Microsoft points finger at Fancy Bear for Euro-election hacks

A drawing of an angry Russian bear

Microsoft has pointed the finger of blame upon a group of hackers associated with Russian intelligence for targetting civil society groups ahead of European elections in May.

Redmond's corporate vice president of customer security and trust Tom Burt said he was confident a group called "Strontium" was responsible for a string of recent cyber attacks that targeted more than 100 email accounts at think tanks and non-governmental organisations that work on issues including election security, nuclear policy and foreign relations.

Disinformation attacks and elections rigging have become a rising global problem over the last few years, with many laying the blame at Russia's door. This was most notable during the 2016 US presidential elections and European leaders have recently warned that attacks will continue across Europe in 2019.

"We've seen recent activity targeting democratic institutions in Europe as part of the work our Threat Intelligence Center (MSTIC) and Digital Crimes Unit carry out every day to protect all of our customers," Burt said.

"These attacks are not limited to campaigns themselves but often extend to think tanks and non-profit organizations working on topics related to democracy, electoral integrity, and public policy and that are often in contact with government officials."

As an example, Burt explained that Microsoft has recently detected attacks targeting employees of the German Council on Foreign Relations and European offices of The Aspen Institute and The German Marshall Fund.

He said the attacks against these organisations, which it has disclosed with their permission, targeted 104 accounts belonging to organisation employees located in Belgium, France, Germany, Poland, Romania, and Serbia.

Microsoft's MSTIC division will continue to investigate the sources of the attacks, but it's confident that many of them originated from "Strontium" which is a known alias of Fancy Bear, the infamous Russian hacker group.

"The attacks occurred between September and December 2018," Burt said. "We quickly notified each of these organisations when we discovered they were targeted so they could take steps to secure their systems, and we took a variety of technical measures to protect customers from these attacks."

Burt said that consistent with campaigns against similar US-based institutions, attackers in most cases create malicious URLs and spoofed email addresses that look legitimate. Using spearphishing campaigns to gain access to employee credentials and deliver malware.

"The attacks we've seen recently, coupled with others we discussed last year, suggest an ongoing effort to target democratic organizations. They validate the warnings from European leaders about the threat level we should expect to see in Europe this year."

Bobby Hellard

Bobby Hellard is ITPro's Reviews Editor and has worked on CloudPro and ChannelPro since 2018. In his time at ITPro, Bobby has covered stories for all the major technology companies, such as Apple, Microsoft, Amazon and Facebook, and regularly attends industry-leading events such as AWS Re:Invent and Google Cloud Next.

Bobby mainly covers hardware reviews, but you will also recognize him as the face of many of our video reviews of laptops and smartphones.