Five Russian GRU Officers and One Civilian Charged for Conspiring to Hack Ukrainian Government

Source: United States Department of Justice

Note: View the indictment here

In an indictment unsealed today, a grand jury in Maryland charged six computer hackers, all of whom were residents and nationals of the Russian Federation (Russia), with conspiracy to commit computer intrusion and wire fraud conspiracy. Five of the defendants were officers in Unit 29155 of the Russian Main Intelligence Directorate (GRU), a military intelligence agency of the General Staff of the Armed Forces. The sixth individual was a civilian already under indictment for conspiracy to commit computer intrusion and is now also charged with wire fraud conspiracy.

Note: Concurrent with the return of the indictment, the U.S. Department of State’s Rewards for Justice program is offering a reward of up to $10 million for information on any of the defendants’ locations or their malicious cyberactivity. Anyone possessing such information should contact Rewards for Justice here. 

The indictment alleges that these GRU hackers and their co-conspirator engaged in a conspiracy to hack into, exfiltrate data from, leak information obtained from and destroy computer systems associated with the Ukrainian Government in advance of the Russian invasion of Ukraine. The defendants did so in order to sow concern among Ukrainian citizens regarding the safety of their government systems and personal data. The defendants’ targets included Ukrainian Government systems and data with no military or defense-related roles. Later targets included computer systems in countries around the world that were providing support to Ukraine, including the United States and 25 other North Atlantic Treaty Organization (NATO) countries.

“The GRU’s WhisperGate campaign, including targeting Ukrainian critical infrastructure and government systems of no military value, is emblematic of Russia’s abhorrent disregard for innocent civilians as it wages its unjust invasion,” said Assistant Attorney General Matthew G. Olsen of the National Security Division. “Today’s indictment underscores that the Justice Department will use every available tool to disrupt this kind of malicious cyber activity and hold perpetrators accountable for indiscriminate and destructive targeting of the United States and our allies.”

“Since July 2021, the U.S. Department of State’s Rewards for Justice (RFJ) program,  administered by the Diplomatic Security Service (DSS), has offered a reward of up to $10 million for information leading to the identification or location of any person who, while acting at the direction or under the control of a foreign government, participates in certain malicious cyber activities against U.S. critical infrastructure in violation of the Computer Fraud and Abuse Act,” said DSS Deputy Assistant Secretary for Threat Investigations and Analysis Paul Houston. “Under this reward offer, the RFJ program is seeking information leading to the location of these individuals, GRU’s malicious cyber activity or associated individuals and entities.”

“Today’s superseding indictment underscores our commitment to using all the tools at our disposal to pursue those who would do us and our allies around the world harm,” said U.S. Attorney Erek L. Barron for the District of Maryland. “Cyber intrusion schemes such as the one alleged threaten our national security, and we will use all the technologies and investigative measures at our disposal to disrupt and track down these cybercriminals.”

“Through strokes on a keyboard, the accused criminals used computers to cross into countries, hunting for weaknesses and seeking to harm. The FBI and our law enforcement partners, both national and international, will collectively defend against Russia’s aggressive and illegal actions,” said Special Agent in Charge William J. DelBagno of the FBI Baltimore Field Office. “We are united in identifying, prosecuting and protecting against future crimes and vow to relentlessly hunt down and counter these threats.”

The defendants charged in the indictment are: Yuriy Denisov [Юрий Денисов], a colonel in the Russian military and a commanding officer of Cyber Operations for Unit 29155; four lieutenants in the Russian military assigned to Unit 29155 who worked on cyber operations: Vladislav Borovkov [Владислав Боровков], Denis Denisenko [Денис Денисенко], Dmitriy Goloshubov [Дима Голошубов] and Nikolay Korchagin [Николай Корчагин]; and a civilian co-conspirator, Amin Sitgal [Амин Стигал].

According to court documents, on Jan. 13, 2022, the defendants conspired to use a U.S.-based company’s services to distribute malware known in the cybersecurity community as “WhisperGate,” which was designed to look like ransomware, to dozens of Ukrainian government entities’ computer systems. However, as the indictment alleges, WhisperGate was actually a cyberweapon designed to completely destroy the target computer and related data in advance of the Russian invasion of Ukraine. Ukrainian government networks subjected to this attack included the Ukrainian Ministry of Internal Affairs, State Treasury, Judiciary Administration, State Portal for Digital Services, Ministry of Education and Science, Ministry of Agriculture, State Service for Food Safety and Consumer Protection, Ministry of Energy, Accounting Chamber for Ukraine, State Emergency Service, State Forestry Agency and Motor Insurance Bureau.

In conjunction with these attacks, the defendants compromised several of the targeted Ukrainian computer systems, exfiltrated sensitive data, including patient health records and defaced the websites to read: “Ukrainians! All information about you has become public, be afraid and expect the worst. This is for your past, present and future.” That same day, the defendants offered the hacked data for sale on the internet.

The U.S. government previously joined with allies and partners in May 2022 to attribute this cyber-attack to the Russian military and to condemn the attack and similar destructive cyber activities against Ukraine.

In August 2022, the defendants also hacked the transportation infrastructure of a Central European country that was supporting Ukraine. Beginning in August 2021, the defendants also probed a variety of protected computer systems including those associated with 26 NATO member countries, searching for potential vulnerabilities. The indictment further alleges that from Aug. 5, 2021, to Feb. 3, 2022, the defendants leveraged the same computer infrastructure they used in the Ukraine-related attacks to probe computers belonging to a federal government agency in Maryland in the same manner as they had initially probed the Ukrainian Government networks.

This indictment is part of an international effort, Operation Toy Soldier, to combat the malicious cyber activity by Unit 29155 of the GRU. Accompanying today’s announcement, the FBI and 12 other partners, representing governments of nine countries, released a Joint Cybersecurity Advisory to enhance network defense efforts against Unit 29155’s malicious cyber activities.

The FBI Baltimore Field Office is investigating the case with assistance from FBI Milwaukee and Boston Field Offices.

Assistant U.S. Attorneys Aaron S.J. Zelinsky and Robert I. Goldaris for the District of Maryland are prosecuting the case with valuable assistance from the National Security Division’s National Security Cyber Section. 

Defense News: National University of Singapore, NPS Advance Critical Educational Partnership

Source: United States Navy

In a ceremony held July 11 at TDSI, U.S. Navy Lt. Cmdr. Alex Anderson and two U.S. Marine Corps officers, Capt. Susan Figlioli and Capt. Jordan Figlioli, were recognized for earning their Master of Defence Technology and Systems (MDTS) degrees through the unique exchange program that enables qualified NPS students to earn degrees from both institutions.

“Singapore is a critical Indo-Pacific partner,” noted retired U.S. Army Col. Danial Pick, NPS Director of International Programs. “The decades-old educational relationship between NPS and TDSI is an important manifestation of our partnership. Hundreds of U.S. and Singaporean graduates of our unique dual degree program are serving in important national security positions in both countries.”

For example, U.S. Navy Capt. Andy Berner, Commander of the Office of Naval Research (ONR) Global, and Col. Ong Cher Howe of the Singaporean Ministry of Defence are both graduates of the NPS-TDSI program.

An island city-state of 6.2 million people, Singapore sits astride the meeting point of the Malacca Strait, one of the busiest shipping routes in the world, and the South China Sea, a locus of international contention with the People’s Republic of China.

With a well-developed infrastructure and high political stability, Singapore is one of Asia’s most important hubs for trade, finance and military operations. For more than 50 years, the U.S. and Singapore have endeavored to work closely together to cultivate a free, open and secure Indo-Pacific region.

Strengthening such strategic partnerships is a central pillar of Secretary of the Navy Carlos Del Toro’s Strategic Guidance for the Navy and Marine Corps, issued in October 2021 and updated in October 2023.

Specifically, the Navy seeks to “strengthen military-to-military relationships with existing allies, leverage specialized allied experience in regional operations, and expand and deepen our partnerships with like-minded democracies around the world,” Del Toro wrote. “We will build opportunities for Sailors, Marines, and Civilians to train, learn, and operate side-by-side with their counterparts in partner and allied forces, and operationally integrate our allies and partners into strategic concepts and warfighting concepts to deter those that challenge us.”

Since 2001, TDSI has fostered the intellectual capital that makes this relationship thrive, according to Lui Pao Chuen, Temasek Defence Professor, a 1973 NPS operations research graduate and 2002 NPS Hall of Fame inductee in large part for his leadership in establishing the NPS-NUS partnership.

“NPS has been a strategic partner of NUS to help build the capabilities of the Singaporean Armed Forces (SAF) in the defense of Singapore,” he said. “The relationship has grown over time. I look forward to greater integration of education and research of the two institutes in the coming years.”

For the MDTS degree program, students spend six months at NUS taking courses in advanced topics including cyber security, artificial intelligence and data analytics. The NPS-TDSI program gives U.S. military students a firsthand view of current defense challenges in Singapore and the broader region, complementing their technical specialization in their NPS fields of study.

Anderson, for example, earned his NPS master’s degree in electrical engineering in addition to his MDTS degree. He is now on his milestone tour as a cyber planner at U.S. Indo-Pacific Command (INDOPACOM) headquarters.

“Countless invaluable academic, cultural and social experiences were taken away from my studies abroad in Singapore,” he said. “Each of the two academic quarters involved multiple seminars and field trips around Singapore which helped apply the systems engineering approach we learned about in the classroom. The professors in the TDSI program were a mix of university professors and defense contractor adjunct professors which offered an additional level of perspective to the course materials.”

“With my valuable experience from the TDSI program, I hope to be a leading player in the relationships we have with Singapore and other partner nations in the Pacific,” Anderson added.

Three NPS students are currently enrolled in the TDSI exchange program and are studying in Singapore: U.S. Navy Lt. Alex Misenheimer, Lt. Alan Hatlestad and Marine Corps Capt. James Villaneuva, all of whom will return to Monterey in the fall to complete the NPS portion of the program.

For Hatlestad, a Meteorology and Oceanography (METOC) officer studying Physical Oceanography at NPS, the TDSI program has strengthened his technical knowledge of engineering systems relevant to METOC.

“My time in the TDSI program has been enriching,” he said. “The professors typically have many years of either military or industry experience in their respective fields. I appreciated the emphasis on interdisciplinary collaboration, which I think emulates real-world military exercises.”

“Upon my return to NPS, I will carry on with my fourth quarter with a new cognitive toolkit and framework for thinking,” Hatlestad added. “Having worked together in the same classroom for several months, I have made friends with my colleagues and counterparts from Singapore and Israel, and look forward to the next year we will all spend in Monterey.”

TV Presenter Who Worked for Channel One Russia Charged with Violating U.S. Sanctions Imposed on Russia

Source: United States Department of Justice Criminal Division

Note: View the indictments for District of Columbia cases #24-cr-403 and #24-cr-404

The Department of Justice today unsealed two indictments charging Dimitri Simes, 76, and Anastasia Simes, 55, both of Huntly, Virginia, and Russia with two separate schemes to violate U.S. sanctions.

As alleged in the first indictment, Dimitri and Anastasia Simes participated in a scheme to violate U.S. sanctions for the benefit of sanctioned Russian broadcaster Channel One Russia and to launder funds obtained from that scheme. Channel One Russia, a state-owned Russian television station, was sanctioned by the Treasury Department’s Office of Foreign Assets Control (OFAC) on May 8, 2022, for being owned or controlled by, or for having acted or purported to act for or on behalf of, the Government of the Russian Federation. 

From at least in or around June 2022 through the present, Dimitri Simes, Anastasia Simes and others allegedly participated in a scheme to violate the International Emergency Economic Powers Act (IEEPA), by providing services to Channel One Russia, including by serving as a presenter and producer of programming, and by receiving over $1 million, a personal car and driver, a stipend for an apartment in Moscow, Russia, and a team of 10 employees from Channel One Russia following its designation by OFAC. The indictment alleges that Dimitri and Anastasia Simes also engaged in a scheme to commit money laundering, knowing the transactions were intended to conceal the proceeds of IEEPA violations.

Dimitri and Anastasia Simes maintain a home in Huntly, Virginia. They remain at large and are believed to be in Russia. They are each charged with one count of conspiracy to violate the IEEPA, one count of violating the IEEPA, and one count of conspiracy to commit international money laundering. If convicted, they face a maximum penalty of 20 years in prison for each count.

As alleged in the second indictment, Anastasia Simes further participated in a scheme to violate U.S. sanctions for the benefit of, and to receive funds from, sanctioned oligarch Aleksandr Yevgenyevich Udodov. Udodov was sanctioned by OFAC on Feb. 23, 2023 for operating or having operated in the management consulting sector of the Russian Federation economy. From at least in or around February 2023 through the present, Anastasia Simes and others allegedly participated in a scheme to violate IEEPA by purchasing art and antiques for the benefit of Udovov from galleries and auction houses in the United States and Europe, and having the items shipped to her residence in Huntly, Virginia, where they were stored for onward shipment to Russia. In return, Anastasia Simes was reimbursed and received a service fee. The indictment alleges that Anastasia Simes also engaged in a scheme to commit money laundering, knowing the transactions were intended to conceal the proceeds of IEEPA violations. Below are photographs of some of the art and antiques intended for Udodov and stored in Anastasia and Dimtiri Simes’s residence.

In connection with this scheme, Anastasia Simes is charged with one count of conspiracy to violate the IEEPA, one count of violating the IEEPA, and one count of conspiracy to commit international money laundering. If convicted, she faces a maximum penalty of 20 years in prison on each count.

Assistant Attorney General Matthew G. Olsen of the Justice Department’s National Security Division, U.S. Attorney Matthew M. Graves for the District of Columbia, and Executive Assistant Director Robert Wells of the FBI’s National Security Branch made the announcement.

The FBI Washington Field Office is investigating both cases.

Assistant U.S. Attorney Alexandra Hughes for the District of Columbia and Trial Attorneys Menno Goedman and Sean O’Dowd of the National Security Division’s Counterintelligence and Export Control Section are prosecuting the case.

The investigation was coordinated through the Justice Department’s Task Force KleptoCapture, an interagency law enforcement task force dedicated to enforcing the sweeping sanctions, export controls and economic countermeasures that the United States, along with its foreign allies and partners, has imposed in response to Russia’s unprovoked military invasion of Ukraine. Announced by the Attorney General on March 2, 2022, and under the leadership of the Office of the Deputy Attorney General, the task force will continue to leverage all of the department’s tools and authorities to combat efforts to evade or undermine the collective actions taken by the U.S. government in response to Russian military aggression.

An indictment is merely an allegation. All defendants are presumed innocent until proven guilty beyond a reasonable doubt in a court of law.

Defense News: NMRTC Bremerton Med Board Supervisor Recognized During High Ranking DoD Visit

Source: United States Navy

When Navy Medicine Readiness Training Command Bremerton hosted the Honorable Shawn G. Skelly, Performing the Duties of Deputy Under Secretary of Defense for Personnel and Readiness, for a familiarization visit, August 28, 2024, the first stop in touring the military treatment facility was with the staff who administers the Medical Board department.

Overseeing the extensive workload of the department is April Dinucci, Medical Board department supervisor, physical evaluation board liaison officer and one of approximately 40 civil service staff still aligned under Navy Medicine after the official transition of all administrative and management functions at NHB to the Defense Health Agency was completed in 2022.

Her role is crucial in assisting and guiding servicemembers dealing with serious injury, illness and needing lengthy medical care.

“Our Medical Evaluation Board staff aid all Wounded Warriors in the entirety of all medically related processes. We are the experts that handle the medical administrative nuances of physical and mental health cases from cradle to grave. My staff are here to assist from the onset of Limited Duty until the member transitions from service,” said Dinucci.

Along with collaborating with Navy Wounded Warrior, Dinucci and her Medical Board team also coordinate with the Disability Evaluation System Counsel Program, VA military service coordinators, command deployability coordinators, Navy and Marine fleet forces leadership, branch service headquarters and the Physical Evaluation Board in Washington, DC.

“We’re physical evaluation board liaison officers,” exclaimed Dinucci, who along with being a PEBLO is a disability counselor and subject matter expert in the Disability Evaluation System, Limited Duty and Temporary Disability Retirement program(s).

As the department name suggests, Dinucci and her team handles medical evaluation boards and serve as the main point of contact for questions or concerns regarding case status, findings, benefits, personal – and personnel – inquiries and demands.

“We’re the experts in disability evaluation,” Dinucci said, noting that Navy Wounded Warrior provides expanded coverage for service members on LIMDU or enrolled in DES as well as providing vital non-medical assistance for personal and social needs.

Compiled data helps explain NHB’s Medical Board department demanding workload. For Fiscal Year 2023, the Medical Evaluation Board staff managed 712 LIMDU cases, with an average of 307 open cases each day being actively processed by the Med Board team. Combined with the approximately 250 Disability Evaluation System open cases to determine a servicemembers fitness for duty, that’s nearly 560 open cases being tracked by the Med Board team.

Possibly the most challenging aspect for Dinucci and her team is when providing medical support for those going through the process, as well as coordinating with Navy Wounded Warrior, is dealing with time management and expectations by servicemembers and their families. There are never enough hours in the day.

“When someone is placed in an MEB the expectation may be that their case will conclude in 90 days. The reality is that timelines [can] exceed nine months. This is for the administrative process. Treatment times vary and are impacted by a multitude of factors that often increase the overall timelines even further,” explained Dinucci.

NHB’s Medical Board department routinely organizes assistance and training primarily across the five-state region of Alaska, Idaho, Montana, Oregon and Washington. The department is divided into overlapping responsibilities:

Medical case managers: assist in the medical needs of the member, such as discharge planning, durable medical equipment and specialty services.

“They are the heart of our medical team.” added Dinucci.

Physical Evaluation Board Liaison Officers: advise personnel on their fitness for duty status, explains rights and entitlements and handles documentation in determining if a servicemember in entitled to disability benefits.

“We are the axle in the wheel of the Disability Evaluation System process,” Dinucci said.

Limited duty coordinators: responsible for placing members LIMDU, notifying commands, updating re-evaluations, conducting monthly case reviews.

Fleet Liaisons: manage personnel casualty reports, decedent affairs and command notifications of hospitalizations. They also handle such distinctive needs as helping coordinate a family requiring bedside assistance for a hospitalized Sailor or Marine.

Hon. Skelly was also provided the opportunity to meet-and-greet with Mental Health staff and Urgent Care Clinic personnel during the visit.

Story originally posted on DVIDS: NMRTC Bremerton Med Board Supervisor recognized during high ranking DoD visit 

Defense News: NAMRU INDO PACIFIC Receives Award, Presents Science at MHSRS 2024

Source: United States Navy

KISSIMMEE, Fla. – Researchers with Naval Medical Research Unit (NAMRU) INDO PACIFIC received the 2024 Outstanding Research Accomplishment Team Award at the opening ceremony of the Military Health System Research Symposium (MHSRS) on August 26.

The award recognized the accomplishments of the NAMRU’S Long-Term Immunity Against Novel and Known Strains of SARS-CoV-2 (LINKS-COVID) Study team.

MHSRS, a four-day annual event which took place at the Gaylord Palms Resort & Conference Center, provided personnel with multiple forums to demonstrate the impact of research done by stakeholders of the Military Health System.

The LINKS-COVID team’s research addresses whether the DoD should recommend a COVID-19 booster that is specifically formulated to target the latest variants at the time the study was conducted.

“The DoD can’t force individuals to get the booster,” explained Capt. Andrew Letizia, science director from NAMRU INDO PACIFIC, “but the Centers for Disease Control and Prevention recommends any American over 6 months old should get it.”

“Our study looked to specifically address if the primarily young, healthy adult population that make up our U.S. Navy population should obtain a COVID-19 booster,” Letizia added. “It focused on a medical readiness question that can then be generalized to the civilian population that represents a similar demographic niche.”

LINKS-COVID findings showed that active-duty individuals who have not had a SARS-CoV-2 exposure, either through vaccination or natural infection, within 12 months of enrollment into the study had significantly lower binding and neutralizing antibodies against circulating SARS-CoV-2 variants, compared to those with an exposure in the past 12 months.

Capt. Jonathan Stahl, former commanding officer for NAMRU INDO PACIFIC, accepted the award on behalf of the team. Stahl handed off leadership of the command earlier this summer, ahead of his retirement after 30 years with the U.S. Navy.

“We were really excited to have Capt. Stahl accept the award, as he led the team,” said Capt. Nicholas Martin, commanding officer of NAMRU INDO PACIFIC. “We’re starting the next iteration of the study this month, and looking for more good things to come out of it.”

“This award demonstrates how the Military Health System recognizes the power of Navy medical research to address a contemporary research question,” Letizia said, “and obtain that answer for our forces when academia and industry aren’t incentivized to research this topic. With our focus on the active-duty forces, we are concerned about metrics such as lost duty days. This project helped fulfill our unique mandate for DOD research of improving force health protection.”

Lt. Huy Nguyen, principal investigator for the study, expressed gratitude to NAMRU INDO PACIFIC leadership, administration, scientists and other facilitators for their efforts on the study.

“Everyone contributed significant effort and time to the project,” Nguyen explained. “Everyone went above and beyond to ensure mission success, so it’s really humbling and satisfying to see all our hard work paid off and recognized by this prestigious award.”

Letizia moderated a breakout session on August 29, the final day of MHSRS. The session featured speakers presenting on recent findings in the field of emerging diseases of military importance, covering issues such as blood tests for infections, wastewater surveillance and drug-resistant bacteria.

MHSRS is the Department of Defense’s premier scientific meeting that focuses specifically on the unique medical needs of service members. This annual educational symposium brings together healthcare professionals, researchers, and DoD leaders for four days of critical learning, intensive idea sharing and relationship building.

Navy Medicine Research and Development attended MHSRS and participated in breakout sessions, poster presentations, lectures and manned booths in the exhibit hall. The eight Navy Medicine Research and Development commands, led by Naval Medical Research Command (NMRC), and consisting of Naval Health Research Center, Naval Submarine Medical Research Laboratory (NSMRL) and NAMRUs Dayton, San Antonio, EURAFCENT, INDO PACIFIC and SOUTH, are engaged in a broad spectrum of activity from basic science in the laboratory to field studies in austere and remote areas of the world to investigations in operational environments. In support of the Navy, Marine Corps and joint U.S. warfighters, researchers study infectious diseases, biological warfare detection and defense, combat casualty care, environmental health concerns, aerospace and undersea medicine, medical modeling, simulation, operational mission support, epidemiology and behavioral sciences.

Story originally posted on DVIDS: NAMRU INDO PACIFIC Receives Award, Presents Science at MHSRS 2024