Cyber Strikeback: Putin’s Aide Hacked

After a series of leaks of hacked emails belonging to senior member of the Democratic Party and Hillary Clinton’s campaign, recently it was the turn for the disclosure of correspondence belonging to a top aide to Russian President Vladimir Putin. The emails suggest direct political and financial ties with pro-Russian separatists in eastern Ukraine.

Mr Putin has denied any connection to the separatists, whether with military or financial support, despite widespread evidence to the contrary. Fighting has raged in eastern Ukraine for two years, since rebels in the Donetsk region proclaimed their independence from Ukraine and sought to join Russia. Anywhere up to 10,000 people have been killed.

USA Today said a Ukrainian group called Cyber Hunta hacked into the account of an assistant to presidential aide Vladislav Surkov and uploaded more than 2,000 emails this week. Mr Surkov, although under sanctions for his role in the separatist conflict, travelled to Berlin this month with Mr Putin for a summit on Ukraine.  

The hacked emails include a June 2014 list of casualties from the separatist Donetsk People’s Republic (DNR) in eastern Ukraine, sent by then-chairman, Denis Pushilin. Another email listed expenses to set up the DNR’s Ministry of Information.

The leaks followed claims from US intelligence agencies that Russia was responsible for a series of hacks on American officials. Some analysts suggested these new leaks could be a retaliation.

On 16th October, Vice President Biden told NBC that the US would be “sending a message” over the hacking that Mr Putin would recognise.

“He’ll know it,” Mr Biden said. “And it will be at the time of our choosing. And under the circumstances that have the greatest impact.”

Mark Galeotti, senior researcher at the Institute of International Relations in Prague told USA Today that while there was no evidence that the leak was the direct retaliation that Mr Biden had threatened, there was plenty to suggest it was.

“I cannot help but wonder if this is the kind of response that US policymakers have been hinting at, following the various hacks blamed on Russia, either working through Ukrainians or simply handed to them,” he said. “This kind of a leak is enough to warn the Russians that the USA has certain capabilities and is willing to use them. Welcome to the world of proxy cyberwars.”

Kremlin spokesman Dmitry Peskov dismissed the emails as fake in comments to Russian news agencies, saying that Mr Surkov did not use an email. But Ukraine’s National Security Service recently said that the emails were real.

The leak of the emails came as a new poll suggested that most Republicans believe Russia is attempting to influence the US presidential election.

Some 55 per cent of US adults, including 51 per cent of Republicans and 65 per cent of Democrats, said they thought Russia was trying to tip the scales in the election. The Reuters poll said most believe it is trying to help Mr Trump win.

Independent:                 Ukraine Crisis Fits Cyber War Narrative:

« Is Apple Abandoning Macs?
Australian Government Networks Hacked »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

ACME Communications

ACME Communications

ACME Communications specialises in the field of data centre, implementation, maintenance & operation and all aspects of other IT service.

Global Learning Systems (GLS)

Global Learning Systems (GLS)

Global Learning Systems provides security awareness and compliance training programs for employees that effectively promote behavior change and protect your organization.

Entersekt

Entersekt

Entersekt is an innovator in push-based authentication and app security.

Ingalls Information Security

Ingalls Information Security

Ingalls Information Security provides network security, monitoring and forensics.

Ergon Informatik

Ergon Informatik

Ergon Informatik AG is Switzerland's leading provider of customised software solutions and software products including fraud detection and the Airlock web security suite.

R2S Technologies

R2S Technologies

R2S can help you implement a cyber security framework to ensure your business is more resilient towards the growing threat of cyber crime. We provide Web and Mobile Application Security Assessment..

Cryptika

Cryptika

Cryptika is a fully integrated IT security and managed services provider, specialized in Next-Generation Cyber Security Technologies.

Wolverhampton Cyber Research Institute (WCRI)

Wolverhampton Cyber Research Institute (WCRI)

Wolverhampton Cyber Research Institute builds on the strength of its members in the area of network and communication security, artificial intelligence, big data and cyber physical systems.

VLATACOM Institute

VLATACOM Institute

Vlatacom Institute is privately owned accredited research and development institute, system integrator and turn-key solution provider. Areas of expertise include encryption and authentication.

ClubCISO

ClubCISO

ClubCISO is a community of peers, working together to help shape the future of the information security profession by facilitating independent discussion on data security and cyber resilience.

ProLion

ProLion

ProLion provides Data Integrity solutions that ensure organisations’ data remains secure, compliant, manageable and accessible.

LANCOM Systems

LANCOM Systems

LANCOM Systems is the leading European manufacturer of secure, reliable and future-proof networking (WAN, LAN, WLAN) and firewall solutions for the public and private sectors.

Raxis

Raxis

Raxis is a cybersecurity company that hacks into computer networks and physical structures to perform penetration tests, assessing corporate vulnerability to real-world threats.

Veza Technologies

Veza Technologies

Veza is the authorization platform for data. Built for hybrid, multi-cloud environments, Veza enables organizations to manage and control who can and should take what action on what data.

VeriBOM

VeriBOM

VeriBOM is a SaaS security and compliance platform that helps protect you and your customers through automation, documentation, and transparency for every software application you build or run.

Incode

Incode

Incode is the leading provider of world-class identity solutions that is reinventing the way humans authenticate and verify their identities online.