This article'slead sectionmay be too short to adequatelysummarize the key points. Please consider expanding the lead toprovide an accessible overview of all important aspects of the article.(November 2021) |
| Date |
|
|---|---|
| Type | Data breach,ransomware scam |
| Target | National Rifle Association of America |
On October 27, 2021, a Russianhacker group known asGrief published 13 documents attributed to theNational Rifle Association of America (NRA) in aransomware scam, claimed to havehacked the organization, and threatened to release more NRA documents if the undisclosedransom was not paid.
On October 21, 2021, theFederal Bureau of Investigation hacked and shut downREvil, a major hacking organization involved inransomware scams. In response, other ransomware groups sharedanti-United States messages on thedark web.[1][2]
Prior to the ransomware attack, the National Rifle Association had been involved in multiplelegal disputes, whichRecorded Future analyst Allan Liska argued may have made them an easier target forcyberattacks as attention within the organization was pulled away from their security.[3]

On October 27, 2021,Grief published 13 documents on their website as part of aransomware scam, attributing them as internal documents belonging to the NRA and claiming to havehacked the organization.[4] As reported inWired, the hack likely took place within the week prior to the release of documents.[5] The group threatened to release more files if theransom (an undisclosed amount of money[1]) was not paid.[4]
An anonymous person with direct knowledge of the events at the NRA toldAssociated Press that the group had been having issues with its email system in the week prior to the publication of files by Grief, which is a potential indicator of a ransomware attack.[6] On October 28,The Register reported that it was unknown whether the hack had targeted the headquarters of the NRA or one of its local branches.[7]
The leaked files included theminutes from an NRAboard meeting that occurred shortly before the release of documents as well as multiple files related togrants.[8]The Trace reported that one document appeared to be a late 2019 grant application made to the NRA byDavid Kopel on behalf of theIndependence Institute for $267,000, with $248,500 earmarked as Kopel's salary. Kopel has repeatedly filedamicus briefs supporting the NRA in court, and has not disclosed a financial connection to the organization.[9]
After the ransomware attack was announced by Grief, hundreds ofTwitter accounts that had all been created in August and September 2021 shared tweets about the attack. Most of the accounts had feminine names, and the majority used the default Twitterprofile photo while others used pictures that appeared to be taken from the online dating servicesShuri-Muri orTralolo. Some of the same accounts had previously posted about an earlier ransomware attack by Grief or about the NRA,gun violence, orNazis.[10] As of November 1, 2021[update], it was unclear whether there was a connection between Grief and the network of Twitter accounts.[10][11]
On October 29, Grief removed the documents attributed to the NRA from thedark website where they had been published. Brett Callow, athreat analyst employed byEmsisoft, noted that while the delisting of the NRA on the website could mean that the organization paid the ransom, there were additional possibilities; it could also indicate that the NRA had entered into negotiations with Grief or that the ransomware group had chosen to remove the documents because they had drawn too muchlaw enforcement attention.[5] However, on November 1,The Washington Times reported that Callow had published a screenshot showing that documents attributed to the NRA were again visible on the Grief website.[12]
On November 11,The Reload reported that Grief had published more internal documents the previous day, stating that these new documents includedbank account information of the organization as well as information about specific employees includingSocial Security numbers andhome addresses. The outlet additionally reported that the authenticity of the leaked documents had been confirmed by "six current and former NRA officials" including one individual whose personal information was exposed in the leak, who was not aware of its existence prior to being contacted byThe Reload.[13][14]
Also on November 10, Grief moved the NRA-related documents on its website from a section indicating hacks in progress to a different one indicating that it had been completed. No explanation was provided.[13]
A Russianhacker group known as Grief was responsible for the ransomware scam.[4] The group first became active in May 2021.[15]NBC News reported thatcomputer security experts believe that Grief is arebrand of the Russian groupEvil Corp.[1][4] Evil Corp has been linked to ransomware attacks onSinclair Broadcast Group as well as hundreds of financial entities across more than 40 countries. In 2019, action against the group includingsanctions was taken by multipleUnited States federal agencies;[3] it is subject to sanctions by theUnited States Department of the Treasury.[16] Experts have additionally theorized that Grief is a rebrand ofDoppelPaymer, another ransomware group associated with Evil Corp.[17]
On October 27, 2021, the NRA tweeted astatement by its managing director of public affairs Andrew Arulanandam. The statement said that the NRA does not discuss its security, but that the group "takes extraordinary measures to protect information regarding its members, donors, and operations". The NRA declined requests for further comment byThe Hill[3] and requests for comment byNBC.[1]The Daily Beast reported that an email to the NRA spokesperson had returned anerror message, potentially indicating that the organization'semail server was offline, and that spokesperson Amy Hunter declined to comment after being reached by phone.[15]
As of October 27, 2021[update], it was unclear whether the NRA had any plans to pay the ransom.[15] Because of the link between Grief and EvilCorp, which is sanctioned by the United States Treasury, the NRA would need the permission of the Treasury to transfer ransom money to Grief;[16][8] doing so without permission could lead to the imposition of penalties.[5][clarification needed]
As of October 29, 2021[update], the NRA had not confirmed that they had been hacked or targeted by a ransomware scam, nor had they confirmed the validity of the documents released by Grief. They did not respond a request for comment fromWired asking whether they were negotiating with Grief or had paid the ransom.[5]
As of November 11, 2021[update], the NRA had made no further official comment about the ransomware attack. The organization's response to the attack remained unclear.The Reload reported that multiple current and former NRA officials had confirmed the authenticity of the leaked documents, while NRA board memberPhillip Journey told the outlet that the lack of information from NRA staff was "disconcerting" and asked "who knows how far it went, what they have, and what they could still sell?"[13][14]
On October 28,The Register reported that the hack had generated an amused reaction on the Internet, suggesting that targeting the NRA may be more popular with the public than hacking government, school, and healthcare facilities as Grief historically has done.[7]