Russians hacked Ukrainian gas company at centre of Trump impeachment

Russian hackers reportedly targeted a Ukrainian energy company that plays a central role in Donald Trump's impeachment.
VIDEO: REUTERS
The hacking attempts against Burisma, the Ukrainian gas company on whose board Hunter Biden served, began in early November.
The hacking attempts against Burisma, the Ukrainian gas company on whose board Hunter Biden served, began in early November.PHOTO: BURISMAGROUP/FACEBOOK

WASHINGTON (NYTIMES) - With US President Donald Trump facing an impeachment trial over his efforts to pressure Ukraine to investigate former Vice-President Joe Biden and his son Hunter Biden, Russian military hackers have been boring into the Ukrainian gas company at the centre of the affair, according to security experts.

The hacking attempts against Burisma, the Ukrainian gas company on whose board Hunter Biden served, began in early November, as talk of the Bidens, Ukraine and impeachment was dominating the news in the United States.

It is not yet clear what the hackers found, or precisely what they were searching for.

But the experts say the timing and scale of the attacks suggest that the Russians could be searching for potentially embarrassing material on the Bidens - the same kind of information that Trump wanted from Ukraine when he pressed for an investigation of the Bidens and Burisma, setting off a chain of events that led to his impeachment.

The Russian tactics are strikingly similar to what American intelligence agencies say was Russia's hacking of e-mails from Hillary Clinton's campaign chairman and the Democratic National Committee during the 2016 presidential campaign.

In that case, once they had the e-mails, the Russians used trolls to spread and spin the material, and built an echo chamber to widen its effect.

Then, as now, the Russian hackers from a military intelligence unit known formerly as the GRU, and to private researchers by the alias "Fancy Bear", used so-called phishing e-mails that appear designed to steal usernames and passwords, according to Area1, the Silicon Valley security firm that detected the hacking.

In this instance, the hackers set up fake websites that mimicked sign-in pages of Burisma subsidiaries, and have been blasting Burisma employees with e-mails meant to look like they are coming from inside the company.

The hackers fooled some of them into handing over their login credentials, and managed to get inside one of Burisma's servers, Area1 said.