Mueller Report Page 44 of 448

Text Translation

III. RUSSIAN HACKING AND DUMPING OPERATIONS

Beginning in March 2016, units of the Russian Federation’s Main Intelligence Directorate
of the General Staff (GRU) hacked the computers and email accounts of organizations, employees,
and volunteers supporting the Clinton Campaign, including the email account of campaign
chairman John Podesta. Starting in April 2016, the GRU hacked into the computer networks of the
Democratic Congressional Campaign Committee (DCCC) and the Democratic National
Committee (DNC). The GRU targeted hundreds of email accounts used by Clinton Campaign
employees, advisers, and volunteers. In total, the GRU stole hundreds of thousands of documents
from the compromised email accounts and networks.‘09 The GRU later released stolen Clinton
Campaign and DNC documents through online personas, “DCLeaks” and “Guccifer 2.0,” and later
through the organization WikiLeaks. The release of the documents was designed and timed to
interfere with the 2016 US. presidential election and undermine the Clinton Campaign.

The Trum Camai n showed interest in the WikiLeaks releases and, in the summer and
fall of 2015 Harm to Ongoing Matter

    
   
  
  

  

WikiLeaks’s first Clinton-related release HOM , the Trump Campaign
sta ed in contac _ about WikiLeaks’s activities. The investigation was unable to resolve
Harm to 0090'“?! Matter WikiLeaks’s release of the stolen Podesta emails on October 7,

2016, the same day a video from years earlier was published of Trump using graphic language
about women.

 
   
 
 

A. GRU Hacking Directed at the Clinton Campaign

1. GRU Units Target the Clinton Campaign

Two military units of the GRU carried out the computer intrusions into the Clinton
Campaign, DNC, and DCCC: Military Units 26165 and 74455.110 Military Unit 26165 is a GRU
cyber unit dedicated to targeting military, political, governmental, and non-governmental
organizations outside of Russia, including in the United States.111 The unit was sub-divided into
departments with different specialties. One department, for example, developed specialized

malicious software “malware” while another deartment conducted large-scale spearphishing
campaigns.112 Investigative Teohnlque a bitcoin mining operation to

‘09 As discussed in Section V below, our Office charged 12 GRU officers for crimes arising from
the hacking of these computers, principally with conspiring to commit computer intrusions, in violation of ’
18 U.S.C. §§1030 and 371. See Volume 1, Section VB, infia; Indictment, United States v. Netyksho, No.
1:18-cr-215 (D.D.C. July 13, 2018), Doc. 1 (“Netyksho Indictment”).

“0 Netyksho Indictment {I 1.

 

”1 Separate from this Office’s indictment of GRU officers, in October 2018 a grandjury sitting in
the Western District of Pennsylvania returned an indictment charging certain members of Unit 26165 with
hacking the US. Anti-Doping Agency, the World Anti-Doping Agency, and other international sport
associations. United States v, Aleksez' Sergeyevich Morenets, No. 18-263 (W.D. Pa).

”2 A spearphishing email is designed to appear as though it originates from a trusted source, and
solicits information to enable the sender to gain access to an account or network, or causes the recipient to

FI/

FAQ

Where is this data from?

We have run image and text processing on the all 448 pages of the original Mueller Report PDF Image to make it searchable. Text translations are not guaranteed to be 100% accurate. Original Images and PDF's are included on every page for reference.

Why did you do this?

The Mueller Report is one of the most important documents in American History. We've made attempts to make the document more accessible, interesting and available for the average reader.

OPEN Mueller Report