Cyber Strikeback: Putin’s Aide Hacked

After a series of leaks of hacked emails belonging to senior member of the Democratic Party and Hillary Clinton’s campaign, recently it was the turn for the disclosure of correspondence belonging to a top aide to Russian President Vladimir Putin. The emails suggest direct political and financial ties with pro-Russian separatists in eastern Ukraine.

Mr Putin has denied any connection to the separatists, whether with military or financial support, despite widespread evidence to the contrary. Fighting has raged in eastern Ukraine for two years, since rebels in the Donetsk region proclaimed their independence from Ukraine and sought to join Russia. Anywhere up to 10,000 people have been killed.

USA Today said a Ukrainian group called Cyber Hunta hacked into the account of an assistant to presidential aide Vladislav Surkov and uploaded more than 2,000 emails this week. Mr Surkov, although under sanctions for his role in the separatist conflict, travelled to Berlin this month with Mr Putin for a summit on Ukraine.  

The hacked emails include a June 2014 list of casualties from the separatist Donetsk People’s Republic (DNR) in eastern Ukraine, sent by then-chairman, Denis Pushilin. Another email listed expenses to set up the DNR’s Ministry of Information.

The leaks followed claims from US intelligence agencies that Russia was responsible for a series of hacks on American officials. Some analysts suggested these new leaks could be a retaliation.

On 16th October, Vice President Biden told NBC that the US would be “sending a message” over the hacking that Mr Putin would recognise.

“He’ll know it,” Mr Biden said. “And it will be at the time of our choosing. And under the circumstances that have the greatest impact.”

Mark Galeotti, senior researcher at the Institute of International Relations in Prague told USA Today that while there was no evidence that the leak was the direct retaliation that Mr Biden had threatened, there was plenty to suggest it was.

“I cannot help but wonder if this is the kind of response that US policymakers have been hinting at, following the various hacks blamed on Russia, either working through Ukrainians or simply handed to them,” he said. “This kind of a leak is enough to warn the Russians that the USA has certain capabilities and is willing to use them. Welcome to the world of proxy cyberwars.”

Kremlin spokesman Dmitry Peskov dismissed the emails as fake in comments to Russian news agencies, saying that Mr Surkov did not use an email. But Ukraine’s National Security Service recently said that the emails were real.

The leak of the emails came as a new poll suggested that most Republicans believe Russia is attempting to influence the US presidential election.

Some 55 per cent of US adults, including 51 per cent of Republicans and 65 per cent of Democrats, said they thought Russia was trying to tip the scales in the election. The Reuters poll said most believe it is trying to help Mr Trump win.

Independent:                 Ukraine Crisis Fits Cyber War Narrative:

« Is Apple Abandoning Macs?
Australian Government Networks Hacked »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Cradlepoint

Cradlepoint

With Cradlepoint customers leverage the speed and economics of wired and wireless Internet broadband for branch, mobile, and IoT networks while maintaining end-to-end visibility, security and control.

Ethoca

Ethoca

Ethoca is a secure network for card issuers and merchants to connect and work cooperatively outside the payment network in a unique and powerful way.

Magal Security Systems (Magal S3)

Magal Security Systems (Magal S3)

Magal Security Systems is a leading international provider of integrated solutions and products for physical and cyber security, safety and site management.

Chronicle

Chronicle

Chronicle products combine intelligence about global threats in the wild, threats inside your network, and unique signals about both.

Greylock Partners

Greylock Partners

Greylock Partners is a leading venture capital firm based in Silicon Valley. We invest in all sectors of enterprise software technology including applications, cloud/SaaS, networking and security.

Blue Lance

Blue Lance

Blue Lance is a global provider of cybersecurity governance solutions. Our software solutions automatically collect and store the information necessary for investigations, audit and compliance.

IP2Location

IP2Location

IP2Location provide services to identify geolocation by IP address, and to detect IP addresses associated with anonymous proxy servers, which are often used for fraud and spamming purposes.

Snowflake

Snowflake

Empower your cybersecurity and compliance teams with Snowflake. Gain full visibility into security logs, at massive scale, while reducing costs of Security Information and Event Management systems.

Fortiedge

Fortiedge

Fortiedge is an IT Security solution provider specializing in Cyber Security practices and solutions for our clients.

Exceed Cybersecurity & I.T. Services

Exceed Cybersecurity & I.T. Services

Exceed Cybersecurity & I.T. Services is a premier Managed Internet Technology (I.T.) company with a focus in cybersecurity risk management and CMMC compliance management.

RubinBrown

RubinBrown

RubinBrown LLP is a leading accounting and professional consulting firm. The RubinBrown name and reputation are synonymous with experience, integrity and value.

Digital Security by Design (DSbD)

Digital Security by Design (DSbD)

Digital Security by Design is an initiative supported by the UK government to transform digital technology and create a more resilient, and secure foundation for a safer future.

GTT Communications

GTT Communications

GTT are a global network provider that serves thousands of multinational and national enterprise, government and carrier customers with a portfolio of advanced connectivity and security services.

FTx Identity

FTx Identity

FTx Identity is the world's most advanced age verification technology (AVT) and identity management system.

Zanutix Consulting

Zanutix Consulting

Zanutix specialize in a wide range of services including Network Design and Implementation, Data Management, Cloud Solutions, Software Development and Cybersecurity.

Yondu

Yondu

Yondu empowers businesses across various industries through a wide array of innovative technology solutions to help them scale in the new digital economy.