Guernsey Press

Russian spies caught red-handed trying to hack Salisbury attack investigation

The GRU officers had a ‘pretty bad day’ when they were exposed outside the world chemical weapons watchdog’s headquarters in The Hague.

Published

They were supposed to slip into the country, carry out their secret mission and then quietly disappear.

For the Russian military intelligence officers sent to target the world chemical weapons watchdog, however, it turned out to be – in the words of one UK official – a “pretty bad day”.

The four-strong team GRU were caught “in flagrante”, according to officials, as they attempted to hack into the computer system of the Organisation for the Prohibition of Chemical Weapons (OPCW) in The Hague.

They were then sent packing to Moscow by Dutch security services, leaving behind them a treasure trove of intelligence about the GRU’s covert activities around the world.

Russia
Reconnaissance photos of the OPCW HQ taken by the GRU team (Dutch Ministry of Defence/PA)

In the days and weeks that followed, British officials said GRU teams in Russia attempted to hack the computers of the Foreign Office and Defence Science Laboratory at Porton Down, which was investigating the deadly nerve agent used in the attack.

They also sent spear phishing emails to the headquarters of the OPCW, which was helping the UK authorities to identify the substance involved.

When this failed it was decided to send a close access team to the Netherlands to see if they could have more luck.

Right from the start, however, they appear to have made little attempt to hide their presence in the country, arriving together with Russian diplomatic passports at Schiphol Airport, where they were captured on CCTV being met by a Russian embassy official.

Russia
The hire car used by the GRU team (Dutch Ministry of Defence/PA)

Once through customs and immigration controls, they hired a car and headed for The Hague.

Three days later, on April 13, the vehicle parked up close to the OPCW building.

It was there the Dutch security service – operating with the assistance of British intelligence – pounced.

The GRU men were said to have tried to destroy their equipment but were prevented from doing so.

In the back of the car, investigators found – partially hidden under a coat – a computer connected to a 4G mobile and a Wi-Fi panel antenna, as well as other specialist hacking equipment.

Russia
Hacking equipment used by the GRU to target the OPCW (Dutch Ministry of Defence/PA)

“It is hard to know the full extent of the operation as it failed,” one UK official said.

“Judging from past form elsewhere, discrediting the investigation could well have been the motivation.”

While the GRU team was being escorted back to Schiphol for return to Moscow, investigators began going through Serebriakov’s laptop.

They found he had made a series of Google searches relating to the OPCW building and its surrounds.

Minin’s camera also contained reconnaissance photos of the area.

Remarkably, the investigators also found evidence on Serebriakov’s computer of his involvement in other GRU close access operations, including in Malaysia, where he is said to have targeted the investigation into the shooting down of flight MH17 over Ukraine in 2014 when almost 300 people died.

There was also evidence of his involvement in the hacking of in the World Anti-Doping Agency (Wada) in Switzerland, which was investigating widespread doping by Russian athletes, and even a photograph of him posing with a young woman at the 2016 Olympics.

“For GRU officers, to get caught in this way would be considered a pretty bad day,” a British security official said.

Sorry, we are not accepting comments on this article.