The Hunt for the World's Most Dangerous Hackers
Resumen
TLDRThe documentary delves into the operations of Russian hacker groups, metaphorically called 'bears,' who have been involved in significant cyber attacks, including the hack of the German Bundestag and interference in the 2016 US presidential election. It follows the story of Claudia Height, a Bundestag assistant who inadvertently clicked on a phishing email, allowing hackers access to sensitive political information. The film connects these cyber operations to broader geopolitical strategies, emphasizing the ongoing threat these hackers pose to democracies worldwide. It highlights the sophisticated methods used by these groups and the implications for global security and political integrity.
Para llevar
- π» The 'bears' symbolize dangerous Russian hacker groups.
- π» The Bundestag hack exposed vulnerabilities in Germany's political system.
- π§ A phishing email was the entry point for hackers into the Bundestag.
- πΊπΈ Russian hackers influenced the 2016 US presidential election.
- π Investigations linked the attacks to the GRU and Fancy Bear.
- π‘οΈ Cybersecurity measures are crucial to protect against such threats.
- π The impact of cyber attacks can destabilize democracies.
- β οΈ Ongoing vigilance is necessary to counteract hacker tactics.
- π Trust in democratic institutions can be eroded by cyber interference.
- π Understanding hacker methods is key to prevention.
CronologΓa
- 00:00:00 - 00:05:00
The documentary introduces five metaphorical bears representing Russian hacker units, each with unique traits and objectives. They are tools of destabilization and psychological warfare, posing threats to Western democracies and involved in significant cyber attacks, including the German Parliament and the 2016 US presidential election.
- 00:05:00 - 00:10:00
The story begins with Claudia Height, an assistant in the German Bundestag, who unknowingly becomes a victim of a cyber attack. Her computer is infected with a Trojan, allowing Russian hackers to infiltrate the Bundestag's systems, leading to a major cyber attack that goes unnoticed for weeks.
- 00:10:00 - 00:15:00
An email disguised as a UN alert is sent to MPs, leading to the silent installation of malware. The hackers gain access to sensitive areas of the Bundestag's IT infrastructure, eventually compromising the office of Chancellor Angela Merkel, marking one of the most serious cyber attacks in German history.
- 00:15:00 - 00:20:00
Despite the attack's severity, it goes unnoticed for a long time. IT staff fail to recognize the Trojan on Claudia's computer, and it takes days for authorities to respond to warnings about the breach. The BSI eventually shuts down the network to regain control, but chaos ensues as lawmakers are left without access to critical information.
- 00:20:00 - 00:25:00
Investigators trace the attack back to a Russian hacker group known as Fancy Bear, linked to the GRU. They discover malware on Claudia's computer and find that 16 GB of data, including sensitive emails, has been stolen from the Bundestag, raising concerns about espionage and hybrid warfare.
- 00:25:00 - 00:30:00
As the 2016 US presidential election approaches, Russian hackers target the Clinton campaign. John Podesta, Clinton's campaign manager, falls victim to a phishing attack, granting Fancy Bear access to internal communications and leading to the theft of thousands of emails, which are later leaked to Wikileaks.
- 00:30:00 - 00:35:00
The hackers' operations are further complicated by another group, Cozy Bear, which infiltrates the Democratic National Committee. Despite warnings from intelligence agencies, the DNC fails to act, allowing both groups to operate undetected and causing significant damage to the Clinton campaign.
- 00:35:00 - 00:41:43
The documentary concludes with the ongoing threat posed by Russian hackers, highlighting their involvement in the Ukraine conflict and the need for vigilance against their tactics. The narrative emphasizes the importance of cybersecurity and the potential consequences of foreign interference in democratic processes.
Mapa mental
VΓdeo de preguntas y respuestas
What are the 'bears' in the documentary?
The 'bears' refer to various Russian hacker groups, each with different objectives and methods.
What was the significance of the Bundestag hack?
The hack compromised sensitive political information and highlighted vulnerabilities in Germany's cyber defenses.
How did the hackers gain access to the Bundestag's systems?
They used a phishing email that appeared to be from the United Nations, which Claudia Height clicked on.
What role did Russian hackers play in the 2016 US presidential election?
They leaked sensitive information from the Democratic Party to influence the election in favor of Donald Trump.
What is the current status of Russian hacker groups?
They remain active and continue to pose a significant threat to global cybersecurity and democracy.
What tools did the hackers use in their operations?
They used malware like X-Agent and X Tunnel to infiltrate systems and steal data.
What was the outcome of the investigation into the Bundestag hack?
The investigation pointed to Russian hacker group Fancy Bear, linked to the GRU.
How did the documentary conclude regarding the future of these hackers?
It suggests that the hackers are still a significant threat and that vigilance is necessary to counter their tactics.
What is the impact of these cyber attacks on democracy?
They undermine public trust in democratic institutions and can influence political outcomes.
What measures can be taken to protect against such cyber threats?
Increased cybersecurity awareness, better training, and robust security protocols are essential.
Ver mΓ‘s resΓΊmenes de vΓdeos
- 00:00:00This is the story of the hunt for the
- 00:00:02world's most dangerous hackers.
- 00:00:05[Music]
- 00:00:10Prologue. The bears.
- 00:00:14Once upon a time, there were five bears.
- 00:00:18They all lived in Russia.
- 00:00:20[Music]
- 00:00:22Each one was different in the things
- 00:00:25they liked and in the things they did.
- 00:00:29But they shared one important trait.
- 00:00:34They were all seriously dangerous.
- 00:00:39There was the fancy bear, elegant,
- 00:00:42agile, and cunning.
- 00:00:48Then came the lazy bear, who liked
- 00:00:50nothing more than making himself
- 00:00:53comfortable in other people's homes,
- 00:00:55just to lie in weight.
- 00:01:00The Berserker bear was obsessed with
- 00:01:02energy. All kinds of energy and all the
- 00:01:06things it could be used for.
- 00:01:09The voodoo bear had mastered an entire
- 00:01:12arsenal of dark arts.
- 00:01:16And last but not least, the toxic bear.
- 00:01:20Definitely not one to mess with.
- 00:01:24They were all fearless fighters. nasty
- 00:01:28creatures that sent shivers down the
- 00:01:30world's spine.
- 00:01:32Even in the most distant lands, people
- 00:01:35knew of them and feared them.
- 00:01:40But there's one more thing all these
- 00:01:42bears had in common. Their metaphors,
- 00:01:46nicknames for special units of Russian
- 00:01:49intelligence services. These units are
- 00:01:51made up of hackers,
- 00:01:53some of the most dangerous in the world.
- 00:01:56They each have different objectives. To
- 00:01:58spy, to expose, to wreak havoc. But
- 00:02:00they're not just a threat to computers
- 00:02:02or networks. They're a threat to Western
- 00:02:04democracies.
- 00:02:06They're tools of destabilization, of
- 00:02:08psychological warfare, of political
- 00:02:10manipulation. They've already made it
- 00:02:12into the German Parliament, into the
- 00:02:15email inboxes of the country's elected
- 00:02:16officials. They threw their full weight
- 00:02:18behind Donald Trump's 2016 campaign.
- 00:02:22They travel the world working in the
- 00:02:23interest of Vladimir Putin's regime and
- 00:02:26they've played a key role for years in
- 00:02:28Russia's brutal war against Ukraine.
- 00:02:31This documentary reveals who these
- 00:02:33hackers are, how they operate, and how
- 00:02:35we can protect ourselves from them.
- 00:02:42[Music]
- 00:02:48Heat.
- 00:02:50[Music]
- 00:03:04Heat.
- 00:03:06[Music]
- 00:03:21This documentary is largely based on a
- 00:03:23fantastic German speaking podcast Deman
- 00:03:25and Mira Ghner by German investigative
- 00:03:28journalists Hakan Tanke and Florian F.
- 00:03:31Link is in the description.
- 00:03:35Chapter 1, the email.
- 00:03:39This story begins with that little line
- 00:03:40above the E and with Claudia height. She
- 00:03:43was working in Berlin back then as an
- 00:03:44assistant to a member of the Bundistag,
- 00:03:46the German National Parliament.
- 00:03:49Her office is beautiful in the center of
- 00:03:51Berlin. It's May 8th, 2015, a warm
- 00:03:54Friday in spring. The weekend is just
- 00:03:57around the corner. She's trying to write
- 00:03:59an email to a colleague named Renee. Hm.
- 00:04:02The accent IU doesn't work. Strange. She
- 00:04:06tries all the usual, opening and closing
- 00:04:08Word, rebooting her PC. Nothing fixes
- 00:04:11the issue. The Bunist dog has its own
- 00:04:14internal service hotline for that kind
- 00:04:15of thing, 117. She tells the IT guys
- 00:04:18that she thinks her PC got infected with
- 00:04:20some kind of malware, perhaps a Trojan,
- 00:04:23but they don't take her seriously. At
- 00:04:25this point, no one realizes how serious
- 00:04:28the situation really is.
- 00:04:33There really was a Trojan on Claudia's
- 00:04:35computer. She'd been hacked. But it
- 00:04:38wasn't just her device. While she's
- 00:04:40still on the phone with 117, hackers are
- 00:04:43already deep inside the Bundesto
- 00:04:44systems. They're working on behalf of
- 00:04:47the Russian Military Intelligence
- 00:04:48Agency, the GRU.
- 00:04:51Putin's bears are running wild right
- 00:04:53through the very heart of Germany's
- 00:04:55political system.
- 00:04:57If all this happened today, Claudia
- 00:04:59could have just asked an AI assistant.
- 00:05:00Probably way more helpful than that
- 00:05:01service hotline. With UDA's website app,
- 00:05:04AI can also help you build your website
- 00:05:05in seconds. No coding skills needed.
- 00:05:08Just four easy steps. Define the type of
- 00:05:10website, industry, and goals. AI
- 00:05:12generates images and text tailored to
- 00:05:14your needs. Choose a color palette or
- 00:05:15upload your logo. Add pages and
- 00:05:17features. Choose a theme you like, then
- 00:05:19make it yours with simple drag and drop.
- 00:05:21With Chat GPT built in Udu, the perfect
- 00:05:24text is generated for you. or just ask
- 00:05:26AI to rewrite your copy for you. Need a
- 00:05:28multilingual website, a Japanese
- 00:05:29translation done in just a few clicks.
- 00:05:32It's fast, intuitive, and designed to
- 00:05:34make the experience smooth and
- 00:05:35effortless. Let UDO's built-in AI handle
- 00:05:37the busy work so you can focus on the
- 00:05:39big picture. Get started today for free.
- 00:05:41Your first app is free for life,
- 00:05:42including unlimited hosting and support.
- 00:05:44With the website app, you can even get a
- 00:05:46free custom domain for 1 year. You've
- 00:05:48never launched a website this easily.
- 00:05:49Add more apps anytime and get the full
- 00:05:51suite of apps starting at just β¬19.90
- 00:05:53per month. Click the link in the
- 00:05:55description to get started.
- 00:05:588 days earlier on April 30th, 2015,
- 00:06:01dozens of MPs and their staffs received
- 00:06:03an email. It looked official, as if it
- 00:06:06came from the United Nations. The
- 00:06:08subject line referenced Ukraine and its
- 00:06:10economic situation. It's just a year
- 00:06:12after the annexation of Crimea, Russia's
- 00:06:14first military incursion into Ukraine.
- 00:06:16The military operation is now underway
- 00:06:19in eastern Ukraine. The capital Kev and
- 00:06:21other Ukrainian cities have been hit by
- 00:06:24air and missile strikes over the past
- 00:06:26several hours.
- 00:06:27The situation in Ukraine was already a
- 00:06:29red-hot political issue. You had to stay
- 00:06:31informed. And if the UN sent something
- 00:06:33around, Claudia height and many others
- 00:06:35clicked. That single click was enough.
- 00:06:39Malware installed itself quietly in the
- 00:06:40background. No pop-ups, no warnings. The
- 00:06:43infection was silent, and from that
- 00:06:45moment on, the hackers had access. Their
- 00:06:49objective was clear. Gain administrator
- 00:06:51rights with those that had the digital
- 00:06:53equivalent of master keys, access to
- 00:06:55everything, the power to change
- 00:06:57anything.
- 00:06:59And they got what they came for. They
- 00:07:01broke into areas of the system that
- 00:07:02should have been completely off limits.
- 00:07:04That's how they were able to push deeper
- 00:07:06and deeper until they had essentially
- 00:07:08taken over the Bundesto's IT
- 00:07:09infrastructure. It was a sophisticated
- 00:07:11operation, carefully planned and
- 00:07:13executed. The attackers moved laterally,
- 00:07:16jumping from computer to computer,
- 00:07:17scanning for valuable information,
- 00:07:19documents, emails, anything of use.
- 00:07:23Eventually, they reached two machines
- 00:07:24inside a parliamentary office of the
- 00:07:26conservatives.
- 00:07:27And not just any office, Angala Merkels,
- 00:07:30the German chancellor at the time.
- 00:07:33[Applause]
- 00:07:38The Bundesaggh is one of the most
- 00:07:40serious cyber attacks in German history.
- 00:07:42It will set off a large-scale
- 00:07:43international investigation and
- 00:07:45eventually arrest warrants that had once
- 00:07:47seemed unimaginable.
- 00:07:48And yet, inside the bunist dog itself,
- 00:07:51the attack goes unnoticed for quite some
- 00:07:53time.
- 00:07:57Back to that Friday afternoon call with
- 00:07:59117. Claudia is frustrated with how
- 00:08:02unhelpful the first hotline call had
- 00:08:03been. So, she does what most people do
- 00:08:05in that situation. She calls again,
- 00:08:08hoping the next person might actually
- 00:08:09understand what's going on. But even the
- 00:08:12second person on the line doesn't take
- 00:08:14her seriously. Angry and fed up, Claudia
- 00:08:17decides to just shut down her PC and go
- 00:08:19home. It is Friday after all, and the
- 00:08:21weekend has already begun.
- 00:08:23[Music]
- 00:08:28On Monday morning, an IT staffer
- 00:08:30remotely logs into Claudia's machine and
- 00:08:32reinstalls Word, which of course doesn't
- 00:08:35fix anything. By the afternoon, someone
- 00:08:37finally comes in person, but even they
- 00:08:40don't catch that there's a Trojan on
- 00:08:41Claudia's PC. By this point, the hackers
- 00:08:44have already been inside the system for
- 00:08:45at least 2 weeks. And still, almost no
- 00:08:48one realizes that this might actually be
- 00:08:50a cyber attack. Meanwhile, over in the
- 00:08:53UK, a cyber security firm has been
- 00:08:55keeping an eye on a suspicious foreign
- 00:08:57server, one that had been used for
- 00:08:59previous cyber attacks. Suddenly, that
- 00:09:02server establishes a connection to
- 00:09:03machines inside the Bundesto network.
- 00:09:06The firm alerts the federal office for
- 00:09:08the protection of the Constitution. A
- 00:09:10day later, the warning reaches both the
- 00:09:12Bundesto's classified information office
- 00:09:14and the Federal Office for Information
- 00:09:16Security, BSI, and bond. Thanks to
- 00:09:19German bureaucracy doing what German
- 00:09:21bureaucracy does. The warning takes a
- 00:09:23brisk 3 days to actually land.
- 00:09:26Finally, someone realizes what's
- 00:09:27happening. The BSI sends a special team
- 00:09:30to Berlin. Their job, comb through the
- 00:09:32logs. Those are automatic records on
- 00:09:34computers that track what happened when
- 00:09:36and how. Which programs were opened,
- 00:09:39what was clicked, what ran in the
- 00:09:41background, all of it. The BSI team
- 00:09:43needs to figure out three things. Is
- 00:09:45this a major attack? Yes. What are the
- 00:09:48hackers after? Probably stealing data.
- 00:09:51And are they still inside? Very much so.
- 00:09:54The team doesn't hesitate. They shut
- 00:09:56down the entire network. From the
- 00:09:58outside, it looks like someone just
- 00:10:00ripped the plug out of the wall. Claudia
- 00:10:02watches her computer power off like it
- 00:10:04has a mind of its own, like it's
- 00:10:06haunted. She half expects the lights to
- 00:10:08flicker next.
- 00:10:10That same day, Durbigel broke the story.
- 00:10:13The first media outlet to report on the
- 00:10:14cyber attack. Politicians found out from
- 00:10:17the news, not from internal channels.
- 00:10:19From that moment on, chaos took over.
- 00:10:22Lawmakers were furious. No one could
- 00:10:25work properly. No emails, no access to
- 00:10:27documents, no reports. And this isn't a
- 00:10:30movie. You don't just kick the hackers
- 00:10:32out and move on. The network is giant,
- 00:10:35messy, and hard to control. The response
- 00:10:37team had to fight their way through it,
- 00:10:39trying to stop any further data theft
- 00:10:41and rest back control. It took weeks to
- 00:10:44clean the system. During that time, MPs
- 00:10:47and their staff could only use certain
- 00:10:48parts of the network. No one knew if the
- 00:10:50hackers were still reading their emails.
- 00:10:52Important notes were suddenly written
- 00:10:54down by hand again, just to stay safe.
- 00:10:59The Bundesto's IT security was clearly
- 00:11:02overwhelmed. It faced intense criticism
- 00:11:04in the months after. When the dust
- 00:11:06finally settles, the investigation into
- 00:11:08the perpetrators begins, and the trail
- 00:11:10points to Russia right from the start.
- 00:11:13On Claudia Height's computer,
- 00:11:15investigators find malware called X
- 00:11:17Tunnel. Xunnel functions like a real
- 00:11:19tunnel, a direct continuous link that
- 00:11:21allows attackers to access the network
- 00:11:23whenever they want. Inside the code,
- 00:11:26analysts uncover connections to a server
- 00:11:28believed to be used by a group known as
- 00:11:30AP28.
- 00:11:32AP stands for advanced persistent
- 00:11:34threat. It's a label used for hacker
- 00:11:36groups that are not only highly skilled,
- 00:11:38but also extremely patient. The kind of
- 00:11:41intruders who don't just strike and
- 00:11:42vanish, but stay deeply embedded,
- 00:11:45sometimes for years. By all accounts,
- 00:11:47AP28 is a Russian group, and it also
- 00:11:50goes by another name, Fancy Bear.
- 00:11:54Fancy Bear operates under the GRU,
- 00:11:56Russia's military intelligence service.
- 00:11:59The group is notorious. This is where
- 00:12:01they work in what's known as the
- 00:12:03aquarium in Moscow. No one knows who
- 00:12:06they really are. No names, no faces, not
- 00:12:09even how many of them exist. But one
- 00:12:12thing is clear. They do whatever it
- 00:12:14takes. They'll stop at nothing. Not even
- 00:12:17the computer of the sitting German
- 00:12:18chancellor. Ironically, it's there in
- 00:12:22that highly sensitive office where one
- 00:12:24of the hackers slips up.
- 00:12:26They managed to break into a computer in
- 00:12:28Angela Merkel's outer office, her
- 00:12:30personal machine, her inbox. It's
- 00:12:33exactly what they were after. To extract
- 00:12:35the emails, one of the hackers writes a
- 00:12:37custom program. The tool is designed to
- 00:12:39copy her Outlook inbox and send that
- 00:12:41copy to a server they control. The
- 00:12:43program is called VSC.exe.
- 00:12:46But there's a problem. While coding, the
- 00:12:48hackers make a mistake. To locate and
- 00:12:50extract the files, VSC.exe needs to
- 00:12:53follow a specific file path. And that
- 00:12:55path includes the words aba buo. But the
- 00:12:58program doesn't recognize the German oo.
- 00:13:00Instead, the character shows up as a
- 00:13:02garbled symbol, a question mark followed
- 00:13:04by r o. So, the program can't find the
- 00:13:07folder. For a moment, the entire
- 00:13:09operation stumbles over the quirks of
- 00:13:11the German language. Realizing the
- 00:13:13attack might be exposed at any moment,
- 00:13:14the hackers panic a little. Under
- 00:13:16pressure, they decide to rewrite the
- 00:13:18code. This time they tell the program,
- 00:13:20"Expect German. Expect that OO." Then
- 00:13:23they try again, and this time it works.
- 00:13:26The tool successfully copies the inbox
- 00:13:28and sends it out. It's not Miracle's
- 00:13:30correspondence from the Chancellory, but
- 00:13:32still a huge win for the attackers.
- 00:13:35But the hackers messed up. Maybe from
- 00:13:37the rush, maybe out of nervousness. In
- 00:13:40the code of the program, investigators
- 00:13:42later discover a critical detail. The
- 00:13:44hacker forgot to delete the name of the
- 00:13:46computer he was working on. The path
- 00:13:49reads, "See users Scaramooch."
- 00:13:52Scaramu is a clown-like character from
- 00:13:54Italian theater. People might also
- 00:13:56recognize the name from Bohemian Rap
- 00:13:58City.
- 00:13:59[Music]
- 00:14:03That's the hacker's alias, his handle.
- 00:14:06In secret, Scaramoosh and his team
- 00:14:08become high priority targets. The
- 00:14:10federal public prosecutor's office opens
- 00:14:12an investigation on suspicion of
- 00:14:14espionage and Glen Merkel later calls it
- 00:14:17an act of hybrid warfare. But publicly
- 00:14:19the German government keeps quiet at
- 00:14:21first. No accusations, no pointing
- 00:14:23fingers. In total around 16 GB of data
- 00:14:27is believed to have been stolen from the
- 00:14:28Bundisto network, though no one knows
- 00:14:30for sure. 16 GB doesn't sound like much,
- 00:14:33right? Just an old USB stick. But in
- 00:14:36context, it's a lot. Especially if we're
- 00:14:39talking only emails. 16 GB contains a
- 00:14:42staggering amount of information. Hm. Is
- 00:14:45that really the end of the world,
- 00:14:46though? A little espionage here and
- 00:14:48there. Business as usual. Sure, they
- 00:14:51stole some files, but what could they
- 00:14:52really do with that?
- 00:14:54Then came the US presidential election
- 00:14:56in 2016. Putin's bears shows what
- 00:14:59they're really capable of. The Clinton
- 00:15:00campaign won't confirm or deny the
- 00:15:02veracity of any of the emails posted by
- 00:15:04Wikileaks.
- 00:15:05What lines they're willing to cross and
- 00:15:07just how much chaos a few gigabytes can
- 00:15:09unleash.
- 00:15:11[Music]
- 00:15:13Chapter 2, The Orange.
- 00:15:21In mid 2015, Donald Trump announces his
- 00:15:23candidacy.
- 00:15:25At first, no one really takes him
- 00:15:26seriously, but because he's so
- 00:15:28different, so unfiltered, saying things
- 00:15:30no one else would dare, the media can't
- 00:15:32stop talking about him.
- 00:15:34And Mexico will pay for the wall,
- 00:15:38I could stand in the middle of Fifth
- 00:15:39Avenue and shoot somebody and I wouldn't
- 00:15:41lose any voters. Okay.
- 00:15:42One outrageous statement after the next
- 00:15:44dominates the headlines.
- 00:15:46ISIS is honoring
- 00:15:49President Obama. He is the founder of
- 00:15:53ISIS. He's the founder of ISIS.
- 00:15:55There's public outrage, disbelief, and
- 00:15:57widespread support for him.
- 00:15:58I don't know what I said. Uh, I don't
- 00:16:00remember.
- 00:16:01By early 2016, Trump is no longer the
- 00:16:03oddball outsider. He's now the
- 00:16:05Republican frontr runner, going
- 00:16:07headto-head with Democrat Hillary
- 00:16:08Clinton.
- 00:16:12Half a world away in the Kremlin,
- 00:16:13Vladimir Putin is watching closely. He
- 00:16:16doesn't like Hillary Clinton. Not one
- 00:16:18bit. The two have history. Back in 2011,
- 00:16:21Clinton was the US Secretary of State
- 00:16:23when Russia held national elections. She
- 00:16:25publicly questioned whether the vote had
- 00:16:27been rigged and massive protests
- 00:16:29followed across the country. Putin
- 00:16:31accused the US of stirring up those
- 00:16:32demonstrations. He never forgave her for
- 00:16:34that. Politically, she had been one of
- 00:16:36his toughest opponents for years. Later,
- 00:16:39the European Court of Human Rights
- 00:16:40confirmed that the 2011 Russian election
- 00:16:42was in fact manipulated.
- 00:16:44Putin clearly is rooting for the other
- 00:16:46guy, the loud billionaire. Trump, for
- 00:16:49his part, has repeatedly praised Putin
- 00:16:51in the past. He sees Putin as a strong
- 00:16:53leader, someone he thinks he could get
- 00:16:55along with as president. So Putin
- 00:16:57consults with his three intelligence
- 00:16:59agencies and makes a call.
- 00:17:03March 19th, 2016, an email lands in the
- 00:17:06inbox of John Podesta, Clinton's
- 00:17:08campaign manager. The message looks like
- 00:17:10a standard Google security alert,
- 00:17:12something about suspicious activity, and
- 00:17:14a prompt to reset the password. But
- 00:17:16Podesta double checks with an IT staffer
- 00:17:18at the DNC to be sure. Unfortunately,
- 00:17:20the staffer replies that the email is
- 00:17:22legit when he actually meant the
- 00:17:24opposite. Just one typo with massive
- 00:17:26consequences. Podesta assumes the
- 00:17:29message is safe, clicks the link, and
- 00:17:31enters his login on a fake site. That's
- 00:17:33it. The hackers are in. They now have
- 00:17:36access to internal communications,
- 00:17:37emails, and nearly everything tied to
- 00:17:39the campaign. They're part of Fancy
- 00:17:41Bear, the same group tied to the
- 00:17:43Bundesto hack.
- 00:17:46They steal 50,000 of Podesta's emails.
- 00:17:49The tactic is known as fishing, casting
- 00:17:51bait and waiting for a bite. Spear
- 00:17:53fishing, more specifically, as it's
- 00:17:54tailored to a specific person. With the
- 00:17:57same approach, Fancy Bear targets 300
- 00:17:59more people inside Clinton's campaign.
- 00:18:01No one knows how many fell for it. In
- 00:18:03early April, they go after another key
- 00:18:05target, the Democratic Congressional
- 00:18:07Campaign Committee, DCCC, a central
- 00:18:10player in the Democratic election
- 00:18:11machine. Using more convincingly real
- 00:18:14looking emails, they manage to steal the
- 00:18:15credentials of at least one DCCC
- 00:18:17employee. And just like that, they're in
- 00:18:20again.
- 00:18:22Once inside, Fancy Bear uses two main
- 00:18:24types of malware, X-Agent and X Tunnel.
- 00:18:27The latter is the same tool used in the
- 00:18:29attack on Claudia Heights computer in
- 00:18:31Berlin. While digging through the DCCC,
- 00:18:33the hackers find something even more
- 00:18:35valuable. Credentials that let them slip
- 00:18:37into the Democratic National Committee,
- 00:18:39DNC, the heart of the party. There they
- 00:18:42uncover detailed documents on campaign
- 00:18:44strategy, including a file on Trump full
- 00:18:46of potentially damaging information.
- 00:18:49In early May, the intrusion is finally
- 00:18:51detected. The DCCC and the DNC hire a
- 00:18:54cyber security firm to clean house, a
- 00:18:57process that will stretch all the way
- 00:18:58into October. But the Democrats should
- 00:19:01have discovered the hackers much sooner.
- 00:19:04[Music]
- 00:19:06In a small, unremarkable office in
- 00:19:07Moscow, another set of hackers is
- 00:19:09quietly at work. This group is known as
- 00:19:12Cozy Bear, most likely working under the
- 00:19:14SVR, Russia's Foreign Intelligence
- 00:19:16Service. They've been inside the
- 00:19:17Democrats network since June 2015, far
- 00:19:20longer than Fancy Bear. As strange as it
- 00:19:23sounds, Cozy and Fancy Bear probably
- 00:19:24weren't even aware of each other. They
- 00:19:26had different bosses, didn't talk,
- 00:19:28didn't collaborate. Cozy Bear is known
- 00:19:30for being quiet and methodical,
- 00:19:32targeting all kinds of institutions
- 00:19:33without leaving much of a trace. But
- 00:19:35this time, someone's watching them. In
- 00:19:372014, Dutch intelligence pulled off an
- 00:19:39incredible hack. They gained access to
- 00:19:41surveillance cameras in the very
- 00:19:43building where Cozy Bear operates.
- 00:19:45They're literally washing the hackers at
- 00:19:46work. That's how they realize Cozy Bear
- 00:19:49is crawling through the DNC systems. So,
- 00:19:51the AIVD warns the American counterparts
- 00:19:53early on. That warning eventually
- 00:19:55reaches the FBI. By September 2015, an
- 00:19:58agent in Washington calls the DNC to let
- 00:20:01them know Russian hackers are inside
- 00:20:02their systems, but the warning goes
- 00:20:04nowhere.
- 00:20:06The call lands with lower level IT staff
- 00:20:08and is more or less ignored. Senior
- 00:20:10leadership at the DNC later claimed they
- 00:20:12didn't even know about it at the time.
- 00:20:14The hackers could have been discovered
- 00:20:15much earlier. If anyone had looked more
- 00:20:17closely at Cozy Bear, they likely would
- 00:20:19have seen Fancy Bear, too. And if that
- 00:20:21had happened, the summer of 2016 might
- 00:20:23have unfolded quite differently.
- 00:20:29But it didn't.
- 00:20:32Back to spring 2016, Fancy Bear launches
- 00:20:35a website, dcaks.com.
- 00:20:38And starting in June, they begin
- 00:20:39dropping bombshell after bombshell. They
- 00:20:41invent a fake identity, Guifer 2.0, a
- 00:20:44supposed Romanian lone wolf behind all
- 00:20:46the leaks. Guifer gets a blog, reaches
- 00:20:49out to journalists, and offers up stolen
- 00:20:51files. The DNC hack dominates the
- 00:20:53headlines. It becomes breaking news on
- 00:20:55TV. Suddenly, internal dirt from within
- 00:20:57the Democratic Party. Rumors, backroom
- 00:20:59deals, tensions is out in the open. It's
- 00:21:01a major blow to Hillary Clinton's
- 00:21:03campaign. The emails appear to show the
- 00:21:05DNC clearly favoring Clinton over Bernie
- 00:21:07Sanders, even though they were supposed
- 00:21:08to stay neutral. There's content about
- 00:21:11what she earned for Wall Street speeches
- 00:21:12and even alleged anti-atholic bias.
- 00:21:16Trump jumps on the scandal. At a rally,
- 00:21:18he famously says, "Russia, if you're
- 00:21:20listening, I hope you're able to find
- 00:21:23the 30,000 emails that are missing. I
- 00:21:27think you will probably be rewarded
- 00:21:30mightily by our press.
- 00:21:32At that point, Clinton is already under
- 00:21:33pressure over her use of a private email
- 00:21:35server while serving as Secretary of
- 00:21:37State. The FBI confirms she also deleted
- 00:21:40private emails from that account, which
- 00:21:42makes people believe that she's hiding
- 00:21:43something. Trump seizes the moment,
- 00:21:45tying that controversy to the flood of
- 00:21:47new leaks. That very same day, Fancy
- 00:21:49Bear sent 76 spear fishing emails to
- 00:21:51Clinton's staff. The impact of the leaks
- 00:21:54on Clinton's campaign is huge. Maybe not
- 00:21:56the deciding factor, but they definitely
- 00:21:57give Trump a boost over and over again.
- 00:22:00What started as chaos turned into
- 00:22:02something more focused. A clear attempt
- 00:22:04to help Donald Trump. Just over a month
- 00:22:06before election day, the hackers hand
- 00:22:08over John Podesta's emails to Wikileaks.
- 00:22:11And then week after week, those emails
- 00:22:13are released strategically, some more
- 00:22:15dramatic than others, but all grabbing
- 00:22:17headlines. The constant drip of leak
- 00:22:19material creates a lasting impression.
- 00:22:21Something shady is going on inside the
- 00:22:23Democratic party. Clinton loses
- 00:22:25momentum. She's forced to shift her
- 00:22:27message and constantly defend herself in
- 00:22:29the press and directly against Trump in
- 00:22:31public debates. The leaks are part of
- 00:22:34something bigger. Fancy Bear is
- 00:22:35supported by a digital army of trolls.
- 00:22:38For example, operating out of this
- 00:22:39building in St. Petersburg, they flood
- 00:22:41social media with manipulated content
- 00:22:43and polarizing posts. Some even succeed
- 00:22:46in organizing real life protests across
- 00:22:47multiple US cities.
- 00:22:49[Music]
- 00:22:53Hillary Clinton loses, Donald Trump
- 00:22:56becomes president. It's nearly
- 00:22:57impossible to measure how much influence
- 00:22:59the hacks and disinformation had,
- 00:23:01whether they tipped the scales, but many
- 00:23:03experts like Kathleen Hall Jameson agree
- 00:23:05they had an impact. Russia to some
- 00:23:07extent successfully interfered with the
- 00:23:092016 US election.
- 00:23:14It's widely seen as the most effective
- 00:23:15hack and leak operation ever pulled off.
- 00:23:18steal data, release it strategically,
- 00:23:20and fan the flames of chaos. The idea
- 00:23:22that states spy on each other isn't new.
- 00:23:25But taking that intelligence and
- 00:23:26throwing it into the public to
- 00:23:27deliberately sway an election, that's
- 00:23:29something else entirely. If hackers can
- 00:23:31get their hands on internal data,
- 00:23:32release it at the perfect moment, and
- 00:23:34shape public opinion, what does that
- 00:23:36mean for the future of democracy? If a
- 00:23:38foreign power can mess with the core of
- 00:23:39another country's democratic process,
- 00:23:41that's not just hacking. That's
- 00:23:43destabilization. And it's part of a
- 00:23:45broader pattern made to erode public
- 00:23:46trust in democratic institutions.
- 00:23:48Democracies are at a disadvantage in
- 00:23:50this fight. A dictatorship can flood the
- 00:23:52internet with state media, bots, fake
- 00:23:54accounts, leak operations and watch as
- 00:23:56the public sphere in open society
- 00:23:58fragments and turns against itself.
- 00:24:01Meanwhile, inside the authoritarian
- 00:24:02regime, nothing wobbles. Descent is
- 00:24:05crushed quickly and publicly.
- 00:24:08The United States only realizes what
- 00:24:10just happened after elections have
- 00:24:11already passed. The CIA, FBI, and NSA
- 00:24:14compiled their findings in a highly
- 00:24:16classified report. In early 2017, a
- 00:24:18redacted version is released to the
- 00:24:20public. One sentence stands out as
- 00:24:22especially alarming. We assess that
- 00:24:24Moscow will apply lessons learned from
- 00:24:26its campaign aimed at the US
- 00:24:27presidential election, to future
- 00:24:29influence efforts worldwide. The sheer
- 00:24:31aggression and skills of these cyber
- 00:24:32operations, especially in the US, opens
- 00:24:35many people's eyes. They realize this
- 00:24:38isn't just spying, it's sabotage.
- 00:24:41In Germany, alarm bells start ringing,
- 00:24:43too. There's a federal election coming
- 00:24:44up in 2017. What does all of this mean
- 00:24:47for them? Then a new website pops up.
- 00:24:51Btleaks.com.
- 00:24:52BT like Bundist. Just like dcakes.com.
- 00:24:57Suddenly, everyone is on edge.
- 00:24:59Variations like btleaks.org start
- 00:25:01appearing too. German authorities notice
- 00:25:03that someone is registering these sites
- 00:25:05and panic starts to set in. Is the world
- 00:25:07about to see a repeat of the US
- 00:25:09playbook?
- 00:25:11In early May 2017, Angela Merkel travels
- 00:25:14to Russia for the first time since the
- 00:25:15Bundist Dog hack. She meets Putin at his
- 00:25:18summer residence in Sochi. There she
- 00:25:20confronts him. Putin insists that Russia
- 00:25:22never interferes in the internal affairs
- 00:25:24of other nations. Merkel replies firmly,
- 00:25:27"I assume that German parties will
- 00:25:29handle their election campaigns among
- 00:25:30themselves. A clear warning, stay out."
- 00:25:34In the end, the 2017 German election
- 00:25:36isn't rocked by any major leaks. To this
- 00:25:39day, no one knows for sure what happened
- 00:25:40to the stolen 16 GB from the Bundesog
- 00:25:43hack. There's never been a single public
- 00:25:45leak directly tied to that data. But
- 00:25:47then again, maybe there doesn't need to
- 00:25:49be. Maybe the information was used in
- 00:25:51some other way. Quietly, tactically.
- 00:25:55Meanwhile, the hunt for Scaramooch
- 00:25:57continues. It'll be a while before his
- 00:25:59identity is finally confirmed.
- 00:26:02[Music]
- 00:26:07[Music]
- 00:26:20Some of his colleagues aren't so lucky.
- 00:26:23[Music]
- 00:26:26Chapter 3. The cleaning crew.
- 00:26:34April 10th, 2018, a passenger plane from
- 00:26:37Moscow lands at Skipple airport in the
- 00:26:39Netherlands.
- 00:26:40Among the passengers, four Russian men.
- 00:26:43They look like typical business
- 00:26:44travelers, Alexe Minion and Alexnikov.
- 00:26:48Both in their 40s, seem cheerful. Behind
- 00:26:50them walk two younger men, Yfgenei
- 00:26:53Seabriov and Alexe Morenitz. According
- 00:26:56to their passports, they're diplomats. A
- 00:26:58sharply dressed man from the Russian
- 00:26:59embassy meets them in arrivals and
- 00:27:01escorts them out of the airport.
- 00:27:03But they aren't here on official duty.
- 00:27:05They're part of a special unit trained
- 00:27:07to carry out covert foreign operations.
- 00:27:10Minion and Sutnikov handle
- 00:27:12reconnaissance. Seriov and Minitz are
- 00:27:15the hackers. They rent a small car and
- 00:27:17drive to the H. They stop at an
- 00:27:20electronic store to buy a heavy duty
- 00:27:2112vt battery and a charger, then check
- 00:27:24into a hotel.
- 00:27:27The next day, Minion heads to OPCW, the
- 00:27:30organization for the prohibition of
- 00:27:31chemical weapons. That's an
- 00:27:33international body that investigates
- 00:27:34chemical weapons use and checks
- 00:27:36compliance with global conventions. The
- 00:27:38OPCW has just finalized its report on a
- 00:27:41high-profile case. Sergey Scrippal and
- 00:27:44his daughter Julia were found
- 00:27:45unconscious on a bench in Salisbury, UK
- 00:27:47after being poisoned with Novach, a
- 00:27:50nerve agent developed in Russia. The
- 00:27:52OPCW report confirms the British
- 00:27:54findings.
- 00:27:56Minan scouts the site. He photographs
- 00:27:59the OPCW building and the Marriott Hotel
- 00:28:01next door. 2 days later, April 13th, the
- 00:28:05group plans to strike. Time is short.
- 00:28:09What they don't realize is that they're
- 00:28:10being watched. From the moment they set
- 00:28:12foot into the country, they've been
- 00:28:13under surveillance by the Dutch Military
- 00:28:15Intelligence Service, MIVD. For the
- 00:28:18original version of this documentary, we
- 00:28:20interviewed a senior MIVD official. Due
- 00:28:22to Wright's restrictions, we had to cut
- 00:28:24those segments from this adaptation. He
- 00:28:26couldn't help but grin when describing
- 00:28:27their transport. A rather small car for
- 00:28:29a bunch of guys tightly cramped in
- 00:28:31there. The agency follows them closely,
- 00:28:33but how did they even know to look for
- 00:28:35them? Apparently, the MIVD received
- 00:28:37intelligence that members of APT28 would
- 00:28:40be flying in. Fancy bear again.
- 00:28:43According to the Guardian, the original
- 00:28:44tip may have come from British
- 00:28:46intelligence.
- 00:28:48April 13th, the operation begins. The
- 00:28:51four men drive to the Marriott hotel and
- 00:28:53park close to the OPCW building. The
- 00:28:55car's rear faces the compound. The trunk
- 00:28:58is packed with equipment. The battery
- 00:29:01and a voltage regulator power a computer
- 00:29:03which is connected to a laptop in the
- 00:29:05front. Sarah Briakov and Morinets use it
- 00:29:08to execute the hack. The key component
- 00:29:10is a flat panel Wi-Fi antenna hidden
- 00:29:12under a jacket connected via USB. It
- 00:29:15mimics the OPCW's real Wi-Fi network.
- 00:29:18Devices inside might autoconnect,
- 00:29:20believing it's legit. Once they connect,
- 00:29:22the hackers can steal credentials. With
- 00:29:24those, they could slip into the OPCW's
- 00:29:27internal network. The likely goal, steal
- 00:29:29or undermine the scripple findings or
- 00:29:31discredit the organization through a
- 00:29:32leak,
- 00:29:34but they don't get that far.
- 00:29:38Dutch authorities move in. Two unmarked
- 00:29:40vehicles roll quietly onto the lot.
- 00:29:42Then, sudden action. Doors fly open. The
- 00:29:45four men are taken down. One tries to
- 00:29:47destroy his phone, kicking it
- 00:29:48repeatedly, but fails.
- 00:29:52Then comes the search. There's a plastic
- 00:29:54bag filled with trash from their hotel
- 00:29:56room. Beer cans, receipts, a
- 00:29:58half-hearted attempt to cover their
- 00:29:59tracks. Also, β¬20,000 and $20,000 in
- 00:30:03Chris bills. Most incriminating of all,
- 00:30:06a taxi receipt in Morinens's bag
- 00:30:09documenting a ride from the GRU barracks
- 00:30:11to the airport on the day of departure.
- 00:30:13The team's devices tell an even bigger
- 00:30:15story. One phone was activated just the
- 00:30:17day before their trip. Its first signal
- 00:30:19pinged a tower right next to the GRU
- 00:30:21headquarters.
- 00:30:22The laptops reveal a broader mission
- 00:30:24trail. Seriov had been in Lusan in 2016
- 00:30:28likely targeting the World Anti-Doping
- 00:30:30Agency.
- 00:30:31Breaking news out of Loausanne,
- 00:30:32Switzerland, where Russia has been
- 00:30:34handed a 4-year ban by the World
- 00:30:36Anti-Doping Agency.
- 00:30:38In December 2017, he was in Koala Lumpur
- 00:30:40where he reportedly tried to hack the
- 00:30:42Malaysian police. The agency then
- 00:30:44investigating the MH17 plane crash.
- 00:30:46Malaysia Airlines flight MH17 crash
- 00:30:49landed in eastern Ukraine.
- 00:30:52That flight was brought down by a
- 00:30:53Russian-made missile over eastern
- 00:30:54Ukraine. And the team wasn't planning to
- 00:30:57stop at the OPCW. They had trained
- 00:30:59tickets from UTF to burn Switzerland,
- 00:31:01likely headed for the SPE laboratory,
- 00:31:03which was also analyzing Novach.
- 00:31:07Sometimes hackers need to get physically
- 00:31:09close to their targets. Sending fishing
- 00:31:11emails isn't enough. You need to know
- 00:31:13what kind of networks are in place, what
- 00:31:14security measures are active, and
- 00:31:16sometimes even watch the people going in
- 00:31:17and out. German journalists have
- 00:31:20nicknamed them the cleaning crew because
- 00:31:21they show up after something major has
- 00:31:23gone wrong and try to clean up or spin
- 00:31:25the story. For the MIVD, this was a
- 00:31:27major win and they decided to take it
- 00:31:29public. Usually, they don't disclose
- 00:31:31their operations, but this time they had
- 00:31:33a press conference 5 months later. The
- 00:31:36four men were eventually released and
- 00:31:38sent back to Russia, likely for
- 00:31:39diplomatic reasons. Their mistakes seem
- 00:31:42amateur-ish.
- 00:31:44Why keep that taxi receipt?
- 00:31:47Well, these aren't mythical hooded
- 00:31:48figures. They're civil servants. Hackers
- 00:31:51on a schedule, assigned tasks, bad
- 00:31:53coffee, strict rules. They just happen
- 00:31:56to work for an authoritarian regime and
- 00:31:57weaponized code.
- 00:32:00Russia, of course, denies everything.
- 00:32:02The men were supposedly just on a
- 00:32:04routine trip. Of course, nothing screams
- 00:32:06routine like a flat panel antenna in the
- 00:32:09trunk.
- 00:32:12This strange hotel parking lot escapade
- 00:32:14shows something important. Putin's bears
- 00:32:16can be stopped. Germany has fended them
- 00:32:19off. A conservative linked NGO was
- 00:32:21targeted, but the attack failed. In
- 00:32:24France, McCloon's 2017 campaign fended
- 00:32:26off a similar attack. And in the US, the
- 00:32:29response came loud and clear. In 2018,
- 00:32:32they decide to send a message. That
- 00:32:34February, the US Department of Justice
- 00:32:36indictes 13 Russian nationals and three
- 00:32:38Russian companies. They're accused of
- 00:32:40deliberately interfering with the
- 00:32:41American political system. Not long
- 00:32:43after, another sweeping indictment is
- 00:32:45released. This one focused specifically
- 00:32:47on Fancy Bear. The FBI outlines exactly
- 00:32:50how they trace the DNC hack back to
- 00:32:51individual Russian operatives. Multiple
- 00:32:53names are listed, all Russian citizens.
- 00:32:56According to the investigators, they
- 00:32:57work for Russian intelligence.
- 00:33:00The hackers remain safe in Russia. No
- 00:33:02arrests follow. But one thing is clear,
- 00:33:04much of the world is now off limits to
- 00:33:06them. And this isn't just about naming
- 00:33:08names. It's a clear line in the sand.
- 00:33:11There are boundaries and these
- 00:33:13operatives cross them.
- 00:33:16One name stands out to German
- 00:33:18investigators. One of the men listed is
- 00:33:20believed to use the alias Scaramoosh.
- 00:33:22The same alias linked to the VSC.exe
- 00:33:25program. His real name is Dimmitri
- 00:33:27Boden.
- 00:33:29He's the man who broke into Angla
- 00:33:30Merkel's computer. Today he's 32 years
- 00:33:33old. Investigators found out quite a lot
- 00:33:35about him. They have photos of him.
- 00:33:37Young face, dark blonde hair, shoulder
- 00:33:39length now. He's from Kursk, married,
- 00:33:42reportedly has a daughter, lives in a
- 00:33:44town just south of Moscow. He listens to
- 00:33:46music while he works. Russian rock,
- 00:33:49techno. According to forensics, he even
- 00:33:51string football matches while hacking.
- 00:33:53He's a big fan of Cristiano Ronaldo.
- 00:33:55Apparently, in many ways, he seems like
- 00:33:57an average guy, but he's a government
- 00:33:59hacker serving in a regime that targets
- 00:34:01Western democracies. In May 2020, the
- 00:34:04German federal public prosecutor files
- 00:34:06charges against Bowen as well.
- 00:34:11After the first wave of indictments in
- 00:34:132018, Vladimir Putin sat down with NBC
- 00:34:15for an interview. There, he was
- 00:34:17confronted with the allegations.
- 00:34:1913 Russians and three Russian-owned
- 00:34:22companies have been indicted by a
- 00:34:23special prosecutor named Robert Mueller
- 00:34:25in the United States for interfering in
- 00:34:28our election. Why would you allow an
- 00:34:30attack like this on the United States?
- 00:34:34Why have you decided the Russian
- 00:34:35authorities, myself included, gave
- 00:34:38anybody permission to do this?
- 00:34:39If the 13 Russian nationals plus three
- 00:34:42Russian companies did in fact interfere
- 00:34:44in our elections, is that okay with you?
- 00:34:52I don't care.
- 00:34:54I couldn't care less.
- 00:34:57Putin's bears were never captured. Their
- 00:34:59operations weren't dismantled. This
- 00:35:01isn't a story with a clean, satisfying
- 00:35:03ending. Quite the opposite.
- 00:35:07Chapter 4. The satellite.
- 00:35:16February 24th, 2022. A cold night in
- 00:35:19Moscow. The day has barely begun.
- 00:35:26[Music]
- 00:35:29A quiet man heads to work earlier than
- 00:35:31usual.
- 00:35:32He's riding the metro
- 00:35:34[Music]
- 00:35:42at Polyska station. He gets off. From
- 00:35:45there, it's a 10-minute walk.
- 00:35:51He's a little on edge. Lights a
- 00:35:53cigarette. He works for the GRU in the
- 00:35:56aquarium. He's part of unit 74455,
- 00:36:00better known abroad as Sandworm or
- 00:36:02Voodoo Bear. At his desk, he pulls up a
- 00:36:05chair. Time to go to work.
- 00:36:09[Music]
- 00:36:12He and his colleagues have spent months
- 00:36:14preparing for this moment. Now it's just
- 00:36:16a few final clicks.
- 00:36:19[Music]
- 00:36:27Meanwhile, in Austin, Texas, it's still
- 00:36:29February 23rd. A senior executive at
- 00:36:32Vioat, a satellite internet provider, is
- 00:36:34just settling into his evening. Vioat's
- 00:36:37tech is known for being dependable,
- 00:36:39especially in remote areas. Suddenly,
- 00:36:42his devices start lighting up with
- 00:36:43automated warnings.
- 00:36:45They're coming from Ukraine. Two of
- 00:36:47Viasat's ground stations are under
- 00:36:49attack, flooded with malicious data
- 00:36:50packets.
- 00:36:52Internet from satellites doesn't
- 00:36:53actually come from space. It's routed
- 00:36:55through ground stations. If those crash,
- 00:36:57nothing gets through. And now they're
- 00:36:59overwhelmed. So overloaded, they can't
- 00:37:02deliver connectivity at all. But the
- 00:37:04Voodoo Bear operative in Moscow isn't
- 00:37:05finished yet. These kind of attacks can
- 00:37:08sometimes be fended off, but this one
- 00:37:10keeps escalating. Internet providers
- 00:37:12usually have remote access to their
- 00:37:13customers modems. That's how they pushed
- 00:37:15software updates. That access, of
- 00:37:17course, should be highly secure. In
- 00:37:19Vasat's case, it wasn't. Voodoo Bear had
- 00:37:22already infiltrated months earlier. The
- 00:37:24hackers send a command to the modems,
- 00:37:26forcing them to download malicious code
- 00:37:28that wipes login credentials stored on
- 00:37:30the devices. Without those credentials,
- 00:37:32the modems can't authenticate, can't
- 00:37:34connect, and go completely offline.
- 00:37:37The attack spreads fast. The senior
- 00:37:39manager stares at his screen in
- 00:37:40disbelief. 30,000 modems across Europe
- 00:37:43are now nothing but e-waste. In Germany,
- 00:37:465,800 wind turbines go offline. In a
- 00:37:49small village in Sweden, the internet
- 00:37:50vanishes. And in Ukraine, VASAT's
- 00:37:53biggest customer
- 00:37:56is the military.
- 00:37:59Suddenly, across army installations,
- 00:38:01there's tension.
- 00:38:04The communication infrastructure is
- 00:38:06being hit. Right. It is reports flood in
- 00:38:08from the borders. Russian troops and
- 00:38:10armored vehicles are pouring in. The
- 00:38:13invasion, long looming like fog, has
- 00:38:15begun.
- 00:38:17Ukraine is hit from three directions.
- 00:38:19Missile strikes. Commands are shouted.
- 00:38:23And amid the chaos, a terrifying thought
- 00:38:25spreads. What if the comms go down? What
- 00:38:28if the command dashboards fail?
- 00:38:30Surveillance feeds cut to black.
- 00:38:35The VSAD attack was a highly effective
- 00:38:36cyber strike, perfectly timed with the
- 00:38:39invasion. But for Ukraine, it wasn't a
- 00:38:41new experience. Ukraine has been in
- 00:38:43Russia's cyber crosshairs for years, not
- 00:38:45just since the invasion in 2022, but
- 00:38:47dating back to 2014 after the annexation
- 00:38:50of Crimea. That year, Russia tried to
- 00:38:53hack Ukraine's elections. In 2015 and
- 00:38:552016, Voodabar took down parts of the
- 00:38:57country's power grid, each time for
- 00:38:59hours. In 2022, they tried again. This
- 00:39:02time they failed. Russia often tests
- 00:39:05tactics like election interference in
- 00:39:07Ukraine before deploying them elsewhere.
- 00:39:09That's why Ukraine is sometimes called
- 00:39:10Russia's cyber test battlefield. The war
- 00:39:13has now been raging for over 3 years and
- 00:39:15all of Putin's bears are involved. They
- 00:39:18attack government systems and major
- 00:39:19companies. They spy, they leak, they
- 00:39:22fuel disinformation campaigns. But
- 00:39:25Ukraine, it seems, is defending itself
- 00:39:26formidably, not just on the ground, but
- 00:39:29also in cyerspace. And they're not
- 00:39:31alone. Today the country is supported by
- 00:39:33several leading western cyber security
- 00:39:35firms.
- 00:39:37Epilogue trains
- 00:39:41Putin's bears are still out there as
- 00:39:43dangerous as
- 00:39:44ever. Harken Tan Rivera is one of the
- 00:39:47journalists we interviewed for this
- 00:39:49video. Not long ago, a colleague of his
- 00:39:52received a mysterious leak. A batch of
- 00:39:54internal documents from a Russian
- 00:39:57company called NTC Vulcan.
- 00:40:00It supplies Russian intelligence
- 00:40:02services and the military with cyber
- 00:40:04weapons of all kinds, and their internal
- 00:40:07documents are chilling.
- 00:40:10Among other things, Russia seems to have
- 00:40:13been mapping out what to do once a
- 00:40:15territory is conquered, how to bend it,
- 00:40:18break it, remake it.
- 00:40:21Beyond that, they're experimenting with
- 00:40:24control over foreign critical
- 00:40:26infrastructure.
- 00:40:27For example, they're testing if they can
- 00:40:30slow down trains.
- 00:40:32And if you can slow down a train, well,
- 00:40:36then you can speed it up, too.
- 00:40:39One thing is certain. We haven't heard
- 00:40:42the last of the bears. Not by a long
- 00:40:45shot. And in the years ahead, we'll have
- 00:40:48to stay alert. Learn to spot their
- 00:40:51traps, their tricks, their carefully
- 00:40:54laid bait.
- 00:40:58Because once they're inside,
- 00:41:00it rarely ends well.
- 00:41:20[Music]
- Russian hackers
- cybersecurity
- Bundestag hack
- Fancy Bear
- US election interference
- phishing
- malware
- geopolitical impact
- democracy
- cyber warfare