Russian hackers seeking to steal COVID-19 vaccine data: intel agencies

By Jim Bronskill, The Canadian Press

Canada, Britain and the United States denounced Russian hackers on Thursday for trying to steal research on COVID-19 vaccines from organizations in all three countries and around the world.

Thursday’s joint declaration, led by Britain, said the hackers were almost certainly working for Russian intelligence and accused them of disrupting the global efforts to find a vaccine for the novel coronavirus.

Canada’s Communications Security Establishment said the malicious cyberactivities were very likely undertaken to pilfer information and intellectual property relating to the development and testing of vaccines.

The cyberspy agency said the clandestine activity is hindering response efforts when health-care experts and medical researchers need every available resource to help fight the pandemic.

This assessment was supported by partners at Britain’s Government Communications Headquarters’ National Cyber Security Centre, the U.S. National Security Agency, and the Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency.

“In these challenging times, it is all the more important to defend our own health-care organizations, national interests, and that of our allies, the United Kingdom and the United States, from malicious state actors attempting to steal information and intellectual property,” said Defence Minister Harjit Sajjan and Foreign Affairs Minister Francois-Philippe Champagne in a joint statement.

“We must call out irresponsible state behaviour that violates the rules-based international order and strive to live and work in a cyber environment that is open, stable, peaceful and secure. In Canada, we are committed to defending these principles in cyberspace, especially when they touch on the interests of Canadians.”

The Canadian government would not say what if any diplomatic action had been taken against Russia.

Nor did the joint assessment specifically say whether the hackers had been successful, but Canadian vaccine-makers were following the advice of the intelligence agencies and taking precautions.

The CSE’s Centre for Cyber Security assessed that a group labelled APT29, also known as “the Dukes” or “Cozy Bear,” was responsible, and almost certainly operates as part of Russian intelligence services.

Washington has previously identified “Cozy Bear” as one of two Russian government-linked hacking groups that broke into the Democratic National Committee computer network and stole emails ahead of the 2016 presidential election.

“The group uses a variety of tools and techniques to predominantly target governmental, diplomatic, think-tank, health-care and energy targets for intelligence gain,” said the joint advisory from the CSE and its allies.

“APT29 is likely to continue to target organizations involved in COVID-19 vaccine research and development, as they seek to answer additional intelligence questions relating to the pandemic.”

David Reed, Britain’s deputy high commissioner to Canada, said any discussion of whether the Russians succeeded in stealing anything had to remain an operational secret.

He added in an interview: “There’s no evidence this is going to cause a delay to the discovery of a vaccine, but it’s clearly reckless behaviour.”

Russian President Vladimir Putin’s spokesman, Dmitry Peskov, rejected the accusations.

“We don’t have information about who may have hacked pharmaceutical companies and research centres in Britain,” Peskov said, according to the state news agency Tass.

“We may say one thing: Russia has nothing to do with those attempts.”

Reed flatly rejected the Russian denial.

“We have the highest degree of confidence that this action by APT29 is linked to the Russian intelligence service. It’s a despicable attack against those doing vital work to combat the coronavirus pandemic,” he said.

“We’ve called the Russians to account previously, and this is another example of that.”

Britain’s relations with Russia plummeted after former Russian spy Sergei Skripal and his daughter were poisoned with a Soviet-made nerve agent in the English city of Salisbury in 2018. Britain blamed Moscow for the attack, which triggered a round of retaliatory diplomatic expulsions.

Canada expelled several Russian diplomats as part of the West’s co-ordinated response to the Salisbury poisoning.

British Foreign Secretary Dominic Raab took to Twitter to express Britain’s solidarity with Canada and the U.S. “against the reckless actions of Russia’s intelligence services, who we have exposed today for committing cyber attacks” against those working on a COVID-19 vaccine. Raab said the hackers were undermining vital global co-operation to defeat the pandemic.

The CSE urged Canadian health organizations to review the advisory on the threat and to take any necessary actions to protect themselves.

Brad Sorenson, the chief executive officer of Toronto-based Providence Therapeutics, said his company became aware of a hacking threat about one month ago, and hired a private security firm.

“We’ve identified one attempt which they thwarted. I won’t say ‘we’; we’re not the cybersecurity guru,” said Sorenson.

Sorenson said his company’s ongoing work to develop a vaccine has been unimpeded, but dealing with cyber threats while coping with the obstacles associated with the pandemic is challenging.

“It’s another distraction while you’re trying to do other important work and trying to co-ordinate with the government.”

Another Canadian company, Medicago, said it was aware of cyberattacks targeting the networks of organizations working on COVID-19 vaccine development.

“We take this threat seriously. Medicago has a strong cybersecurity infrastructure in place, and we continue to be in contact with authorities to further secure our network and infrastructure,” a company spokesman said in a statement.

The joint advisory said APT29 targeted COVID-19 vaccine research and development by scanning specific computer IP addresses of interest for vulnerabilities, a tactic that can help the group obtain login credentials to systems.

“This broad targeting potentially gives the group access to a large number of systems globally, many of which are unlikely to be of immediate intelligence value,” the advisory says.

“The group may maintain a store of stolen credentials in order to access these systems in the event that they become more relevant to their requirements in the future.”

Top Stories

Top Stories

Most Watched Today