I'm right again dot com

GRU chief Igor Korobov

AN ONLINE PUBLICATION OF THE ANONYMOUS ANYTHING SOCIETY JUNE 19, 2019

PART SIX OF THE RUSSIAN ATTACK ON OUR DEMOCRACY: VOTING TECHNOLOGY

Page 60 of the Mueller Report:
“By at least of the summer of 2016, GRU (Russian Intelligence Agency) officers sought access to state and local computer networks by exploiting known software vulnerabilities of state and local governmental entities. 
 
GRU officers, for example, targeted state and local databases of registered voters using a technique known as “SQL injection,” by which malicious code was sent to the state or local website in order to run commands (such as exfiltrating the database contents). 
  
In one instance in approximately June 2016, the GRU compromised the computer network of The Illinois State Board of Elections by exploiting a vulnerability in the SBOE’s website. The GRU then gained access to a database containing information on millions of registered Illinois voters and extracted data related to thousands of U.S. voters before the malicious activity was identified”.

Page 61 of the Mueller Report:
“Unit 74455* also sent spearfishing** emails to public officials involved in election administration at companies involved in voting technology.

In August 2016, GRU officers targeted employees of [REDACTED], a voting company that developed software used by numerous U.S. counties to manage voter rolls, and installed malware on the company network.
 
Similarly, in November of 2016, the GRU sent spearfishing** emails to over 120 email accounts used by Florida officials responsible for administering the 2016 election The spearfishing emails contained an attached Word document coded with malicious software commonly referred to as a Trojan that permitted the GRU to access the infected computer.”***

                 END OF THIS DAY’S REVIEW OF THE MUELLER REPORT

*Unit 74455: One of the many Units of the GRU staffed with Russian Hackers.

** Spearfishing: When the Target opens an email, Malware is embedded that permits hackers to extract data.

*** Infected: The Trojan gives the hacker power to CONTROL the computer


I’m not going away. Doing this “Book Review” is too exciting, too compelling. – Phil Richardson, Editor


Our unending thanks to Jim Bromley, who programs our Archive of Prior Commentaries

Respond to: k7os@comcast.net