Justice Immigration Military National SecurityForeign Policy Intelligence Justice Immigration Military The Vulkan Files SECRET TROVE OFFERS RARE LOOK INTO RUSSIAN CYBERWAR AMBITIONS MORE THAN 5,000 PAGES OF DOCUMENTS FROM A MOSCOW-BASED CONTRACTOR OFFER UNUSUAL GLIMPSES INTO PLANNING AND TRAINING FOR SECURITY SERVICES, INCLUDING THE NOTORIOUS HACKING GROUP SANDWORM By Craig Timberg , Ellen Nakashima , Hannes Munzinger and Hakan Tanriverdi March 30, 2023 at 11:00 a.m. EDT The leak of documents from a Moscow-based defense contractor is unusual for Russia’s secretive military industrial complex. (Washington Post illustration, NTC Vulkan; iStock) Listen 16 min Comment on this storyComment731 Gift Article Share Russian intelligence agencies worked with a Moscow-based defense contractor to strengthen their ability to launch cyberattacks, sow disinformation and surveil sections of the internet, according to thousands of pages of confidential corporate documents. The documents detail a suite of computer programs and databases that would allow Russia’s intelligence agencies and hacking groups to better find vulnerabilities, coordinate attacks and control online activity. The documents suggest the firm was supporting operations including both social media disinformation and training to remotely disrupt real-world targets, such as sea, air and rail control systems. An anonymous person provided the documents from the contractor, NTC Vulkan, to a German reporter after expressing outrage about Russia’s attack on Ukraine. The leak, an unusual occurrence for Russia’s secretive military industrial complex, demonstrates another unintended consequence of President Vladimir Putin’s decision to take his country to war. Officials from five Western intelligence agencies and several independent cybersecurity companies said they believe the documents are authentic, after reviewing excerpts at the request of The Washington Post and several partner news organizations. These officials and experts could not find definitive evidence that the systems have been deployed by Russia or been used in specific cyberattacks, but the documents describe testing and payments for work done by Vulkan for the Russian security services and several associated research institutes. The company has both government and civilian clients. 7 takeaways from the Vulkan Files investigation The trove offers a rare window into the secret corporate dealings of Russia’s military and spy agencies, including work for the notorious government hacking group Sandworm. U.S. officials have accused Sandworm of twice causing power blackouts in Ukraine, disrupting the Opening Ceremonies of the 2018 Winter Olympics and launching NotPetya, the most economically destructive malware in history. One of the leaked documents mentions the numerical designation for Sandworm’s military intelligence unit, 74455, suggesting that Vulkan was preparing software for use by the elite hacking squad. The unsigned, 11-page document, dated 2019, showed a Sandworm official approving the data transfer protocol for one of the platforms. “The company is doing bad things, and the Russian government is cowardly and wrong,” said the person who provided the documents to the German reporter, shortly after the invasion of Ukraine. The reporter then shared them with a consortium of news organizations, which includes The Washington Post and is led by Paper Trail Media and Der Spiegel, both based in Germany. The anonymous person, who spoke to the reporter through an encrypted chat app, declined to identify themself before ending contact, declaring the need to vanish “like a ghost” for security reasons. “I am angry about the invasion of Ukraine and the terrible things that are happening there,” the person said. “I hope you can use this information to show what is happening behind closed doors.” Advertisement Story continues below advertisement Vulkan did not respond to requests for comment. An employee of the company who answered the phone at its head office confirmed that an email with queries had been received and said it would be answered by company officials, “if it is of interest to them.” No responses came. Kremlin officials also did not reply to requests for comment. The cache of more than 5,000 pages of documents, dated between 2016 and 2021, includes manuals, technical specification sheets and other details for software that Vulkan designed for the Russian military and intelligence establishment. It also includes internal company emails, financial records and contracts that show both the ambition of Russia’s cyber operations and the breadth of the work Moscow has been outsourcing. This includes programs to create fake social media pages and software that can identify and stockpile lists of vulnerabilities in computer systems across the globe for possible future targeting. Several mock-ups of a user interface for a project known as Amezit appear to depict examples of possible hacking targets, including the Foreign Ministry in Switzerland and a nuclear power plant in that nation. Another document shows a map of the United States with circles that appear to represent clusters of internet servers. One illustration for a Vulkan platform called Skan makes reference to a U.S. location, labeled “Fairfield,” as a place to find network vulnerabilities for use in an attack. Another document describes a “user scenario” in which hacking teams would identify insecure routers in North Korea, presumably for potential use in a cyberattack. The documents do not, however, include verified target lists, malicious software code or evidence linking the projects to known cyberattacks. Still, they offer insights into the aims of a Russian state that — like other major powers, including the United States — is eager to grow and systematize its ability to conduct cyberattacks with greater speed, scale and efficiency. “These documents suggest that Russia sees attacks on civilian critical infrastructure and social media manipulation as one and the same mission, which is essentially an attack on the enemy’s will to fight,” said John Hultquist, the vice president for intelligence analysis at the cybersecurity firm Mandiant, which reviewed selections of the document at the request of The Post and its partners. Advertisement Story continues below advertisement ‘A CRITICAL PILLAR’ The role of contractors in Russian cyberwarfare is “very significant,” especially for the Russian military intelligence agency commonly called the GRU, said a Western intelligence analyst, speaking on the condition of anonymity to share sensitive findings. “They are a critical pillar of GRU offensive cyber research and development. They provide expertise that the GRU may lack on a given issue. The spy services can do cyber operations without them, but likely not as well.” Three former Vulkan employees, who spoke on the condition of anonymity out of fear of retribution, confirmed some details about the company. Financial records for Vulkan, which were separately obtained by the news organizations, match references in the documents in several instances, detailing millions of dollars worth of transactions between known Russian military or intelligence entities and the company. The intelligence and cybersecurity experts said details in the documents also match information collected about Russia’s hacking programs — including in a smaller previous leak — and appear to describe new tools for enabling offensive cyber operations. Vulkan, they said, is one of dozens of private firms known to provide tailored cyber capabilities to the Russian security services. The experts cautioned that it was not clear which of the programs had been completed and deployed, as opposed to being merely developed and ordered up by the Russian military, including by units linked to the GRU. The documents do, however, refer to state-mandated testing, changes desired by the clients and finished projects, strongly suggesting that at least trial versions of some of the programs were activated. “You don’t find network diagrams and design documents like this very often. It really is very intricate stuff. This wasn’t meant to be ever seen publicly,” said one of the Western intelligence officials, speaking on the condition of anonymity to share candid assessments of sensitive findings. “But it makes sense to pay attention. Because you better understand what the GRU is trying to do.” The Threat Analysis Group at Google, the tech company’s premier cyberthreat hunter, found evidence in 2012 that Vulkan was being used by the SVR, Russia’s foreign intelligence service. The researchers observed a suspicious test phishing email being sent from a Gmail account to a Vulkan email account that had been set up by the same person, evidently a company employee. “[T]he use of test messages is common practice to test phishing emails prior to their use,” Google said in a statement. After that test email, the Google analysts saw the same Gmail address being used to send malware known to be employed by SVR against other targets. That was “not the smartest move” on the Vulkan employee’s part, said one Google analyst, speaking on the condition of anonymity to describe sensitive findings. “It was definitely a slip-up.” References to the company also can be found in VirusTotal, a Google-owned service with a database of malicious software that is a resource for security researchers. A file labeled “Secret Party NTC Vulkan” is a holiday invitation disguised in a piece of malware that normally takes control of a user’s computer. The invitation — apparently harmless — automatically downloads an illustration of a large bear alongside a champagne bottle and two glasses. The image is labeled “APT Magma Bear,” a reference to Western cybersecurity officials’ labeling of Russian hacking groups with ursine code names. APT refers to “Advanced Persistent Threat,” a cybersecurity term for the most serious hacking groups, which are typically run by nation states such as Russia. The invitation reads “APT Magma Bear wishing you and your family a wonderful holiday season and a healthy and peaceful New Year!” as Soviet military music plays in the background. Advertisement Story continues below advertisement TIES TO WESTERN CORPORATIONS Vulkan was founded in 2010 and has about 135 employees, according to Russian business information websites. The company website says its main headquarters is in northeast Moscow. A promotional video on the company website portrays Vulkan as a scrappy tech start-up that “solves corporate problems” and has a “comfortable work environment.” It ends by declaring that Vulkan’s goal is to “make the world a better place.” The promotional video does not mention military or intelligence contracting work. “The work was fun. We used the latest technologies,” said one former employee in an interview, speaking on the condition of anonymity for fear of retribution. “The people were really clever. And the money was good.” Some former Vulkan employees later worked for major Western companies, including Amazon and Siemens. Both companies issued statements that did not dispute that former Vulkan employees worked for them, but they said that internal corporate controls protected against unauthorized access to sensitive data. The documents also show that Vulkan intended to use an array of U.S. hardware in setting up systems for Russian security services. The design documents repeatedly refer to American products, including Intel processors and Cisco routers, that should be used to configure the “hardware-software” systems for Russian military and intelligence units. There are other connections to U.S. companies. Some of those companies, including IBM, Boeing and Dell at one time worked with Vulkan, according to its website, which describes commercial software development work with no obvious ties to intelligence and hacking operations. Representatives of IBM, Boeing and Dell did not dispute that those entities previously worked with Vulkan but said they do not now have any business relationships with the company. Advertisement Story continues below advertisement AUTOMATED DISINFORMATION The trove of documents initially was shared with a reporter for the German newspaper Süddeutsche Zeitung. The consortium examining the documents has 11 members — including The Post, the Guardian, Le Monde, Der Spiegel, iStories, Paper Trail Media and Süddeutsche Zeitung — from eight countries. Among the thousands of pages of leaked Vulkan documents are projects designed to automate and enable operations across Russian hacking units. Amezit, for example, details tactics for automating the creation of massive numbers of fake social media accounts for disinformation campaigns. One document in the leaked cache describes how to use banks of mobile phone SIM cards to defeat verification checks for new accounts on Facebook, Twitter and other social networks. Reporters for Le Monde, Der Spiegel and Paper Trail Media, working from Twitter accounts listed in the documents, found evidence that these tools probably had been used for numerous disinformation campaigns in several countries. One effort included tweets in 2016 — when Russian disinformation operatives were working to boost Republican presidential candidate Donald Trump and undermine Democrat Hillary Clinton — linking to a website claiming that Clinton had made “a desperate attempt” to “regain her lead” by seeking foreign support in Italy. The reporters also found evidence of the software being used to create fake social media accounts, inside and outside of Russia, to push narratives in line with official state propaganda, including denials that Russian attacks in Syria killed civilians. Amezit has other features designed to allow Russian officials to monitor, filter and surveil sections of the internet in regions they control, the documents show. They suggest that the program contains tools that shape what internet users would see on social media. The project is repeatedly described in the documents as a complex of systems for “information restriction of the local area” and the creation of an “autonomous segment of the data transmission network.” A 2017 draft manual for one of the Amezit systems offers instructions on the “preparation, placement and promotion of special materials” — most likely propaganda distributed using fake social media accounts, telephone calls, emails and text messages. Advertisement Story continues below advertisement MAPPING CRITICAL INFRASTRUCTURE One of the mock-ups in a 2016 design document allows a user to hover a cursor over an object on a map and display IP addresses, domain names and operating systems as well as other information about “physical objects.” One such physical object — highlighted in fluorescent green — is the Ministry of Foreign Affairs in Bern, Switzerland, which shows a hypothetical email address and the “attack goal” to “obtain root user privileges.” The other object highlighted on the map is the Muhleberg Nuclear Power Plant, west of Bern. It stopped producing power in 2019. Dmitri Alperovitch, who co-founded the cyberthreat intelligence firm CrowdStrike, said that the documents indicate that Amezit is intended to enable discovery and mapping of critical facilities such as railways and power plants, but only when the attacker has physical access to a facility. “With physical access, you can plug this tool into a network and it will map out vulnerable machines,” said Alperovitch, now the chairman of Silverado Policy Accelerator, a think tank in Washington. Emails suggest that the Amezit systems were at least tested by Russian intelligence agencies by 2020. A company email dated May 16, 2019, describes feedback from the customer and desires for changes in the program. A spreadsheet marks which parts of the project have been finished. A document in the trove also suggests that Vulkan was contracted in 2018 to create a training program called Crystal-2 to provide simultaneous operation by up to 30 trainees. The document mentions testing “the Amezit system to disable [incapacitate] control systems for rail, air and sea transport” but does not make clear whether the training program conceived in the documents went forward. Trainees also would be “testing methods for obtaining unauthorized access to local computer and technological networks of infrastructure and facilities to support life in population centers and industrial areas,” potentially using capabilities the document ascribes to Amezit. Later in the document, the text reads: “The level of secrecy of processed and stored information in the product is ‘Top Secret.’” Advertisement Story continues below advertisement REPOSITORY OF VULNERABILITIES Skan, the other main project described in the documents, allowed Russia’s attackers continuously to analyze the internet for vulnerable systems and compile them in a database for possible future attacks. Joe Slowik, the threat intelligence manager at the cybersecurity company Huntress, said Skan probably was designed to work in tandem with other software. “This is the background system that would allow for it all — organizing and potentially tasking and targeting of capabilities in a way that can be centrally managed,” he said. Slowik said Sandworm, the Russian military hacking group blamed for numerous disruptive attacks, was likely to want to keep a large repository of vulnerabilities. A document from 2019 says Skan could be used to display “a list of all possible attack scenarios” and highlight all the nodes on the network that could be involved in the attacks. The system also appears to enable coordination among Russian hacking units, allowing “the ability to exchange data between prospective geographically dispersed special units,” according to the leaked documents. “Skan reminds me of old military movies where people stand around … and place their artillery and troops on the map,” says Gabby Roncone, another cybersecurity expert at Mandiant. “And then they want to understand where the enemy tanks are and where they need to strike first to break through the enemy lines.” There is evidence that at least some part of Skan was delivered to the Russian military. In an email dated May 27, 2020, Vulkan developer Oleg Nikitin described collecting a list of employees “to visit the territory of our functional user” to install and configure equipment for the Skan project, and upgrade and configure software and demonstrate functionality. The functional user is described as “Khimki,” a reference to the Moscow suburb where Sandworm is based. “The territory is closed, the regime is strict,” Nikitin wrote, using Russian terms for a protected, secret government facility. Nikitin did not reply to a request for comment. Maria Christoph from Paper Trail Media contributed to this report. Craig Timberg is The Post’s senior editor for collaborative investigations and a former technology reporter. Ellen Nakashima is a Post national security reporter who has written about cybersecurity and intelligence issues. Hannes Munzinger and Hakan Tanriverdi are senior investigative reporters for Paper Trail Media, based in Munich. Munzinger received the document trove and had initial conversations with the source while working for his previous employer, Süddeutsche Zeitung. ABOUT THE VULKAN FILES This investigation was a collaboration among journalists from eight countries working at 11 news organizations, including The Washington Post. Leading the project were Paper Trail Media and Der Spiegel in Germany. Also participating from that country were Süddeutsche Zeitung and ZDF. Other partners include the Guardian in Britain, Le Monde in France, Tamedia in Switzerland, the Danish Broadcasting Corporation in Denmark, Der Standard in Austria and iStories, a news site covering Russia that is based in Latvia. Editing by Ben Pauker. Copy editing by Gilbert Dunkley. 731 Comments GiftOutline Gift Article Loading... Subscribe to comment and get the full experience. Choose your plan → View more Loading... Company * About The Post * Newsroom Policies & Standards * Diversity and Inclusion * Careers * Media & Community Relations * WP Creative Group * Accessibility Statement Get The Post * * Become a Subscriber * Gift Subscriptions * Mobile & Apps * Newsletters & Alerts * Washington Post Live * Reprints & Permissions * Post Store * Books & E-Books * Newspaper in Education * Print Archives (Subscribers Only) * Today’s Paper * Public Notices Contact Us * Contact the Newsroom * Contact Customer Care * Contact the Opinions team * Advertise * Licensing & Syndication * Request a Correction * Send a News Tip * Report a Vulnerability Terms of Use * Digital Products Terms of Sale * Print Products Terms of Sale * Terms of Service * Privacy Policy * Cookie Settings * Submissions & Discussion Policy * RSS Terms of Service * Ad Choices washingtonpost.com © 1996-2023 The Washington Post * washingtonpost.com * © 1996-2023 The Washington Post * About The Post * Contact the Newsroom * Contact Customer Care * Request a Correction * Send a News Tip * Report a Vulnerability * Download the Washington Post App * Policies & Standards * Terms of Service * Privacy Policy * Cookie Settings * Print Products Terms of Sale * Digital Products Terms of Sale * Submissions & Discussion Policy * RSS Terms of Service * Ad Choices THE WASHINGTON POST CARES ABOUT YOUR PRIVACY We and our partners store and/or access information on a device, such as unique IDs in cookies to process personal data. You may accept or manage your choices by clicking below, including your right to object where legitimate interest is used, or at any time in the privacy policy page. These choices will be signaled to our partners and will not affect browsing data. WE AND OUR PARTNERS PROCESS DATA TO PROVIDE: Actively scan device characteristics for identification. Select basic ads. Store and/or access information on a device. Create a personalised ads profile. Select personalised ads. Create a personalised content profile. Select personalised content. Measure ad performance. Measure content performance. Apply market research to generate audience insights. Develop and improve products. View list of partners I accept Disable all Manage cookies