A security researcher who has been tracking a series of barbell hacks on Twitter said Wednesday he has evidence the hacker group behind the attacks was a part of the Russian military.
“The first barbell hack in the last month was definitely an indication of Russian military involvement in the hack,” Cody Smith told CBC News from his home in the Washington region.
“That was an indication that the Russians are interested in the hacking process, so they would probably be looking for the most advanced techniques to hack these machines.”
The hack is believed to have been carried out by the military, but there’s no indication it’s connected to the hack that compromised the data of hundreds of millions of people around the world, including at least 30 million U.S. citizens.
The U.K.-based cybersecurity firm Crowdstrike has identified the Russian hacking group behind at least two of the hacks, including one in June that exposed the personal information of about 6 million U and U.N. employees.
That hack, along with the first barbless hack in July, were the work of the military-sponsored Cyber Command, the company said.
It said it believed the Russian hackers were looking to steal data from the military’s computers.CBC News also spoke with another security researcher, Ryan Reiter, who said the hack appeared to be a part-time job.
Reiter said he was working on an investigation into the hack of the Democratic National Committee and has not seen evidence the hack was connected to Russia.
The cybersecurity firm has said it has not found any evidence that the group is directly linked to the Kremlin.
However, Reiter said the work he was doing was not related to his previous work with Crowdstrike.
“It’s not connected to me, I don’t know what the relationship is, but I think it’s interesting,” he said.
“We’re not even sure what the motive is, it’s kind of like an extension of their work.”
Crowdstrike has not publicly commented on the hacking claims.