Cyber Strikeback: Putin’s Aide Hacked

After a series of leaks of hacked emails belonging to senior member of the Democratic Party and Hillary Clinton’s campaign, recently it was the turn for the disclosure of correspondence belonging to a top aide to Russian President Vladimir Putin. The emails suggest direct political and financial ties with pro-Russian separatists in eastern Ukraine.

Mr Putin has denied any connection to the separatists, whether with military or financial support, despite widespread evidence to the contrary. Fighting has raged in eastern Ukraine for two years, since rebels in the Donetsk region proclaimed their independence from Ukraine and sought to join Russia. Anywhere up to 10,000 people have been killed.

USA Today said a Ukrainian group called Cyber Hunta hacked into the account of an assistant to presidential aide Vladislav Surkov and uploaded more than 2,000 emails this week. Mr Surkov, although under sanctions for his role in the separatist conflict, travelled to Berlin this month with Mr Putin for a summit on Ukraine.  

The hacked emails include a June 2014 list of casualties from the separatist Donetsk People’s Republic (DNR) in eastern Ukraine, sent by then-chairman, Denis Pushilin. Another email listed expenses to set up the DNR’s Ministry of Information.

The leaks followed claims from US intelligence agencies that Russia was responsible for a series of hacks on American officials. Some analysts suggested these new leaks could be a retaliation.

On 16th October, Vice President Biden told NBC that the US would be “sending a message” over the hacking that Mr Putin would recognise.

“He’ll know it,” Mr Biden said. “And it will be at the time of our choosing. And under the circumstances that have the greatest impact.”

Mark Galeotti, senior researcher at the Institute of International Relations in Prague told USA Today that while there was no evidence that the leak was the direct retaliation that Mr Biden had threatened, there was plenty to suggest it was.

“I cannot help but wonder if this is the kind of response that US policymakers have been hinting at, following the various hacks blamed on Russia, either working through Ukrainians or simply handed to them,” he said. “This kind of a leak is enough to warn the Russians that the USA has certain capabilities and is willing to use them. Welcome to the world of proxy cyberwars.”

Kremlin spokesman Dmitry Peskov dismissed the emails as fake in comments to Russian news agencies, saying that Mr Surkov did not use an email. But Ukraine’s National Security Service recently said that the emails were real.

The leak of the emails came as a new poll suggested that most Republicans believe Russia is attempting to influence the US presidential election.

Some 55 per cent of US adults, including 51 per cent of Republicans and 65 per cent of Democrats, said they thought Russia was trying to tip the scales in the election. The Reuters poll said most believe it is trying to help Mr Trump win.

Independent:                 Ukraine Crisis Fits Cyber War Narrative:

« Is Apple Abandoning Macs?
Australian Government Networks Hacked »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Authenware

Authenware

AuthenWare delivers the highest level of identity security based on behavioral biometrics.

Payload Security

Payload Security

Payload Security's VxStream Sandbox is a fully automated malware analysis system.

Sasa Software

Sasa Software

Sasa Software is a cybersecurity software developer specializing in the prevention of file-based network attacks.

DAkkS

DAkkS

DAkkS is the national accreditation body for Germany. The directory of members provides details of organisations offering certification services for ISO 27001.

Southwest Research Institute (SwRI)

Southwest Research Institute (SwRI)

Southwest Research Institute SwRI are R&D problem solvers providing independent services to government and industry clients. Areas of expertise include Cybersecurity, Intelligent Networks and IoT.

Prove Identity

Prove Identity

Prove (formerly Payfone) is a leader in mobile & digital identity authentication for the connected world.

Binary Defense

Binary Defense

Binary Defense protect businesses of all sizes through advanced cybersecurity solutions including Managed Detection and Response, Security Information and Event Management and Counterintelligence.

Cognyte

Cognyte

Cognyte are a market leader in security analytics software that empowers governments and enterprises with Actionable Intelligence for a safer world.

IT Acceleration

IT Acceleration

IT Acceleration is a full-service IT management and support, IT compliance and Digital Forensics company.

BullWall

BullWall

BullWall is a digital innovator dedicated to fight cybercrime in its many forms. Our overarching purpose is to stop new and unknown strings of ransomware attacks in its tracks.

Bright Security

Bright Security

Bright Security is a developer-centric Dynamic Application Security Testing (DAST) solution that helps organizations ship secure applications and APIs quickly and cost-effectively.

Oivan

Oivan

Oivan harnesses the strengths of the web, mobile, cloud, cybersecurity, and blockchain technologies to help our clients to launch transformative digital services.

Innov8tif

Innov8tif

Innov8tif is an AI company specialised in providing ID assurance solutions — helping digital businesses to prevent frauds by verifying and authenticating customers identity.

Acumen

Acumen

Acumen's cyber security engineers protect your critical systems, in critical moments. We are here when you need us most.

GlassHouse Technology

GlassHouse Technology

GlassHouse supports customers in their digitalization journey with our deep technical expertise in Managed Cloud and Security Services, SAP Infrastructure Service and Business Continuity Services.

RAH Infotech

RAH Infotech

RAH Infotech is India’s leading value added distributor and solutions provider in the Network and Security domain. We are specialists in Enterprise and App Security and Application Delivery.