Surprise: FBI Say US Political Hacks ‘Probably Was Russia’

At the first 2016 US Presidential election debate with Hilary Clinton, Donald Trump  questioned the widely held belief that Russian intelligence agents were behind the Democratic National Committee hack.

"I don't know if we know it was Russia who broke into the DNC," the Republican presidential candidate said when the first presidential debate turned to the topic of cybersecurity. "She keeps saying 'Russia, Russia, Russia,' and maybe it was. It could be Russia but it could be China, could also be lots of other people. It could be someone sitting on their bed that weighs 400 pounds."

While Trump might not be certain about the source of the attack, the consensus is pretty strong among law enforcement and analysts: Russian intelligence was almost certainly behind it, or at least involved.

Recently, US Director of National Intelligence James Clapper, in his most explicit comments to date, suggested Russia was behind the breach and subsequent leaks, The Wall Street Journal reported. Clapper pointed out that the Russian spies have targeted the US since the 1960s and that the most recent attacks perhaps seem more shocking because they employed cyber-tools.

Also, a cybersecurity firm employed by the DNC to investigate the breach found evidence of two Russian intelligence-affiliated groups present in the DNC network in May.

To be sure, the FBI is still investigating the DNC hack, believed to have taken place over a year-long period, which came to light in April with the publication of leaked emails sufficiently embarrassing and well-timed to force the resignation of key DNC staffers ahead of the Democratic National Convention. 

The White House has tiptoed around blaming Russian President Vladimir Putin directly, citing the ongoing FBI investigation, but President Barack Obama has said cyber-experts implicated Russia in the hack and that Russia stands to benefit from a Trump White House win.

Cybersecurity experts have warned that if in fact Russia is found to be behind the breach and subsequent leaks of information, that infiltration would represent a paradigm shift in cyberwarfare.

"There's been a line that has been crossed, and there has to be some type of response if, indeed, there is a nation-state responsible," said Chris Finan, a former White House cybersecurity director in the Obama administration.

The DNC intrusion is evidence that data breaches are becoming a tool of global and geopolitical influence, wielded by motivated state actors, security experts said.

From the Chelsea Manning leak of hundreds of thousands of secret military and diplomatic documents to WikiLeaks in 2010, to the Edward Snowden NSA scandal that in 2013, to North Korean hack of Sony in 2014, what used to be considered a nuisance or an embarrassment has become much more serious.

"One thing that everyone's talking about is a weaponisation of data," said Danny Rogers, chief executive officer of cybersecurity intelligence firm Terbium, which was not involved in the DNC hack investigation.

CNBC
 

« Strategies For A Culture of Cyber-Security
In New Zealand, Hacking Is A Serious Business »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

PrimeKey

PrimeKey

PrimeKey provides organisations with the ability to implement security solutions such as e-ID, e-Passports, authentication, digital signatures, unified digital identities and validation.

SecureNinja

SecureNinja

SecureNinja provides professional training, certifications & professional services related to all facets of Information Technology and Cyber Security.

Intelligent Business Solutions Cyprus (IBSCY)

Intelligent Business Solutions Cyprus (IBSCY)

IBSCY Ltd is a leading provider of total IT solutions and services in Cyprus specializing in the areas of cloud services and applications, systems integration, IT infrastructure and security.

Gita Technologies

Gita Technologies

Gita Technologies works to create integrated solutions to the thorniest problems in the field of intelligence and cyber today.

URS Certification

URS Certification

United Registrar of Systems (URS Certification) is an independent certification body operating in more than 30 countries within the multinational URS Holdings.

ALTR

ALTR

ALTR provide software-embedded solutions for data security and privacy.

IdentityIQ

IdentityIQ

IdentityIQ is a US-based identity theft and credit protection company designed to help users stay on top identity thieves and data breaches.

CoverWallet

CoverWallet

CoverWallet combines deep analytics, thoughtful design and state of the art technology to help small businesses with all their insurance needs including Cyber Liability.

ForAllSecure

ForAllSecure

ForAllSecure’s mission is to make the world’s software safe by pioneering autonomous cybersecurity tools that automatically find and fix vulnerabilities in run-time executable software.

Cyber Gate Defense (CyberGate)

Cyber Gate Defense (CyberGate)

CyberGate is an Emirati establishment founded with an objective to provide cyber security services that would improve the overarching cyber security posture of the UAE.

US Army Cyber Command (ARCYBER)

US Army Cyber Command (ARCYBER)

US Army’s Cyber Command (ARCYBER) is engaged in the real-world cyberspace fight today, against near-peer adversaries, ISIS, and other global cyber threats.

Red Goat Cyber Security

Red Goat Cyber Security

Red Goat Cyber Security have created excellent, informative and interactive Social Engineering Awareness training which is suitable for all levels of staff.

Verichains

Verichains

Verichains Lab is a pioneer and leading APAC blockchain security firm with extensive expertise in the areas of security, cryptography and core blockchain technology.

Helix Security Services

Helix Security Services

Helix Security provides IT & information security consultancy to government and businesses across New Zealand.

Vertex Cyber Security

Vertex Cyber Security

Vertex provide Cyber Security Services to small to large businesses including Advise, Consulting, Adding Security Partnership, Penetration Testing, ISO 27001-2 and Audits.

Index Engines

Index Engines

Index Engines is the world’s leading AI-powered analytics engine to detect data corruption due to ransomware.