Advertisement

Navalny adviser urges vigilance after impersonation attempts of Kremlin foes

"It looks like not enough lessons have been drawn" from the phishing of Hillary Clinton's adviser in 2016, Leonid Volkov said.
Russia
Leonid Volkov, Alexei Navalny's chief of staff, speaks in Berlin in August 2020 in Berlin. (Photo by Maja Hitij/Getty Images)

A top aide to jailed Russian opposition figure Alexei Navalny is urging Western policymakers and think tanks to be more wary of suspected Kremlin-backed information operations to undermine their work.

Navalny, a prominent critic of Russian President Vladimir Putin, has been detained since January, when he returned to Russia after being poisoned with a chemical nerve agent last year. In February, a Russian court sentenced him to two years in prison in a case that human rights organizations have described as a “mockery” of justice.

In the meantime, digital operatives have been posing as Leonid Volkov, Navalny’s chief of staff — and other perceived threats to Kremlin interests — in apparent efforts to smear critics of the Russian government.

“It looks like not enough lessons have been drawn from John Podesta clicking those phishing [links] back in 2016,” he said, referring to Russian intelligence agents’ breach of the Hillary Clinton adviser’s Gmail account during the 2016 election.

Advertisement

Public figures in other countries have much to learn from the Russian opposition’s experience about protecting themselves from hacking and disinformation, Volkov said Friday at event hosted by the Atlantic Council, a Washington-based think tank.

“We live in this very toxic environment of Kremlin disinformation campaigns …. Everyone in Russian politics is well aware of phishing, of malware, of disinformation, of fake phone calls,” he added.

The Atlantic Council, which focuses on democracy and human rights in Eastern Europe, went public this week with one such incident in which someone posing as Volkov sent emails to the think tank’s leadership requesting an on-camera meeting.

“The people who sent it were trying to lure us into a potentially sensitive or even embarrassing online conversation,” the Atlantic Council’s Melinda Haring and Damon Wilson wrote in the Washington Post.

That followed a similar overture to another Washington-based non-governmental organization in which someone pretended to be exiled Belarusian politician Svetlana Tikhanovskaya. In that case, the imposters secured a meeting with the NGO and recorded the conversation, according to Haring and Wilson.

Advertisement

Wilson said there was no particular malicious software attached to the emails the Atlantic Council received from the fake Volkov. But think tanks are perennial targets of state-linked hackers looking for clues on the policy of an incoming administration, for example. The FBI and Department of Homeland Security urged U.S. think tanks to be on high alert for attempted compromises in the weeks before President Joe Biden took office.

Think tanks often have small cybersecurity teams, if they have one at all. They also have to rely on word-of-mouth to alert fellow think tanks to malicious activity, according to Haring.

“This is a big problem,” Haring said at the Atlantic Council event on Friday. “This is part of the reason why NGOs and think tanks are vulnerable is because we only pick up the phone and warn each other when this happens.”

She advised think tanks that suspect they’re being targeted by digital spies to call the FBI.

“The office culture wants you to respond immediately [to an email]” Haring said. “Don’t do it. Verify the authenticity and look for mistakes in messages.”

Sean Lyngaas

Written by Sean Lyngaas

Sean Lyngaas is CyberScoop’s Senior Reporter covering the Department of Homeland Security and Congress. He was previously a freelance journalist in West Africa, where he covered everything from a presidential election in Ghana to military mutinies in Ivory Coast for The New York Times. Lyngaas’ reporting also has appeared in The Washington Post, The Economist and the BBC, among other outlets. His investigation of cybersecurity issues in the nuclear sector, backed by a grant from the Pulitzer Center on Crisis Reporting, won plaudits from industrial security experts. He was previously a reporter with Federal Computer Week and, before that, with Smart Grid Today. Sean earned a B.A. in public policy from Duke University and an M.A. in International Relations from The Fletcher School of Law and Diplomacy at Tufts University.

Latest Podcasts