|I'm right again dot com
|GRU chief Igor
|AN ONLINE PUBLICATION OF THE ANONYMOUS ANYTHING SOCIETY JUNE 19, 2019|
“By at least of the summer of 2016, GRU (Russian Intelligence Agency) officers sought access to state and local computer networks by exploiting known software vulnerabilities of state and local governmental entities.
GRU officers, for example, targeted state and local databases of registered voters using a technique known as “SQL injection,” by which malicious code was sent to the state or local website in order to run commands (such as exfiltrating the database contents).
In one instance in approximately June 2016, the GRU compromised the computer network of The Illinois State Board of Elections by exploiting a vulnerability in the SBOE’s website. The GRU then gained access to a database containing information on millions of registered Illinois voters and extracted data related to thousands of U.S. voters before the malicious activity was identified”.
“Unit 74455* also sent spearfishing** emails to public officials involved in election administration at companies involved in voting technology.
In August 2016, GRU officers targeted employees of [REDACTED], a voting company that developed software used by numerous U.S. counties to manage voter rolls, and installed malware on the company network.
Similarly, in November of 2016, the GRU sent spearfishing** emails to over 120 email accounts used by Florida officials responsible for administering the 2016 election The spearfishing emails contained an attached Word document coded with malicious software commonly referred to as a Trojan that permitted the GRU to access the infected computer.”***