Clinton Campaign Confirm Mystery Hackers Accessed Data

Hillary Clinton’s presidential campaign confirmed that one of its data programs has been accessed by hackers, the latest development in what cybersecurity experts call a broad operation by Russian operatives to infiltrate US political organizations.

“An analytics data program maintained by the DNC, and used by our campaign and a number of other entities, was accessed as part of” a previously disclosed attack on the Democratic National Committee, campaign spokesman Nick Merrill said recently in an e-mailed statement. “Our campaign computer system has been under review by outside cyber security experts. To date, they have found no evidence that our internal systems have been compromised.”

The FBI has begun a review of whether the Clinton campaign was hacked, according to a person familiar with the probe who asked not to be identified discussing an internal inquiry.

The campaign’s announcement came hours after the Democratic Congressional Campaign Committee, which raises funds to elect House Democrats, said that it, too, was “the target of a cybersecurity incident." Meredith Kelly, press secretary for the organization, said the DCCC was “cooperating with the federal law enforcement agencies with respect to their ongoing investigation."

Stolen E-Mails

The founder of the WikiLeaks recently confirmed that his group has more material on Hillary Clinton, and that he's looking to "publish it in batches" over the coming weeks.

When asked how damaging the information would be to Clinton, Julian Assange said, "it remains to be seen."

"It is significant material, it takes a lot of work to verify the accuracy," Assange explained. He said WikiLeaks is now in the process of trying to understand the material, and how to release it for "maximum exposure."

Assange also refused to say whether Russia was behind the original hack of the Democratic National Committee emails, and said as a journalist, he doesn't "reveal our sources." Last month's publishing of DNC emails created havoc in the Democratic Party last week, as the documents showed the DNC was eager to see Clinton defeat Bernie Sanders.
Attacks on Democratic organizations, including the DNC, have roiled the 2016 political campaigns. The disclosure by WikiLeaks of purloined party e-mails forced the head of the DNC to resign as Democrats gathered for their presidential convention. The breach has stirred allegations that Russia is seeking to meddle in the US election, an assertion Russian officials have repeatedly denied.

“Any of the allegations that circulate here in the US about Russia’s involvement are groundless," Yury Melnik, a spokesman for Russia’s embassy in Washington, said recently in a phone interview. "There’s no attempts whatsoever to meddle with the political process or the results of the election. 

The Russian government is ready and willing to work with the current administration and any future administration."

FBI Response

In a recent statement, the Federal Bureau of Investigation said it’s “aware of media reporting on cyber intrusions involving multiple political entities and is working to determine the accuracy, nature and scope of these matters.”

“The cyber threat environment continues to evolve as cyber actors target all sectors and their data,” the agency said. “The FBI takes seriously any allegations of intrusions, and we will continue to hold accountable those who pose a threat in cyberspace.”

The hackers who got into the analytics program used by the Clinton campaign had access to its server for about five days, according to a campaign aide who asked not to be identified. The program, one of many used to conduct voter analysis, doesn’t include Social Security or credit card numbers, the aide said.

“Analytics data program” is a broad term that could mean many things and a key question is whether the data was breached or the program itself compromised, Herbert Lin, a cyber research fellow at Stanford University, said by phone.

"If it’s data, it’s data on people who would have been likely targets for a campaign," Lin said. That might include details from their home addresses to their spending habits, he said.

Internet Traffic

The attack on the Democrats’ House campaign committee affected visitors who went to its website from June 19 to June 27, cybersecurity company FireEye Inc. concluded, based on an analysis of internet traffic.

Those visitors were steered to a server controlled by a hacking group known as APT 28, said John Hultquist, FireEye’s manager of cyber espionage intelligence. Other cybersecurity researchers have said APT 28 is an arm of Russia’s military intelligence service GRU, he said.

The DCCC website was altered so that visitors seeking to make a donation were redirected to a server controlled by hackers linked to the Russian government, Hultquist has said. The cybersecurity company hasn’t been able to determine if the hackers intercepted the donations or succeeded in planting malware on the computers of those visitors, Hultquist said.

The attack on the DNC resulted in the theft of e-mail and internal reports, some of which have since been published by WikiLeaks. Russia is a leading suspect in that intrusion, according to a US official with knowledge of the probe who asked to not be identified because the inquiry is continuing. Private cybersecurity companies have said they traced the DNC attack to groups in Russia.

DNC Chair Debbie Wasserman Schultz was forced to resign after a firestorm over leaked e-mails that showed committee staffers favored Clinton and attempted to undermine Senator Bernie Sanders for the Democratic presidential nomination.

Electronic Voting

In response to speculation that Russia is attempting to influence the outcome of the US presidential race, and might even seek ways to tamper with electronic voting, Eric Schultz, a White House spokesman, said, "As we’ve seen in the past, Russia has tried to influence elections in Europe. We take seriously their past record on this. We also take seriously the integrity of our voting system."

Clinton adviser Jake Sullivan said that the nominee has been briefed on hacking of the DNC and has been told that the weight of expert opinion is that Russia was involved.

“She does not view this as a political issue, she views this as a national security issue," Sullivan told reporters gathered in Philadelphia for this week’s Democratic National Convention. Russia has a history of interfering in elections in other countries, he said.

"Unlike Donald Trump, who praises Putin” and adopts his positions, “Secretary Clinton will stand up to Putin,” Sullivan said.

Trump, the Republican presidential nominee, this week urged Russia to make public “30,000 e-mails that are missing” from the private server that Clinton maintained when she was Secretary of State. He later said he was being “sarcastic.”

Russia Says Spies Planted Malware

Russian military networks and other critical infrastructure have also been hit by tailor-made malware, according to government officials.

Networks at some 20 organizations in Russia, including scientific and military institutions, defense contractors, and public authorities, were found to be infected with the malware, the Russian Federal Security Service (FSB) said recently.

The range of infected sites suggests that the targets were deliberately selected as part of a cyber-espionage operation, the FSB said.

Analysis of the attack showed that filenames, parameters and infection methods used in the malware are similar to those involved in other high-profile cyber-espionage operations around the world. The software was adapted to the characteristics of each PC targeted, and delivered in a malicious email attachment, the FSB said. Once installed, it downloaded additional modules to perform tasks such as monitoring network traffic, capturing and transmitting screenshots and keystroke logs, or recording audio and video using the PC's microphone and webcam.

The FSB is working with ministries and other government agencies to identify all the victims of the malware, and to limit its effects, it said. Russia is said to be the source, not the target, of another government-related cyber-attack. 

Computerworld:     Information-Management:    WashingtonExaminer

 

 

« Russian Government Under Multiple Cyber Attack
EU Cyber Crime Commissioner is King »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

FT Cyber Resilience Summit: Europe

FT Cyber Resilience Summit: Europe

27 November 2024 | In-Person & Digital | 22 Bishopsgate, London. Business leaders, Innovators & Experts address evolving cybersecurity risks.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Checkmarx

Checkmarx

Checkmarx provides state-of-the-art application security solutions with static code analysis software.

Markel International

Markel International

Markel International is an international insurance company which looks after the commercial insurance needs of businesses. Specialist services include Cyber Risk insurance.

CyberDef

CyberDef

CyberDef is a consulting company specialising in cyber defence services for small and medium enterprises.

Haltdos

Haltdos

Haltdos is an AI driven website protection service that secures websites against today's cyber threats.

Farsight Security

Farsight Security

Farsight Security provides the world’s largest real-time actionable threat intelligence on how the Internet is changing.

Statice

Statice

Statice develops state-of-the-art data privacy technology that helps companies double-down on data-driven innovation while safeguarding the privacy of individuals.

Curtail

Curtail

Curtail keeps businesses running by using live traffic analysis to identify defects before software goes live, and detect and isolate security threats before they impact systems.

Kinnami Software

Kinnami Software

Kinnami is a data security company that equips organizations with the tools they need to secure and protect highly confidential documents and data.

Kratos Defense & Security Solutions

Kratos Defense & Security Solutions

The Kratos Space, Training, and Cybersecurity division addresses key cybersecurity challenges, including cloud security, continuous monitoring, IT security, and risk management.

CISO Global

CISO Global

CISO Global (formerly Cerberus Sentinel) are on a mission to demystify and accelerate our clients’ journey to cyber resilience, empowering organizations to securely grow, operate, and innovate.

Antares NetlogiX

Antares NetlogiX

Antares Netlogix are a leading Austrian service provider for IT security, critical infrastructures and managed security services.

Paradyn

Paradyn

Paradyn-managed security services can provide a holistic view of your business environment, no matter how simple or complex it is.

Secjur

Secjur

Secjur is a provider of AI-based compliance tools that aim to put compliance, data protection, information security and whistleblowing on autopilot.

ISO WISH

ISO WISH

Take your Business to the Next Level with ISO Certification in UAE.

DataGuard

DataGuard

DataGuard is a security and compliance software company trusted by organisations across the globe.

ClearSale (CLSA3)

ClearSale (CLSA3)

Clearsale’s innovative fraud solutions combine advanced technology with a passionate team of seasoned experts that understand every client’s unique needs.