Surprise: FBI Say US Political Hacks ‘Probably Was Russia’

At the first 2016 US Presidential election debate with Hilary Clinton, Donald Trump  questioned the widely held belief that Russian intelligence agents were behind the Democratic National Committee hack.

"I don't know if we know it was Russia who broke into the DNC," the Republican presidential candidate said when the first presidential debate turned to the topic of cybersecurity. "She keeps saying 'Russia, Russia, Russia,' and maybe it was. It could be Russia but it could be China, could also be lots of other people. It could be someone sitting on their bed that weighs 400 pounds."

While Trump might not be certain about the source of the attack, the consensus is pretty strong among law enforcement and analysts: Russian intelligence was almost certainly behind it, or at least involved.

Recently, US Director of National Intelligence James Clapper, in his most explicit comments to date, suggested Russia was behind the breach and subsequent leaks, The Wall Street Journal reported. Clapper pointed out that the Russian spies have targeted the US since the 1960s and that the most recent attacks perhaps seem more shocking because they employed cyber-tools.

Also, a cybersecurity firm employed by the DNC to investigate the breach found evidence of two Russian intelligence-affiliated groups present in the DNC network in May.

To be sure, the FBI is still investigating the DNC hack, believed to have taken place over a year-long period, which came to light in April with the publication of leaked emails sufficiently embarrassing and well-timed to force the resignation of key DNC staffers ahead of the Democratic National Convention. 

The White House has tiptoed around blaming Russian President Vladimir Putin directly, citing the ongoing FBI investigation, but President Barack Obama has said cyber-experts implicated Russia in the hack and that Russia stands to benefit from a Trump White House win.

Cybersecurity experts have warned that if in fact Russia is found to be behind the breach and subsequent leaks of information, that infiltration would represent a paradigm shift in cyberwarfare.

"There's been a line that has been crossed, and there has to be some type of response if, indeed, there is a nation-state responsible," said Chris Finan, a former White House cybersecurity director in the Obama administration.

The DNC intrusion is evidence that data breaches are becoming a tool of global and geopolitical influence, wielded by motivated state actors, security experts said.

From the Chelsea Manning leak of hundreds of thousands of secret military and diplomatic documents to WikiLeaks in 2010, to the Edward Snowden NSA scandal that in 2013, to North Korean hack of Sony in 2014, what used to be considered a nuisance or an embarrassment has become much more serious.

"One thing that everyone's talking about is a weaponisation of data," said Danny Rogers, chief executive officer of cybersecurity intelligence firm Terbium, which was not involved in the DNC hack investigation.

CNBC
 

« Strategies For A Culture of Cyber-Security
In New Zealand, Hacking Is A Serious Business »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Secure Thingz

Secure Thingz

Secure Thingz focus on developing and delivering advanced security solutions into the emerging Industrial Internet of Things (IIoT) and Critical Infrastructure markets.

Beyond Security

Beyond Security

Beyond Security is a leader in automated vulnerability assessment and compliance solutions - enabling customers to accurately assess and manage security weaknesses in their networks and applications.

NetMotion Software

NetMotion Software

NetMotion Software specializes in mobile performance management solutions to manage, secure and support the mobile enterprise.

EclecticIQ

EclecticIQ

EclecticIQ is a global provider of threat intelligence, hunting and response technology and services.

ASU Online - Information Technology Program

ASU Online - Information Technology Program

The Information Technology program at ASU Online provides you with the expertise to design, select, implement and administer computer-based information solutions.

PSC

PSC

PSC is a leading PCI and PA DSS assessor and Approved Scanning Vendor.

BCS Financial

BCS Financial

BCS Financial delivers financial and insurance solutions. Specialty risk products include Cyber and Privacy Liability insurance.

Recorded Future

Recorded Future

Recorded Future arms security teams with threat intelligence powered by patented machine learning to lower risk.

GuardKnox

GuardKnox

GuardKnox protects the users of connected vehicles against threats that can endanger their physical safety and the safety of their personal information.

FoxGuard Solutions

FoxGuard Solutions

FoxGuard Solutions develops customized cyber security, compliance and industrial computing solutions for critical infrastructure entities and control system vendors.

Information Systems Security Partners (ISSP)

Information Systems Security Partners (ISSP)

ISSP is a specialized system integrator focused on the information security needs of its corporate clients and providing best in class products and services for securing organizational information.

Energia Ventures

Energia Ventures

Energia Ventures is a three-month intensive accelerator for entrepreneurs with an innovative business in the energy, smart grid, cleantech, and cybersecurity sectors.

Founder Shield

Founder Shield

Founder Shield is a data driven insurance brokerage focused excusively on rapidly evolving high-growth companies.

Phoenix Cybersecurity

Phoenix Cybersecurity

Phoenix Cybersecurity Services and Managed Security Services help clients just like you take full advantage of leading cybersecurity technologies and industry best practices.

Forward Networks

Forward Networks

Forward Networks - transforming networks to be more reliable, agile, and secure.

RIIG Technology

RIIG Technology

Our mission is to empower organizations with high-quality, verifiable data and advanced intelligence solutions, ensuring robust security and effective risk management.