State-backed hackers are still trying to break into the personal email accounts of U.S. senators and their aides — and a lawmaker focused on cybersecurity says the Senate's security office should stop refusing to help defend them.
Sen. Ron Wyden, an Oregon Democrat, said in a Wednesday letter to Senate leaders that his office discovered that "at least one major technology company" has warned an unspecified number of senators and aides that their personal email accounts were "targeted by foreign government hackers."
On Thursday, Google spokesman Aaron Stein confirmed that his company had notified the Senate targets.
Neither Stein nor Wyden provided any indication as to who might be behind the attempted break-ins, whether they targeted lawmakers from both political parties or their timing, though a Senate staffer said they occurred "in the last few weeks or months." The aide spoke on condition of anonymity because he was not authorized to discuss the issue publicly.
Email theft is favored by hackers the world over, including the Russian military agents accused of leaking the content of Democrats' inboxes ahead of the 2016 elections, and personal accounts have proven to be the easiest targets.
Recommended for you
Recommended for you
Recommended for you
Wyden noted that the Office of the Sergeant at Arms , which oversees Senate security, had informed legislators and staffers that it has no authority to help secure personal, rather than official, accounts.
"This must change," Wyden wrote in the letter. "The November election grows ever closer, Russia continues its attacks on our democracy, and the Senate simply does not have the luxury of further delays."
A spokeswoman for the security office said it would have no comment.
Wyden has proposed legislation that would allow the security office to offer digital protection for personal accounts and devices, the same way it does with official ones.
The Wyden letter cites previous Associated Press reporting on the Russian hacking group known as Fancy Bear and how it targeted the personal accounts of congressional aides between 2015 and 2016. The group's prolific cyberspying targeted the Gmail accounts of current and former Senate staffers, including Robert Zarate, now national security adviser to Florida Sen. Marco Rubio, and Jason Thielman, chief of staff to Montana Sen. Steve Daines, the AP found.
The same group also spent the second half of 2017 laying digital traps intended to look like portals where Senate officials enter their work email credentials, the Tokyo-based cybersecurity firm TrendMicro has reported.
Microsoft seized some of those traps, and in September 2017 apparently thwarted an attempt to steal login credentials of a policy aide to Missouri Sen. Claire McCaskill , the Daily Beast discovered in July. Last month, Microsoft made news again when it seized several internet domains linked to Fancy Bear, including two apparently aimed at conservative think tanks in Washington.
Such incidents "only scratch the surface" of advanced cyberthreats faced by U.S. officials in the administration and Congress, according to Thomas Rid, a cybersecurity expert at Johns Hopkins University. Rid made the statement in a letter to Wyden last week .
"The personal accounts of senators and their staff are high-value, low-hanging targets," Rid wrote. "No rules, no regulations, no funding streams, no mandatory training, no systematic security support is available to secure these resources."
Attempts to breach such accounts were a major feature of the yearlong AP investigation into Fancy Bear that identified hundreds of senior officials and politicians — including former secretaries of state, top generals and intelligence chiefs — whose Gmail accounts were targeted.
The Kremlin is by no means the only source of worry, said Matt Tait, a University of Texas cybersecurity fellow and former British intelligence official.
"There are lots of countries that are interested in what legislators are thinking, what they're doing, how to influence them, and it's not just for purposes of dumping their information online," Tait said.
In an April 12 letter released by Wyden's office, Adm. Michael Rogers — then director of the National Security Agency — acknowledged that personal accounts of senior government officials "remain prime targets for exploitation" and said that officials at the NSA and Department for Homeland Security were discussing ways to better protect them. The NSA and DHS declined to offer further details.
Wyden said Thursday that state-backed hackers "are like burglars who are knocking on windows and doors. They are out knocking on a lot of them right now just looking for an opportunity to get through."
Guarding personal accounts is a complex, many-layered challenge.
Boosting protection in the Senate could begin with the distribution of small chip-based security devices such as the YubiKey, which are already used in many secure corporate and government environments, Tait said. Such keys supplement passwords to authenticate legitimate users, potentially frustrating distant hackers.
Cybersecurity experts also recommend them for high-value cyber-espionage targets including human rights workers and journalists.
"In an ideal world, the Sergeant at Arms could just have a pile of YubiKeys," said Tait. "When legislators or staff come in they can (get) a quick cybersecurity briefing and pick up a couple of these for their personal accounts and their official accounts."
Bajak reported from Boston. Satter reported from London. AP video journalist Gillian Flaccus contributed from Portland, Oregon.