Clinton Campaign Confirm Mystery Hackers Accessed Data

Hillary Clinton’s presidential campaign confirmed that one of its data programs has been accessed by hackers, the latest development in what cybersecurity experts call a broad operation by Russian operatives to infiltrate US political organizations.

“An analytics data program maintained by the DNC, and used by our campaign and a number of other entities, was accessed as part of” a previously disclosed attack on the Democratic National Committee, campaign spokesman Nick Merrill said recently in an e-mailed statement. “Our campaign computer system has been under review by outside cyber security experts. To date, they have found no evidence that our internal systems have been compromised.”

The FBI has begun a review of whether the Clinton campaign was hacked, according to a person familiar with the probe who asked not to be identified discussing an internal inquiry.

The campaign’s announcement came hours after the Democratic Congressional Campaign Committee, which raises funds to elect House Democrats, said that it, too, was “the target of a cybersecurity incident." Meredith Kelly, press secretary for the organization, said the DCCC was “cooperating with the federal law enforcement agencies with respect to their ongoing investigation."

Stolen E-Mails

The founder of the WikiLeaks recently confirmed that his group has more material on Hillary Clinton, and that he's looking to "publish it in batches" over the coming weeks.

When asked how damaging the information would be to Clinton, Julian Assange said, "it remains to be seen."

"It is significant material, it takes a lot of work to verify the accuracy," Assange explained. He said WikiLeaks is now in the process of trying to understand the material, and how to release it for "maximum exposure."

Assange also refused to say whether Russia was behind the original hack of the Democratic National Committee emails, and said as a journalist, he doesn't "reveal our sources." Last month's publishing of DNC emails created havoc in the Democratic Party last week, as the documents showed the DNC was eager to see Clinton defeat Bernie Sanders.
Attacks on Democratic organizations, including the DNC, have roiled the 2016 political campaigns. The disclosure by WikiLeaks of purloined party e-mails forced the head of the DNC to resign as Democrats gathered for their presidential convention. The breach has stirred allegations that Russia is seeking to meddle in the US election, an assertion Russian officials have repeatedly denied.

“Any of the allegations that circulate here in the US about Russia’s involvement are groundless," Yury Melnik, a spokesman for Russia’s embassy in Washington, said recently in a phone interview. "There’s no attempts whatsoever to meddle with the political process or the results of the election. 

The Russian government is ready and willing to work with the current administration and any future administration."

FBI Response

In a recent statement, the Federal Bureau of Investigation said it’s “aware of media reporting on cyber intrusions involving multiple political entities and is working to determine the accuracy, nature and scope of these matters.”

“The cyber threat environment continues to evolve as cyber actors target all sectors and their data,” the agency said. “The FBI takes seriously any allegations of intrusions, and we will continue to hold accountable those who pose a threat in cyberspace.”

The hackers who got into the analytics program used by the Clinton campaign had access to its server for about five days, according to a campaign aide who asked not to be identified. The program, one of many used to conduct voter analysis, doesn’t include Social Security or credit card numbers, the aide said.

“Analytics data program” is a broad term that could mean many things and a key question is whether the data was breached or the program itself compromised, Herbert Lin, a cyber research fellow at Stanford University, said by phone.

"If it’s data, it’s data on people who would have been likely targets for a campaign," Lin said. That might include details from their home addresses to their spending habits, he said.

Internet Traffic

The attack on the Democrats’ House campaign committee affected visitors who went to its website from June 19 to June 27, cybersecurity company FireEye Inc. concluded, based on an analysis of internet traffic.

Those visitors were steered to a server controlled by a hacking group known as APT 28, said John Hultquist, FireEye’s manager of cyber espionage intelligence. Other cybersecurity researchers have said APT 28 is an arm of Russia’s military intelligence service GRU, he said.

The DCCC website was altered so that visitors seeking to make a donation were redirected to a server controlled by hackers linked to the Russian government, Hultquist has said. The cybersecurity company hasn’t been able to determine if the hackers intercepted the donations or succeeded in planting malware on the computers of those visitors, Hultquist said.

The attack on the DNC resulted in the theft of e-mail and internal reports, some of which have since been published by WikiLeaks. Russia is a leading suspect in that intrusion, according to a US official with knowledge of the probe who asked to not be identified because the inquiry is continuing. Private cybersecurity companies have said they traced the DNC attack to groups in Russia.

DNC Chair Debbie Wasserman Schultz was forced to resign after a firestorm over leaked e-mails that showed committee staffers favored Clinton and attempted to undermine Senator Bernie Sanders for the Democratic presidential nomination.

Electronic Voting

In response to speculation that Russia is attempting to influence the outcome of the US presidential race, and might even seek ways to tamper with electronic voting, Eric Schultz, a White House spokesman, said, "As we’ve seen in the past, Russia has tried to influence elections in Europe. We take seriously their past record on this. We also take seriously the integrity of our voting system."

Clinton adviser Jake Sullivan said that the nominee has been briefed on hacking of the DNC and has been told that the weight of expert opinion is that Russia was involved.

“She does not view this as a political issue, she views this as a national security issue," Sullivan told reporters gathered in Philadelphia for this week’s Democratic National Convention. Russia has a history of interfering in elections in other countries, he said.

"Unlike Donald Trump, who praises Putin” and adopts his positions, “Secretary Clinton will stand up to Putin,” Sullivan said.

Trump, the Republican presidential nominee, this week urged Russia to make public “30,000 e-mails that are missing” from the private server that Clinton maintained when she was Secretary of State. He later said he was being “sarcastic.”

Russia Says Spies Planted Malware

Russian military networks and other critical infrastructure have also been hit by tailor-made malware, according to government officials.

Networks at some 20 organizations in Russia, including scientific and military institutions, defense contractors, and public authorities, were found to be infected with the malware, the Russian Federal Security Service (FSB) said recently.

The range of infected sites suggests that the targets were deliberately selected as part of a cyber-espionage operation, the FSB said.

Analysis of the attack showed that filenames, parameters and infection methods used in the malware are similar to those involved in other high-profile cyber-espionage operations around the world. The software was adapted to the characteristics of each PC targeted, and delivered in a malicious email attachment, the FSB said. Once installed, it downloaded additional modules to perform tasks such as monitoring network traffic, capturing and transmitting screenshots and keystroke logs, or recording audio and video using the PC's microphone and webcam.

The FSB is working with ministries and other government agencies to identify all the victims of the malware, and to limit its effects, it said. Russia is said to be the source, not the target, of another government-related cyber-attack. 

Computerworld:     Information-Management:    WashingtonExaminer

 

 

« Russian Government Under Multiple Cyber Attack
EU Cyber Crime Commissioner is King »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Jumpsec

Jumpsec

Jumpsec provides penetration testing, security assessments, social engineering testing, cyber incident response, training and consultancy services.

Data Security Council of India (DSCI)

Data Security Council of India (DSCI)

DSCI is a premier industry body on cyber security and data protection in India, committed to making the cyberspace safe, secure and trusted.

SecureBrain

SecureBrain

SecureBrain software and services help protect against Japanese-specific cybercrime and global internet security threats such as online fraud, phishing, drive-by downloads and malware attacks.

Silverfort

Silverfort

Silverfort introduces the first security platform enabling adaptive authentication and identity theft prevention for sensitive user, device and resource throughout the entire organization.

Bradley-Morris

Bradley-Morris

Bradley-Morris is a leading recruiting firm specializing in transitioning military and veteran talent into civilian careers including Cybersecurity.

Secberus

Secberus

SECBERUS creates cloud security technology to help organizations stay secure & compliant in the public cloud.

Kratos Defense & Security Solutions

Kratos Defense & Security Solutions

The Kratos Space, Training, and Cybersecurity division addresses key cybersecurity challenges, including cloud security, continuous monitoring, IT security, and risk management.

Cyber Command - Romania

Cyber Command - Romania

Cyber Command represents the military authority responsible for the development, protection and resilience of military IT networks and services that support the Romanian Force Structure.

Mosaic Insurance

Mosaic Insurance

Mosaic is a next-generation global specialty insurer distinguished by an exceptional team, agile technology, and a structure that combines Lloyd’s of London strength with a global distribution network

Artjoker

Artjoker

Artjoker is a full cycle software development partner specialized in Blockchain projects and smart contract development including full cycle information security of all projects.

Fireblocks

Fireblocks

Fireblocks is a digital asset security platform that helps financial institutions protect digital assets from theft or hackers.

PCI Security Standards Council (PCI SSC)

PCI Security Standards Council (PCI SSC)

The PCI Security Standards Council is a global forum that brings together payments industry stakeholders to develop and drive adoption of data security standards and resources for safe payments.

e-Xpert Solutions

e-Xpert Solutions

e-Xpert Solutions is a company specialized in the Information Security field since 2001. Our skills are strong technical expertise and the development of tailor-made solutions.

Intel Ignite

Intel Ignite

Intel Ignite is an internationally renowned acceleration program for early-stage deep tech startups.

LockMagic

LockMagic

Lockmagic is an information asset management solution to protect, track, audit and control accesses to sensitive information inside and outside your organization.

ThreatDown

ThreatDown

ThreatDown, powered by Malwarebytes, is on a mission to overpower threats and empower IT by removing the complexity of detecting and stopping today’s most advanced threats.