Clinton Campaign Confirm Mystery Hackers Accessed Data

Hillary Clinton’s presidential campaign confirmed that one of its data programs has been accessed by hackers, the latest development in what cybersecurity experts call a broad operation by Russian operatives to infiltrate US political organizations.

“An analytics data program maintained by the DNC, and used by our campaign and a number of other entities, was accessed as part of” a previously disclosed attack on the Democratic National Committee, campaign spokesman Nick Merrill said recently in an e-mailed statement. “Our campaign computer system has been under review by outside cyber security experts. To date, they have found no evidence that our internal systems have been compromised.”

The FBI has begun a review of whether the Clinton campaign was hacked, according to a person familiar with the probe who asked not to be identified discussing an internal inquiry.

The campaign’s announcement came hours after the Democratic Congressional Campaign Committee, which raises funds to elect House Democrats, said that it, too, was “the target of a cybersecurity incident." Meredith Kelly, press secretary for the organization, said the DCCC was “cooperating with the federal law enforcement agencies with respect to their ongoing investigation."

Stolen E-Mails

The founder of the WikiLeaks recently confirmed that his group has more material on Hillary Clinton, and that he's looking to "publish it in batches" over the coming weeks.

When asked how damaging the information would be to Clinton, Julian Assange said, "it remains to be seen."

"It is significant material, it takes a lot of work to verify the accuracy," Assange explained. He said WikiLeaks is now in the process of trying to understand the material, and how to release it for "maximum exposure."

Assange also refused to say whether Russia was behind the original hack of the Democratic National Committee emails, and said as a journalist, he doesn't "reveal our sources." Last month's publishing of DNC emails created havoc in the Democratic Party last week, as the documents showed the DNC was eager to see Clinton defeat Bernie Sanders.
Attacks on Democratic organizations, including the DNC, have roiled the 2016 political campaigns. The disclosure by WikiLeaks of purloined party e-mails forced the head of the DNC to resign as Democrats gathered for their presidential convention. The breach has stirred allegations that Russia is seeking to meddle in the US election, an assertion Russian officials have repeatedly denied.

“Any of the allegations that circulate here in the US about Russia’s involvement are groundless," Yury Melnik, a spokesman for Russia’s embassy in Washington, said recently in a phone interview. "There’s no attempts whatsoever to meddle with the political process or the results of the election. 

The Russian government is ready and willing to work with the current administration and any future administration."

FBI Response

In a recent statement, the Federal Bureau of Investigation said it’s “aware of media reporting on cyber intrusions involving multiple political entities and is working to determine the accuracy, nature and scope of these matters.”

“The cyber threat environment continues to evolve as cyber actors target all sectors and their data,” the agency said. “The FBI takes seriously any allegations of intrusions, and we will continue to hold accountable those who pose a threat in cyberspace.”

The hackers who got into the analytics program used by the Clinton campaign had access to its server for about five days, according to a campaign aide who asked not to be identified. The program, one of many used to conduct voter analysis, doesn’t include Social Security or credit card numbers, the aide said.

“Analytics data program” is a broad term that could mean many things and a key question is whether the data was breached or the program itself compromised, Herbert Lin, a cyber research fellow at Stanford University, said by phone.

"If it’s data, it’s data on people who would have been likely targets for a campaign," Lin said. That might include details from their home addresses to their spending habits, he said.

Internet Traffic

The attack on the Democrats’ House campaign committee affected visitors who went to its website from June 19 to June 27, cybersecurity company FireEye Inc. concluded, based on an analysis of internet traffic.

Those visitors were steered to a server controlled by a hacking group known as APT 28, said John Hultquist, FireEye’s manager of cyber espionage intelligence. Other cybersecurity researchers have said APT 28 is an arm of Russia’s military intelligence service GRU, he said.

The DCCC website was altered so that visitors seeking to make a donation were redirected to a server controlled by hackers linked to the Russian government, Hultquist has said. The cybersecurity company hasn’t been able to determine if the hackers intercepted the donations or succeeded in planting malware on the computers of those visitors, Hultquist said.

The attack on the DNC resulted in the theft of e-mail and internal reports, some of which have since been published by WikiLeaks. Russia is a leading suspect in that intrusion, according to a US official with knowledge of the probe who asked to not be identified because the inquiry is continuing. Private cybersecurity companies have said they traced the DNC attack to groups in Russia.

DNC Chair Debbie Wasserman Schultz was forced to resign after a firestorm over leaked e-mails that showed committee staffers favored Clinton and attempted to undermine Senator Bernie Sanders for the Democratic presidential nomination.

Electronic Voting

In response to speculation that Russia is attempting to influence the outcome of the US presidential race, and might even seek ways to tamper with electronic voting, Eric Schultz, a White House spokesman, said, "As we’ve seen in the past, Russia has tried to influence elections in Europe. We take seriously their past record on this. We also take seriously the integrity of our voting system."

Clinton adviser Jake Sullivan said that the nominee has been briefed on hacking of the DNC and has been told that the weight of expert opinion is that Russia was involved.

“She does not view this as a political issue, she views this as a national security issue," Sullivan told reporters gathered in Philadelphia for this week’s Democratic National Convention. Russia has a history of interfering in elections in other countries, he said.

"Unlike Donald Trump, who praises Putin” and adopts his positions, “Secretary Clinton will stand up to Putin,” Sullivan said.

Trump, the Republican presidential nominee, this week urged Russia to make public “30,000 e-mails that are missing” from the private server that Clinton maintained when she was Secretary of State. He later said he was being “sarcastic.”

Russia Says Spies Planted Malware

Russian military networks and other critical infrastructure have also been hit by tailor-made malware, according to government officials.

Networks at some 20 organizations in Russia, including scientific and military institutions, defense contractors, and public authorities, were found to be infected with the malware, the Russian Federal Security Service (FSB) said recently.

The range of infected sites suggests that the targets were deliberately selected as part of a cyber-espionage operation, the FSB said.

Analysis of the attack showed that filenames, parameters and infection methods used in the malware are similar to those involved in other high-profile cyber-espionage operations around the world. The software was adapted to the characteristics of each PC targeted, and delivered in a malicious email attachment, the FSB said. Once installed, it downloaded additional modules to perform tasks such as monitoring network traffic, capturing and transmitting screenshots and keystroke logs, or recording audio and video using the PC's microphone and webcam.

The FSB is working with ministries and other government agencies to identify all the victims of the malware, and to limit its effects, it said. Russia is said to be the source, not the target, of another government-related cyber-attack. 

Computerworld:     Information-Management:    WashingtonExaminer

 

 

« Russian Government Under Multiple Cyber Attack
EU Cyber Crime Commissioner is King »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

44CON

44CON

44CON is an Information Security Conference & Training event taking place in London. Designed to provide something for the business and technical Information Security professional.

Interpol

Interpol

Interpol is the world’s largest international police organization. It is committed to the global fight against cybercrime, as well as tackling cyber-enabled crimes.

PSW Group

PSW Group

PSW Group is a full-service Internet solutions provider with a special focus on Internet security.

Cyber Observer

Cyber Observer

Cyber Observer’s team specializes in providing corporate officers with comprehensive, visual, real-time performance overview, critical security control (CSC) analysis.

OpenZeppelin

OpenZeppelin

OpenZeppelin builds developer tools and performs security audits for distributed systems that power multimillion-dollar economies.

Techleap.nl

Techleap.nl

Techleap.nl is a non-profit publicly funded organisation helping to quantify and accelerate the tech ecosystem of the Netherlands.

Defensity

Defensity

Defensity offer bespoke & pre packaged IT Security Solutions for Small business to help companies reduce overall IT related risk.

R3I Ventures - House of DeepTech

R3I Ventures - House of DeepTech

The House of DeepTech is an incubator for deeptech entrepreneurs that are transforming global industries. Areas of interest include cybersecurity.

Arkphire

Arkphire

Arkphire provide solutions across every aspect of IT to help your business perform better.

VeriClouds

VeriClouds

VeriClouds is a password verification service that helps organizations detect compromised passwords and stop account takeover attacks.

Cyber Readiness Institute (CRI)

Cyber Readiness Institute (CRI)

At the Cyber Readiness Institute, our mission is simple: empower small and medium-sized enterprises with free tools and resources to help them become more secure and resilient.

R-Tech

R-Tech

R-Tech GmbH manages the digital start-up initiative, whose goal is to build a sustainable start-up culture in the field of digitization throughout the Upper Palatinate district of Bavaria.

ShellBoxes

ShellBoxes

ShellBoxes are a leading Web3 company focused on providing top-notch blockchain security and development services.

GISEC Global

GISEC Global

GISEC Global provides vendors and companies from around the world with access to lucrative opportunity to capitalize on what's set to become one of the world's booming markets.

Capzul

Capzul

Capzul are transforming the network security landscape with a new approach; creating virtually impenetrable networks, precluding cybercriminal attacks on your network ecosystem.

Infratech

Infratech

Infratech is a leading Saudi company providing cutting-edge services and solutions in IT Infrastructure, IT Security and Digital Transformation.