The Biter Bit: Secret Russian Files Are Leaked

A group of transparency advocates released a massive number of hacked and leaked Russian documents on Friday 25th January in what is being viewed as retaliation against Russia's sharing of hacked Democratic National Committee (DNC) emails to influence the 2016 presidential campaign.

The documents, totaling 175 gigabytes in data, were shared on Distributed Denial of Secret's website and on Internet Archive around the same time. The scope of the documents shared is far larger than the total known material Russian officials obtained from the DNC and then-Democratic candidate Hillary Clinton's campaign.  

The collection of material, called "The Dark Side of the Kremlin," includes insider information such as “hundreds of thousands of messages and files from Russian politicians, journalists, oligarchs, religious figures, and nationalists/terrorists in Ukraine,” according to the group that posted the documents.

Special counsel Robert Mueller indicted Russian intelligence members last year for the 2016 hacking of the DNC and former Clinton campaign chairman John Podesta. The Russian government has repeatedly denied hacking the DNC.In a new court filing last week, the DNC said it was also targeted by Russian hackers after the 2018 midterm elections in November. 

A chunk of the documents include material hacked from Russia’s Ministry of Internal Affairs that WikiLeaks did not publish in 2016, saying that it “rejects all submissions that it cannot verify” or that it finds “insignificant.”

Emma Best, a journalist and transparency advocate, told the Times that the posting of the Russian files was not done explicitly as payback for Russia’s 2016 hacks and leaks, but said “it does add some appreciable irony.” 

“Our motive is to collect and make available materials for a subject that was very underexplored, Russian power circles, how they interconnect, their influence operations,” Best said. “People have a cursory understanding of that, but outside of a few experts it hasn’t been looked at in detail and contextualised.” 

Best last year helped organise Distributed Denial of Secrets which hosts thousands of leaked documents from multiple countries, and operates similarly to WikiLeaks.

The Hill:

You Might Also Read:

The Image Of Julian Assange Grows Darker:

« No Brexit Deal? Then Its ‘Digital Dover’
AI Based Security Analytics Is Growing Fast »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Wizard Computing

Wizard Computing

Wizard Computer Services is a full service IT solutions provider that offers managed services, consultation, installation, and support to small and large businesses in New England.

Quttera

Quttera

Quttera provides Website Security Solutions for Small & Medium Businesses, Enterprises and Organizations.

Venafi

Venafi

Venafi is a world-class cyber-security company dedicated to protecting machine identities for our hyper-connected digital economy.

Black Kite

Black Kite

Black Kite (formerly NormShield) provides comprehensive Security-as-a-Service solutions focused on cyber threat intelligence, vulnerability management and continuous perimeter monitoring.

Axiad IDS

Axiad IDS

Axiad IDS is a Trusted Identity solutions provider for enterprise, government and financial organizations.

LEPL Cyber ​​Security Bureau - Georgia

LEPL Cyber ​​Security Bureau - Georgia

The aim of the LEPL Cyber Security Bureau is to create and strengthen stable, efficient and secure systems of information and communications technologies.

Securis

Securis

Securis provides organizations and agencies with the highest level of professional, ultra-secure data destruction and IT recycling.

Camel Secure

Camel Secure

Camel Secure is a company specialized in the development of products for information security and technology risk management.

Datastream Cyber Insurance

Datastream Cyber Insurance

DataStream Cyber Insurance is designed to give SMB’s across the US greater confidence in the face of increasing cyber attacks against the small and medium business community.

Techstep

Techstep

Techstep is a complete mobile technology enabler, making positive changes to the world of work; freeing people to work more effectively, securely and sustainably.

CodeLock

CodeLock

Codelock is a patent-pending solution that continuously provides software security at the code level, while providing advanced management insights with performance metrics and data analytics.

Druva

Druva

Druva is the industry’s leading SaaS platform for data resiliency, and the only vendor to ensure data protection across the most common data risks backed by a $10m guarantee.

Zluri

Zluri

Zluri is a cloud-native SaaSOps platform enabling modern enterprises with SaaS Management and Identity Governance.

Inholo

Inholo

Inholo offers tools to manage the risks of synthetic realities, starting with an AI-photo detection service.

TeKnowledge

TeKnowledge

TeKnowledge enables governments and enterprises around the world to navigate the challenges with digital transformation today and tomorrow with elite cybersecurity protection and managed services.

Chorus

Chorus

Chorus are a leading Managed Security Service Provider (MSSP), and member of the Microsoft Intelligent Security Association (MISA), with three Microsoft Advanced Specialisations in security.