WASHINGTON, June 14 (Reuters) - Russian government hackers penetrated the computer network of the Democratic National Committee and gained access to all opposition research on Republican presidential candidate Donald Trump, the committee and security researchers said on Tuesday.
Representative Debbie Wasserman Schultz, chairwoman of the Democratic National Committee, confirmed the breach to Reuters, first reported by the Washington Post.
"When we discovered the intrusion, we treated this like the serious incident it is ...," Wasserman Schultz said in a statement. "Our team moved as quickly as possible to kick out the intruders and secure our network."
The Washington Post quoted U.S. officials as saying Russian spies also targeted the networks of Trump and Democratic presidential candidate Hillary Clinton, as well as computers of some Republican political action committees.
The intrusion is emblematic of the sophistication of Russian hackers, who intelligence officials have long viewed as the most talented of U.S. adversaries in cyberspace.
In Moscow, a Kremlin spokesman did not immediately respond to a request for comment.
Two separate groups were able to enter the DNC's system and read email and chat communications, according to the committee and CrowdStrike, the cyber firm that helped clean up the breach.
BEARS ON THE LOOSE
CrowdStrike began assisting the DNC in May and identified two groups, said Dmitri Alperovitch, the company's co-founder and chief technology officer. Both were kicked out this weekend, he said.
The first, which CrowdStrike named Cozy Bear, entered the DNC's systems last summer, according to the firm. It primarily monitored email and chat conversations and may be working for Russia's Federal Security Service, or FSB, Alperovitch said.
FSB was once run by Russian President Vladimir Putin.
The second group, nicknamed Fancy Bear, is probably working on behalf of Russia's military, Alperovitch said. It gained entry in late April and "went straight to the oppo research specifically on Donald Trump and exfiltrated some of it," he said.
Alperovitch added that both groups were among "the best threat actors that we've ever encountered" but that they appeared to not be working together.
Cyber attacks against political candidates and organizations are common worldwide. U.S. National Intelligence Director James Clapper said last month he was aware of attempted hacks on campaigns and related organizations and that he expected to see more as the November presidential election nears.
The last two U.S. presidential cycles in 2008 and 2012 witnessed a barrage of cyber attacks from a range of adversaries targeting President Barack Obama's campaign and the campaigns of his Republican foes.
U.S. intelligence officials have said many previous assaults were linked to Chinese hackers.
LONDON, ENGLAND - AUGUST 19: A detail of the Ashley Madison website on August 19, 2015 in London, England. Hackers who stole customer information from the cheating site AshleyMadison.com dumped 9.7 gigabytes of data to the dark web on Tuesday fulfilling a threat to release sensitive information including account details, log-ins and credit card details, if Avid Life Media, the owner of the website didn't take Ashley Madison.com offline permanently. (Photo by Carl Court/Getty Images)
Katherine Archuleta, director of the U.S. Office of Personnel Management (OPM), speaks during a House Oversight and Government Reform Committee hearing on the OPM data breach in Washington, D.C., U.S., on Wednesday, June 24, 2015. U.S. senators said yesterday they doubt the government's personnel office understands the breadth of a computer hack that exposed the records of more than 4 million federal workers, or that the agency can stop another breach. Photographer: Andrew Harrer/Bloomberg via Getty Images
WASHINGTON, DC - JUNE 05: The entrance to the Theodore Roosevelt Federal Building that houses the Office of Personnel Management headquarters is shown June 5, 2015 in Washington, DC. U.S. investigators have said that at least four million current and former federal employees might have had their personal information stolen by Chinese hackers. (Photo by Mark Wilson/Getty Images)
SCHAUMBURG, IL - AUGUST 04: A statue of a horse stands at the entrance to a P.F. Chang's restaurant on August 4, 2014 in Schaumburg, Illinois. P.F. Chang's China Bistro Ltd. said today that the company experienced a data breach involving customers' credit and debit card information which affected 33 restaurants in 16 states, including the Schaumburg, Illinois location. (Photo by Scott Olson/Getty Images)
PORTLAND, ME - AUGUST 15: Shaws on Congress Street on Friday, July 15, 2014. Shaws parent company is investigating a possible data breach. (Photo by Logan Werlinger/Portland Press Herald via Getty Images)
COLMA, CA - APRIL 18: Customers enter a Michaels art and crafts store on April 18, 2014 in Colma, California. Michaels, the largest arts and crafts chain in the U.S., announced that an estimated 2.6 million cards used at its stores across the country may have been affected by a security breach. Aaron Brothers, a subsidiary of Michaels, was also affected by the breach. (Photo by Justin Sullivan/Getty Images)
CORAL GABLES, FL - FEBRUARY 28: A checkout keypad is seen at a Sears store on February 28, 2014 in Coral Gables, Florida. According to reports the U.S. Secret Service is investigating a possible digital attack at Sears Holdings Corp. (Photo by Joe Raedle/Getty Images)
A couple of shoppers leave a Target store on a rainy afternoon in Alhambra, California on December19, 2013, as the US retail giant said some 40 million customers may have had bank card data compromised by hackers who broke into its database as holiday shopping got underway. Target said there had been 'unauthorized access' to its payment system in US stores affecting credit and debit cards with approximately 40 million credit and debit cards possibly affected by the breach between November 27 and December 15, the company said in a statement. AFP PHOTO / Frederic J. Brown (Photo credit should read FREDERIC J. BROWN/AFP/Getty Images)
Discover More Like This
BACK TO SLIDE
(Reporting by Susan Heavey; Writing by Mohammad Zargham; Editing by James Dalgleish)