By Christopher Bing and Raphael Satter
Oct 4 (Reuters) – A hacking group that appears to be linked to the Iranian government attempted to break into U.S. President Donald Trump’s re-election campaign but were unsuccessful, sources familiar with the operation told Reuters on Friday.
Microsoft Corp said earlier on Friday that it saw “significant” cyber activity by the group which also targeted current and former U.S. government officials, journalists covering global politics and prominent Iranians living outside Iran, the company said in a blog post http://bit.ly/2ngs5bZ.
Republican Trump’s official campaign website is the only one of the remaining major contenders’ sites that is linked to Microsoft’s cloud email service, according to an inspection of publicly available mail exchanger records.
The Trump campaign’s Director of Communications Tim Murtaugh said, “We have no indication that any of our campaign infrastructure was targeted.”
In a 30-day period between August and September, the group, dubbed “Phosphorous” by the company, made more than 2,700 attempts to identify consumer email accounts belonging to specific customers and then attacked 241 of those accounts.
“Four accounts were compromised as a result of these attempts; these four accounts were not associated with the U.S. presidential campaign or current and former U.S. government officials,” the blog post said. “Microsoft has notified the customers related to these investigations and threats and has worked as requested with those whose accounts were compromised to secure them.”
Microsoft’s blog post did not identify the election campaign whose network was targeted by Phosphorous hackers. Nineteen Democrats are seeking their party’s nomination to run for president in the November 2020 election. Three Republicans have announced their candidacy to challenge Trump in the party’s nominating contest.
Hacking to interfere in elections has become a concern for governments, especially since U.S intelligence agencies concluded that Russia ran a hacking and propaganda operation to disrupt the American democratic process in 2016 to help then-candidate Trump become president. Moscow has denied any meddling.
Tensions between the United States and Iran have risen since May 2018 when Trump withdrew from a 2015 international nuclear accord with Tehran that put limits on its nuclear program in exchange for easing of sanctions. Trump has since reinstated U.S. sanctions, putting increased pressure on the Iranian economy, including its oil trade.
The Iranian government did not issue any immediate comment through state-run media on Microsoft’s statement.
Phosphorus is also known as APT 35, Charming Kitten, and Ajax Security Team, according to Microsoft.
The Redmond, Washington-based company said Phosphorous used information gathered from researching their targets or other means to game password reset or account recovery features and attempt to take over some targeted accounts.
The attacks were not technically sophisticated, the blog said. Hackers tried to use a significant amount of personal information to attack targets, it said.
“This effort suggests Phosphorous is highly motivated and willing to invest significant time and resources engaging in research and other means of information gathering,” the blog post said.
Microsoft has been tracking Phosphorus since 2013 and said in March that it had received a court order to take control of 99 websites the group used to execute attacks https://bit.ly/2TDKee1.
A computer network used by 2016 Democratic presidential candidate Hillary Clinton’s campaign https://in.reuters.com/article/usa-cyber-democrats-investigation-idINKCN10B033 was hacked in a cyberattack on Democratic Party political organizations in that U.S. election.
Big tech companies are under pressure to ramp up security for next year’s U.S. elections and others around the world.
Companies including Facebook Inc, Alphabet Inc’s Google, Microsoft and Twitter Inc met with U.S. intelligence agencies earlier in September to discuss security strategies.
Microsoft had said in a blog post in July http://bit.ly/332WKJ1 that about 10,000 customers were targeted or compromised by nation-state attacks in the past year. Most of the activity originated from hackers in three countries: Iran, North Korea and Russia, the company said.
(Reporting by Christopher Bing, Raphael Satter, Akanksha Rana, Vibhuti Sharma; Writing by Grant McCool; Editing by Jonathan Oatis and Daniel Wallis)