The Biter Bit: Secret Russian Files Are Leaked

A group of transparency advocates released a massive number of hacked and leaked Russian documents on Friday 25th January in what is being viewed as retaliation against Russia's sharing of hacked Democratic National Committee (DNC) emails to influence the 2016 presidential campaign.

The documents, totaling 175 gigabytes in data, were shared on Distributed Denial of Secret's website and on Internet Archive around the same time. The scope of the documents shared is far larger than the total known material Russian officials obtained from the DNC and then-Democratic candidate Hillary Clinton's campaign.  

The collection of material, called "The Dark Side of the Kremlin," includes insider information such as “hundreds of thousands of messages and files from Russian politicians, journalists, oligarchs, religious figures, and nationalists/terrorists in Ukraine,” according to the group that posted the documents.

Special counsel Robert Mueller indicted Russian intelligence members last year for the 2016 hacking of the DNC and former Clinton campaign chairman John Podesta. The Russian government has repeatedly denied hacking the DNC.In a new court filing last week, the DNC said it was also targeted by Russian hackers after the 2018 midterm elections in November. 

A chunk of the documents include material hacked from Russia’s Ministry of Internal Affairs that WikiLeaks did not publish in 2016, saying that it “rejects all submissions that it cannot verify” or that it finds “insignificant.”

Emma Best, a journalist and transparency advocate, told the Times that the posting of the Russian files was not done explicitly as payback for Russia’s 2016 hacks and leaks, but said “it does add some appreciable irony.” 

“Our motive is to collect and make available materials for a subject that was very underexplored, Russian power circles, how they interconnect, their influence operations,” Best said. “People have a cursory understanding of that, but outside of a few experts it hasn’t been looked at in detail and contextualised.” 

Best last year helped organise Distributed Denial of Secrets which hosts thousands of leaked documents from multiple countries, and operates similarly to WikiLeaks.

The Hill:

You Might Also Read:

The Image Of Julian Assange Grows Darker:

« No Brexit Deal? Then Its ‘Digital Dover’
AI Based Security Analytics Is Growing Fast »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

CSIRT Malta

CSIRT Malta

CSIRT Malta supports critical infrastructure organisations in Malta on how to protect their information infrastructure assets and systems from cyber threats and incidents.

BMS Group

BMS Group

BMS is an independent, employee-owned specialist insurance broking group. Broking solutions include Cyber and Technology.

Cybrary

Cybrary

Cybrary is an open-source cyber security and IT learning and certification preparation platform.

ECS

ECS

ECS is a leading information technology provider delivering cloud, cybersecurity, software development, IT modernization, and advanced science and engineering services.

Rayzone Group

Rayzone Group

Rayzone Group offers a wide range of Cyber Security solutions and services, providing hollistic protection suitable for both enterprises and National cyber security centers.

Automation Workz

Automation Workz

Automation Workz has been ranked as a top 10 Cybersecurity Bootcamp in the US by Career Karma.

Alpha Mountain AI (alphaMountain)

Alpha Mountain AI (alphaMountain)

alphaMountain provides up-to-date domain and IP intelligence for cybersecurity investigational and protection platforms.

Prancer

Prancer

Prancer is the industry's first cloud-native, self-service SAAS platform for automated security validation and penetration testing in the cloud.

ClearShark

ClearShark

Since 2001, ClearShark has been a go-to adviser in the U.S. Public Sector for creating customized and integrated solutions for the most secure of networks.

Access Venture Partners

Access Venture Partners

Access Venture Partners are an early stage VC firm investing in bold founders and helping every step of the way. Areas we give special focus to include cybersecurity.

coc00n

coc00n

coc00n secures the devices of high-value and high-interest individuals against cyber attacks.

Box

Box

Box is the Cloud Content Management company that empowers enterprises to revolutionize how they work by securely connecting their people, information and applications.

ERCOM

ERCOM

Ercom, a subsidiary of the Thales Group, is a French company known for its mobility security solutions.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

5S Technologies

5S Technologies

5S Technologies is a regional IT solutions and services provider based in Cary, NC and serving the Carolinas.

AKIPS

AKIPS

AKIPS develops the world's most scalable network and infrastructure monitoring software, delivered as a turn-key software appliance.