InformNapalm volunteer intelligence community has received hard evidence of the successful hacking operation on the office of Vladislav Surkov (# SurkovLeaks) carried out by the Ukrainian cyber-alliance.
On Monday, October 24, 2016, news about the hacking of Vladislav Surkov, a presidential aide to Vladimir Putin, circled the majority of Ukrainian and Russian media. There were mixed reactions among our readers to the data presented: some found unconvincing the scanned passport copy provided in the announcement on cyberhunta.com.
On October 25, came the official Kremlin reaction to the news. Presidential press secretary Dmitry Peskov was vague while answering the journalists’ questions. He did not directly deny the fact of hacking of the Russian presidential aide’s mailbox, but parried the question with a compliment to Surkov calling him “a talented man,.. [hackers] have always been seeking to impute many different alleged intentions to him”.
Following numerous requests of the readers, InformNapalm community made a direct request to the cyber-alliance of Ukrainian hacktivist groups CYBERHUNTA, FalconsFlame, RUH8 and TRINITY for additional information, evidence and clarifications.
In the course of communication with the hacktivists, new details became known and we also received a Microsoft Outlook data file (.pst) of the prm_surkova@gov.ru mailbox with 1GB worth of data (mailbox file on GOOGLE.DRIVE , mailbox file on RUH8 ).
(By the way, the hacktivists also possess data on Peskov obtained during hacking of a number of addresses of assistants and clerks of the Presidential Administration of the Russian Federation, but presenting them is beyond the scope of this publication).
The hacktivists obtained access to the mailbox of the reception office of Vladislav Surkov (prm_surkova@gov.ru), as well as to a PC located in the reception office of the Russian president’s aide.
The hacktivists made the material from the period from September 2013 to November 2014 available to the general public. That was the time when major developments of the active phase of the Kremlin’s Novorossia project were unfolding.
The materials relating to the more recent period of 2015-2016 have been currently submitted for analysis to intelligence agencies, they are not subject to disclosure because of their operational value.
The correspondence contains detailed information about the business [1, 2] and media interests of the Russian Federation in Ukraine and, in particular, about the risks of economic blockade of the territories controlled by Donetsk People’s Republic (DPR) and Luhansk People’s Republic (LPR) terrorist organizations. The files also contain comprehensive lists and contact details of the staff of the Presidential Directorate for Social and Economic Cooperation with the Commonwealth of Independent States Member Countries and contact data of the so-called leadership of the self-proclaimed Republic of Abkhazia (RA). There also are agent leads for work with “key figures of RA” and much more.
The materials even contain scans of passports of Vladislav Surkov and his family. In addition, there are scans of all pages with Schengen visas in all the passports (PDF archive).
[ Vladislav Surkov passport PDF, Schengen PDF, Surkov’s son (Roman) passport PDF, Schengen PDF, Surkov’s wife (Natalia Dubovitskaya) passport PDF, Schengen PDF , Surkov’s daughter (Maria) passport PDF, Schengen PDF ]
It is worth reminding that Vladislav Surkov has been put on the EU and U.S. sanctions list in March 2014. He is banned from entering the EU countries and the U.S. Nevertheless, he accompanied Vladimir Putin to the meeting of Normandy contact group in Berlin, which raised a wave of criticism in the Ukrainian media of the spineless European diplomacy.
Read more: Ukrainian hacktivists: Russian trace behind Motorola’s blowup
Translated by Artem Velichko
Evidence data was exclusively provided to InformNapalm by the hacktivists of the Ukrainian Cyber Alliance for analysis and processing. InformNapalm Community bears no responsibility for the sources and origin of the data.
(Creative Commons — Attribution 4.0 International — CC BY 4.0 ) information specially prepared for InformNapalm.org, an active link to the authors and our project is obligatory for any reprint or further use of the material.
10 Responses to “SurkovLeaks: 1GB mail cache retrieved by Ukrainian hacktivists”
11/03/2016
SurkovLeaks (part 2): hacktivists publish new email dump - InformNapalm.org (English)[…] was sent from the mailbox of Surkov’s reception office prm_surkova@gov.ru (its ccontent was published earlier). This proved that the owner of pochta_mg@mail.ru was associated with […]
11/03/2016
SurkovLeaks del 2: Hacktivister släpper nytt e-postarkiv - InformNapalm på svenska[…] av de nu upptäcka meddelandena sändes från adressen prm_surkova@gov.ru (ingick i den första publiceringen) tillhörande Surkovs reception. Detta bevisar att ägaren av pochta_mg@mail.ru kan associeras med […]
11/10/2016
RUH8 apie Ukrainos haktyvizmą, kibernetinį karą ir SurkovLeaks operaciją (išskirtinis interviu) - InformNapalm.org (Lietuvių)[…] informacinėje erdvėje. Kibernetinio aljanso sąskaitoje daug garsių operacijų, įskaitant įsilaužimą į Kremliaus pilkojo kardinolo, RF prezidento padėjėjo Vladislavo Surkovo, kanceliarijos paštą, […]
11/17/2016
RUH8 about Ukrainian hacktivism, cyber warfare and SurkovLeaks (exclusive interview) - InformNapalm.org (English)[…] Cyber Alliance has a proven track record of successful high-profile operations including the hack of office email account of the Kremlin’s grey cardinal Vladislav Surkov, personal adviser of Russian President Vladimir Putin; cyber attacks targeting Orenburg Oblast of […]
11/23/2016
RUH8 om ukrainsk hacktivism, cyberkrig och SurkovLeaks - exklusiv intervju - InformNapalm på svenska[…] har bevisat sin kraft genom ett flertal framgångsrika och högprofilerade aktioner, där ibland intrånget i en mailbox tillhörande Vladislav Surkov, Kremls grå kardinal och personlig rådgivare till president Vladimir Putin; cyberattacker mot […]
01/28/2017
Ciberguerra: en Rusia comenzó la "limpieza" en el campo de la TI- seguridad debido a Surkov - InformNapalm.org (Español)[…] que la publicación de la correspondencia de la cancillería de la Oficina de Surkov (SurkovLeaks parte 1 y parte 2) en la prensa occidental causó sensación. Materiales de las cartas fueron verificadas y […]
01/29/2017
Cyberwar: purges in Russian cybersecurity could be connected to #SurkovLeaks - InformNapalm.org (English)[…] publication of Surkov’s office mail dump (#SurkovLeaks part 1 & part 2) made a serious stir in the Western press. Its contents were verified and its […]
03/02/2017
Donbas blockade: Kremlin's plans in SurkovLeaks - InformNapalm.org (English)[…] team to shed light on Russia’s plans to destabilize the situation in Ukraine. The first part of the analysis of Surkov’s dump referred to a document titled On the risks of an economic blockade of the […]
10/15/2017
Hacktivists Threw Open the “Skeleton Closet” of a Top Official from Russian Presidential Administration - InformNapalm.org (English)[…] hacked the computers in the reception office of Vladislav Surkov, aide to the President of Russia, [1], [2] and Konstantin Zatulin, a Russian […]
11/22/2017
SurkovLeaks (part 3): analysis of the correspondence of Surkov's first deputy Inal Ardzinba - InformNapalm.org (English)[…] reception office with almost 1 GB of data was made public in October 2016 under the code name SurkovLeaks. The correspondence contains details about the business and media interests of the Russian […]