Iran's history of elaborate election interference efforts, before the Trump campaign hack

Iran’s history of elaborate election interference efforts, before the Trump campaign hack

On Friday, U.S. authorities accused three Iranian men of stealing and leaking files from former President Donald Trump’s 2024 campaign, the largest “hack and leak” election influence operation since Russia’s breach of Hillary Clinton’s campaign and Democratic organizations in 2016.

Iran’s influence efforts using hacked material from the Trump campaign follow what the United States says was a series of brazen influence operations in 2020, all authorized by Tehran’s senior leadership. Iran has consistently denied such allegations.

Iran, like China and Russia, constantly creates fake accounts on U.S. social media platforms in attempts to shift Americans’ opinion, U.S. intelligence officials say. It’s unclear that such operations have had much effect.

But Iran’s 2020 election interference efforts stand apart from what have become well-recognized interference patterns, according to an indictment from the Justice Department, Treasury Department sanctions, researchers and media reporting, and comments from current and former U.S. officials. Experts say that the 2020 operations marked the first time that Iran seriously targeted U.S. elections, and that the efforts reflect Iran’s desire to find ways to exacerbate discord in American society around partisan politics and free elections.

“The thing that runs through both their activities in 2020 and in 2024 is the focus on trying to sow distrust within our political system,” said Brandon Wales, who was the executive director of the U.S. Cybersecurity and Infrastructure Security Agency (CISA) in 2020 and now is the vice president for cybersecurity strategy at SentinelOne.

“We have not seen very aggressive action to actually target our election infrastructure,” which is largely disconnected from the internet and extremely difficult to directly target remotely, he said. “Instead, it’s trying to use what access they can to undermine American confidence in our systems and in each other.” 

Access to a local Election Night Reporting system 

The date of the first Iranian interference attempt of 2020 is not public, though it happened in the late summer, a former U.S. official who worked on the issue at the time told NBC News. The official requested to not be named and declined to share specific details about the incident, citing the government practice of not naming victims of cyberattacks unless they come forward.

An Iranian hacker group linked to contractors working for Tehran broke into a local government website, the official said. That gave them access to Election Night Reporting (ENR) systems, which provide live updates on unofficial results on Election Day. They were quickly removed and unable to cause harm, a Cyber Command senior official, Army Maj. Gen. William J. Hartman, said at the RSA conference in San Francisco in 2023, when some details about the incident were declassified. The location and exact date have not been made public.

Those hackers never had the ability to change the vote count, but they potentially could have appeared to tinker with those in real time in an attempt to sow doubts about the election, Hartman said. It’s not clear what the hackers planned to do with the access, but they were aware they had access to the ENR systems, the U.S. official familiar with the incident said.

The operation mirrored one of the earliest known attempts by one nation directing its hackers to interfere in another’s elections: a 2014 incident in which Russian hackers allegedly broke into Ukraine’s national election reporting system to make it appear like an unpopular pro-Russia candidate had somehow won the presidency.

Fake Proud Boys campaign

In the most bizarre and elaborate foreign influence campaign of 2020, Iranian hackers allegedly staged an entirely fictional cyber-enabled fraud and harassment campaign, according to a detailed 2021 Justice Department indictment. In October of that year, they tried to make it appear that the Proud Boys, a pro-Trump militia group, had successfully hacked multiple states, were using stolen voter information to conduct mass voter fraud by mailing ballots in their names, and were harassing Democratic voters across Florida.

The Iranian hackers did successfully steal some voter data from Alaska’s Online Voter Registration System, but otherwise none of it was true. The hackers, who the Justice Department said worked for Emennet Pasargad, an Iranian cybersecurity and information operations company that does work for the country’s government, staged a video that purports to show the operation, set to the Metallica song “Master of Puppets.” 

The video does not actually depict a way to successfully commit voter fraud, and an analysis of the technical “hacking” scenes in the video actually show the hackers trying to break into a server in Moldova, according to an analysis by the Election Integrity Partnership, a Stanford University-backed election research group that has since disbanded.

The hackers tried to post it to various platforms online but it gained little traction. A Google spokesperson said in 2020 that it was uploaded to YouTube but it had fewer than 30 views by the time Google removed it.

Around the same time, the indictment says the Emennet Pasargad hackers also sent tens of thousands of harassing emails to registered Democrats in Florida, a state where such voter information is free to the public, and Alaska. The emails varied, but they generally called each recipient by name, claimed to have hacked their state’s voting infrastructure, and demanded the voter change their registration to Republican. The emails came from at least two spoofed Proud Boys email addresses and said “You will vote for Trump on Election Day or we will come after you.” A Google spokesperson said in 2020 that the hackers had tried to send approximately 25,000 threatening emails through Gmail, but that around 90% of them were sent to spam filters.

Some voters alerted authorities to the emails, and on Oct.r 21, FBI Director Christopher Wray and then-Director of National Intelligence John Ratcliffe held a press conference accusing Iran of the operation.

Alireza Miryousefi, at the time a spokesman for the Iranian Mission to the United Nations, denied at the time that Iran had done anything to try to influence the U.S. election.

Compromise of news system used by dozens of outlets

Around September or October, the Emennet Pasargad hackers gained access to an American media company that serves dozens of news publications, in an apparent attempt to produce mass disinformation about election results, according to the Justice Department’s 2021 indictment over the incident. The hackers successfully tested that their access let them change content on news sites.

The Wall Street Journal has reported that the hacked company is Omaha-based Lee Enterprises, which owns nearly 100 small news companies across the country. NBC News has not independently verified that Lee Enterprises is the media company that was hacked, and the company didn’t respond to a request for comment.

On Nov. 5, the day after the election, the hackers tried to log back in to the media company with previously stolen credentials, only to realize they had been changed, the indictment says.

‘Enemies of the people’ kill list

At least as early as Dec. 7, 2020 — after the election, but before Joe Biden was sworn in or pro-Trump rioters stormed the U.S. Capitol — Iran allegedly tried another campaign to imitate right-wing radicals to divide the U.S. 

On various websites, it circulated a hit list, titled “Enemies of the People,” which listed American political figures who either helped secure or administer the election or had tried to counter Trump’s false claims that he had actually won it.

“The following individuals have aided and abetted the fraudulent election against Trump,” it said. “Changing votes and working against the President is treason and patriotic Americans should never forget those who helped overthrow our democracy!”

For each person listed, the site showed a photo of them in crosshairs, described their work and in some cases provided personal information like their home or email addresses. People on the list included employees of Dominion Voting Systems, Michigan Governor Gretchen Whitmer, and former CISA Director Chris Krebs.

On Dec. 23, the FBI and CISA announced that Iran was behind the campaign, though the agencies didn’t specify any individuals, agency, or the company. As of that date, the campaign appears to be inactive.

“The post-election creation of the Enemies of the People website demonstrates an ongoing Iranian intent to create divisions and mistrust in the United States and undermine public confidence in the U.S. electoral process,” the agencies said in a public alert.

Miryousefi denied that Iran was behind that campaign.


Comments

Leave a Reply

Your email address will not be published. Required fields are marked *