20180713-US-indictment-of-Russians-who-allegedly-compromised-DNC-servers.pdf

(236 KB) Pobierz
Case 1:18-cr-00215-ABJ Document 1 Filed 07/13/18 Page 1 of 29
IN THE UNITED STATES DISTRICT COURT
FOR THE DISTRICT OF COLUMBIA
*
*
CRIMINAL NO.
v.
*
*
(18 U.S.C. §§ 2, 371, 1030, 1028A, 1956,
VIKTOR BORISOVICH NETYKSHO,
*
and 3551 et seq.
)
BORIS ALEKSEYEVICH ANTONOV,
*
DMITRIY SERGEYEVICH BADIN,
*
IVAN SERGEYEVICH YERMAKOV,
*
ALEKSEY VIKTOROVICH
*
LUKASHEV,
*
SERGEY ALEKSANDROVICH
*
MORGACHEV,
*
NIKOLAY YURYEVICH KOZACHEK,
*
PAVEL VYACHESLAVOVICH
*
YERSHOV,
*
ARTEM ANDREYEVICH
*
MALYSHEV,
*
ALEKSANDR VLADIMIROVICH
*
OSADCHUK,
*
ALEKSEY ALEKSANDROVICH
*
POTEMKIN, and
*
ANATOLIY SERGEYEVICH
*
KOVALEV,
*
*
Defendants.
*
*
*******
INDICTMENT
The Grand Jury for the District of Columbia charges:
COUNT ONE
(Conspiracy to Commit an Offense Against the United States)
1.
In or around 2016, the Russian Federation (“Russia”) operated a military intelligence
UNITED STATES OF AMERICA
agency called the Main Intelligence Directorate of the General Staff (“GRU”). The GRU had
multiple units, including Units 26165 and 74455, engaged in cyber operations that involved the
staged releases of documents stolen through computer intrusions. These units conducted large-
scale cyber operations to interfere with the 2016 U.S. presidential election.
Case 1:18-cr-00215-ABJ Document 1 Filed 07/13/18 Page 2 of 29
2.
Defendants
VIKTOR
BORISOVICH
NETYKSHO,
BORIS
ALEKSEYEVICH
ANTONOV, DMITRIY SERGEYEVICH BADIN, IVAN SERGEYEVICH YERMAKOV,
ALEKSEY VIKTOROVICH LUKASHEV, SERGEY ALEKSANDROVICH MORGACHEV,
NIKOLAY YURYEVICH KOZACHEK, PAVEL VYACHESLAVOVICH YERSHOV, ARTEM
ANDREYEVICH MALYSHEV, ALEKSANDR VLADIMIROVICH OSADCHUK, and
ALEKSEY ALEKSANDROVICH POTEMKIN were GRU officers who knowingly and
intentionally conspired with each other, and with persons known and unknown to the Grand Jury
(collectively the “Conspirators”), to gain unauthorized access (to “hack”) into the computers of
U.S. persons and entities involved in the 2016 U.S. presidential election, steal documents from
those computers, and stage releases of the stolen documents to interfere with the 2016 U.S.
presidential election.
3.
Starting in at least March 2016, the Conspirators used a variety of means to hack the email
accounts of volunteers and employees of the U.S. presidential campaign of Hillary Clinton (the
“Clinton Campaign”), including the email account of the Clinton Campaign’s chairman.
4.
By in or around April 2016, the Conspirators also hacked into the computer networks of
the Democratic Congressional Campaign Committee (“DCCC”) and the Democratic National
Committee (“DNC”). The Conspirators covertly monitored the computers of dozens of DCCC
and DNC employees, implanted hundreds of files containing malicious computer code
(“malware”), and stole emails and other documents from the DCCC and DNC.
5.
By in or around April 2016, the Conspirators began to plan the release of materials stolen
from the Clinton Campaign, DCCC, and DNC.
6.
Beginning in or around June 2016, the Conspirators staged and released tens of thousands
of the stolen emails and documents. They did so using fictitious online personas, including
2
Case 1:18-cr-00215-ABJ Document 1 Filed 07/13/18 Page 3 of 29
“DCLeaks” and “Guccifer 2.0.”
7.
The Conspirators also used the Guccifer 2.0 persona to release additional stolen documents
through a website maintained by an organization (“Organization 1”), that had previously posted
documents stolen from U.S. persons, entities, and the U.S. government. The Conspirators
continued their U.S. election-interference operations through in or around November 2016.
8.
To hide their connections to Russia and the Russian government, the Conspirators used
false identities and made false statements about their identities. To further avoid detection, the
Conspirators used a network of computers located across the world, including in the United States,
and paid for this infrastructure using cryptocurrency.
Defendants
9.
Defendant VIKTOR BORISOVICH NETYKSHO (Нетыкшо
Виктор Борисович)
was
the Russian military officer in command of Unit 26165, located at 20 Komsomolskiy Prospekt,
Moscow, Russia. Unit 26165 had primary responsibility for hacking the DCCC and DNC, as well
as the email accounts of individuals affiliated with the Clinton Campaign.
10.
Defendant BORIS ALEKSEYEVICH ANTONOV (А�½то�½ов
Борис Алексеевич)
was a
Major in the Russian military assigned to Unit 26165. ANTONOV oversaw a department within
Unit 26165 dedicated to targeting military, political, governmental, and non-governmental
organizations with spearphishing emails and other computer intrusion activity. ANTONOV held
the title “Head of Department.” In or around 2016, ANTONOV supervised other co-conspirators
who targeted the DCCC, DNC, and individuals affiliated with the Clinton Campaign.
11.
Defendant DMITRIY SERGEYEVICH BADIN (Бади�½
Дмитрий Сергеевич)
was a
Russian military officer assigned to Unit 26165 who held the title “Assistant Head of Department.”
In or around 2016, BADIN, along with ANTONOV, supervised other co-conspirators who targeted
the DCCC, DNC, and individuals affiliated with the Clinton Campaign.
3
Case 1:18-cr-00215-ABJ Document 1 Filed 07/13/18 Page 4 of 29
12.
Defendant IVAN SERGEYEVICH YERMAKOV (Ермаков
Ива�½ Сергеевич)
was a
Russian military officer assigned to ANTONOV’s department within Unit 26165. Since in or
around 2010, YERMAKOV used various online personas, including “Kate S. Milton,” “James
McMorgans,” and “Karen W. Millen,” to conduct hacking operations on behalf of Unit 26165. In
or around March 2016, YERMAKOV participated in hacking at least two email accounts from
which campaign-related documents were released through DCLeaks. In or around May 2016,
YERMAKOV also participated in hacking the DNC email server and stealing DNC emails that
were later released through Organization 1.
13.
Defendant ALEKSEY VIKTOROVICH LUKASHEV (Лукашев
Алексей Викторович)
was a Senior Lieutenant in the Russian military assigned to ANTONOV’s department within Unit
26165. LUKASHEV used various online personas, including “Den Katenberg” and “Yuliana
Martynova.” In or around 2016, LUKASHEV sent spearphishing emails to members of the
Clinton Campaign and affiliated individuals, including the chairman of the Clinton Campaign.
14.
Defendant
SERGEY ALEKSANDROVICH
MORGACHEV (Моргачев
Сергей
Алекса�½дрович)
was a Lieutenant Colonel in the Russian military assigned to Unit 26165.
MORGACHEV oversaw a department within Unit 26165 dedicated to developing and managing
malware, including a hacking tool used by the GRU known as “X-Agent.” During the hacking of
the DCCC and DNC networks, MORGACHEV supervised the co-conspirators who developed and
monitored the X-Agent malware implanted on those computers.
15.
Defendant NIKOLAY YURYEVICH KOZACHEK (Козачек
Николай Юрьевич)
was a
Lieutenant Captain in the Russian military assigned to MORGACHEV’s department within Unit
26165. KOZACHEK used a variety of monikers, including “kazak” and “blablabla1234565.”
KOZACHEK developed, customized, and monitored X-Agent malware used to hack the DCCC
4
Case 1:18-cr-00215-ABJ Document 1 Filed 07/13/18 Page 5 of 29
and DNC networks beginning in or around April 2016.
16.
Defendant PAVEL VYACHESLAVOVICH YERSHOV (Ершов
Павел Вячеславович)
was a Russian military officer assigned to MORGACHEV’s department within Unit 26165. In or
around 2016, YERSHOV assisted KOZACHEK and other co-conspirators in testing and
customizing X-Agent malware before actual deployment and use.
17.
Defendant ARTEM ANDREYEVICH MALYSHEV (Малышев
Артём А�½дреевич)
was
a Second Lieutenant in the Russian military assigned to MORGACHEV’s department within Unit
26165. MALYSHEV used a variety of monikers, including “djangomagicdev” and “realblatr.” In
or around 2016, MALYSHEV monitored X-Agent malware implanted on the DCCC and DNC
networks.
18.
Defendant ALEKSANDR VLADIMIROVICH OSADCHUK
(Осадчук Алекса�½др
Владимирович)
was a Colonel in the Russian military and the commanding officer of Unit 74455.
Unit 74455 was located at 22 Kirova Street, Khimki, Moscow, a building referred to within the
GRU as the “Tower.” Unit 74455 assisted in the release of stolen documents through the DCLeaks
and Guccifer 2.0 personas, the promotion of those releases, and the publication of anti-Clinton
content on social media accounts operated by the GRU.
19.
Defendant ALEKSEY ALEKSANDROVICH POTEMKIN (Потемки�½
Алексей
Алекса�½дрович)
was an officer in the Russian military assigned to Unit 74455. POTEMKIN was
a supervisor in a department within Unit 74455 responsible for the administration of computer
infrastructure used in cyber operations. Infrastructure and social media accounts administered by
POTEMKIN’s department were used, among other things, to assist in the release of stolen
documents through the DCLeaks and Guccifer 2.0 personas.
5
Zgłoś jeśli naruszono regulamin