Surprise: FBI Say US Political Hacks ‘Probably Was Russia’

At the first 2016 US Presidential election debate with Hilary Clinton, Donald Trump  questioned the widely held belief that Russian intelligence agents were behind the Democratic National Committee hack.

"I don't know if we know it was Russia who broke into the DNC," the Republican presidential candidate said when the first presidential debate turned to the topic of cybersecurity. "She keeps saying 'Russia, Russia, Russia,' and maybe it was. It could be Russia but it could be China, could also be lots of other people. It could be someone sitting on their bed that weighs 400 pounds."

While Trump might not be certain about the source of the attack, the consensus is pretty strong among law enforcement and analysts: Russian intelligence was almost certainly behind it, or at least involved.

Recently, US Director of National Intelligence James Clapper, in his most explicit comments to date, suggested Russia was behind the breach and subsequent leaks, The Wall Street Journal reported. Clapper pointed out that the Russian spies have targeted the US since the 1960s and that the most recent attacks perhaps seem more shocking because they employed cyber-tools.

Also, a cybersecurity firm employed by the DNC to investigate the breach found evidence of two Russian intelligence-affiliated groups present in the DNC network in May.

To be sure, the FBI is still investigating the DNC hack, believed to have taken place over a year-long period, which came to light in April with the publication of leaked emails sufficiently embarrassing and well-timed to force the resignation of key DNC staffers ahead of the Democratic National Convention. 

The White House has tiptoed around blaming Russian President Vladimir Putin directly, citing the ongoing FBI investigation, but President Barack Obama has said cyber-experts implicated Russia in the hack and that Russia stands to benefit from a Trump White House win.

Cybersecurity experts have warned that if in fact Russia is found to be behind the breach and subsequent leaks of information, that infiltration would represent a paradigm shift in cyberwarfare.

"There's been a line that has been crossed, and there has to be some type of response if, indeed, there is a nation-state responsible," said Chris Finan, a former White House cybersecurity director in the Obama administration.

The DNC intrusion is evidence that data breaches are becoming a tool of global and geopolitical influence, wielded by motivated state actors, security experts said.

From the Chelsea Manning leak of hundreds of thousands of secret military and diplomatic documents to WikiLeaks in 2010, to the Edward Snowden NSA scandal that in 2013, to North Korean hack of Sony in 2014, what used to be considered a nuisance or an embarrassment has become much more serious.

"One thing that everyone's talking about is a weaponisation of data," said Danny Rogers, chief executive officer of cybersecurity intelligence firm Terbium, which was not involved in the DNC hack investigation.

CNBC
 

« Strategies For A Culture of Cyber-Security
In New Zealand, Hacking Is A Serious Business »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

CloudEndure

CloudEndure

CloudEndure offers Disaster Recovery and Continuous Replication for the Cloud.

CalCom

CalCom

CalCom Hardening Solution (CHS) for Microsoft OMS is a security baseline-hardening solution designed to address the needs of IT operations and security teams.

Maximus Consulting (MX)

Maximus Consulting (MX)

Maximus designs and delivers corporate-wide information security management system with our full-time IRCA Accredited consulting team.

Forgepoint Capital

Forgepoint Capital

ForgePoint Capital is a premier venture investor for early stage cybersecurity companies.

Andreessen Horowitz (a16z)

Andreessen Horowitz (a16z)

Andreessen Horowitz (known as "a16z") is a venture capital firm in Silicon Valley, California that backs bold entrepreneurs building the future through technology.

CyberEdBoard

CyberEdBoard

CyberEdBoard is a private, peer-to-peer education and networking community focused on cybersecurity, technology, business processes and risk management.

Hunter Strategy

Hunter Strategy

Hunter Strategy focuses on delivering solutions that are concise, scalable, and target our customer’s complex technical challenges.

Palmchip

Palmchip

Palmchip is a Cyber Security, SOC and Software consulting company. We design and develop high performance and secure applications.

r00tz Asylum

r00tz Asylum

r00tz Asylum is a nonprofit dedicated to teaching kids around the world how to love being white-hat hackers.

Larsen & Toubro Infotech (LTI)

Larsen & Toubro Infotech (LTI)

LTI is a global technology consulting and digital solutions company with operations in 33 countries.

Brightsolid

Brightsolid

Brightsolid are experts in Hybrid Cloud. We design, build and manage secure, scalable cloud environments that meet customers’ business ambitions.

Pangu Laboratory

Pangu Laboratory

Beijing Qi an Pangu Laboratory Technology Co., Ltd. was established on the basis of Pangu laboratory, a well-known cyber security team.

Ontinue

Ontinue

Ontinue ION is an MXDR service that provides Nonstop SecOps through five key capabilities that enable your organization to respond to attacks and continuously reduce risk.

OneStep Group

OneStep Group

OneStep Group are a leading Australian provider of information and communications technology (ICT) services, connecting businesses through technology solutions and support.

Wired Assurance

Wired Assurance

Wired Assurance is a testing and assurance company, specialized in software applications and blockchain smart contracts.

CyberHive

CyberHive

CyberHive offer a complete suite of threat protection modules that seamlessly integrate to block current, as well as future threats.