Trump Campaign Emails Hacked

Former President Donald Trump’s campaign spokesman has claimed that  some of its internal communications had been hacked, blaming the Iranian government. He did not, however, provide direct evidence. 

This statement follows a Microsoft report detailing foreign agents’ attempts to interfere in US campaign. Microsoft has reported that the Trump campaign was targeted and a person going by the name “Robert” was emailing internal Trump campaign materials to news organisations in July.

Speaking at at the recent DEF CON security conference in Las Vegas Rob Joyce, the former National Security Agency director of cyber security commented that “we are in a cycle again, with hack and leak already starting.”

US intelligence officials said in July that Iran was one of several countries seeking to either influence or interfere in national elections, alongside Russia and China. Joyce told the DEF CON audience that he would not speculate on who was behind the campaign and had no inside information, but noted that Iran, Russia, and China have all engaged in election interference operations. 

Microsoft’s Threat Analysis Center said that hackers connected to Iran’s Islamic Revolutionary Guard Corps (IRGC) sent a phishing email to a high-ranking official on a presidential campaign from the compromised account of a former senior adviser. 

According to a report from Google, the hacking group APT42, also known as Charming Kitten, has been carrying out these cyberattacks since May. APT42's methods involve sending phishing emails with malicious links or infected PDF attachments, making it difficult for users to detect the threat.

Google’s report reveals that at least one of these attacks successfully compromised the email account of a well-known political advisor.

These reports are set against a background in which government agencies around the world have experienced a significant increase in cyber attacks last year. Notably, there was a 38% increase in malware, 51% in ransomware and a whacking 629% increase in encrypted threats. 

Executive VP of EMEA, Spencer Starkey at  SonicWall commented “The cyber battleground continues to expand... These cyberattacks raise concerns about a country’s own national security, critical national infrastructure as well as the safety of sensitive information."

Protecting government networks relies on constant communication and cooperation, working together with the private sector and imposing strict punishments, to deter future attacks, according to Starkey.

Following the recent assassination attempt on Trump, reports have emerged that a threat from Iran prompted the Secret Service to increase the ex-President's protection prior to the failed  attempt. It is not known if this is related to the Pennsylvania shooting.

This an echo of the controversy over Hilary Clinton's failed  campaign in 2016 and Joe Biden's successful Presidential bid in 2020, when hackers from Russia were suspected of intercepting campaign emails. 

Google   |   Microsoft   |   SonicWall   |   APNews   |    Politico   |     Cyberscoop   |   Guardian   |    ABC   |   

Irish Times   

Image: hoekstrarogier

You Might Also Read: 

Elections 2024 - Fake News & Misinformation [extract]:


If you like this website and use the comprehensive 7,000-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible




 

« EU Regulators Threaten To Prosecute Elon Musk
Business Identity Theft: Saving The Digital World From Fake Businesses »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Social-Engineer Inc

Social-Engineer Inc

Social-Engineer is a consulting and training company specializing in the science of social engineering in the context of digital security.

SecurityMetrics

SecurityMetrics

SecurityMetrics is leader in data security, PCI, and HIPAA compliance solutions

Kent Interdisciplinary Research Centre in Cyber Security (KirCCS) - University of Kent

Kent Interdisciplinary Research Centre in Cyber Security (KirCCS) - University of Kent

KirCCS harnesses expertise across Kent University to address current and potential cyber security challenges.

Avatu

Avatu

Avatu specialise in providing clients the advice, technology and tools they need to fight cyber and insider threats.

iLand

iLand

iland is a global cloud service provider of secure and compliant hosting for infrastructure (IaaS), disaster recovery (DRaaS), and backup as a service (BaaS).

EY Advisory

EY Advisory

EY is a multinational professional services firm headquartered in the UK. EY Advisory service areas include Cybersecurity.

Matta

Matta

Matta is a cyber security consulting company providing information security services and solutions including vulnerability assessments, penetration testing and emergency response.

Vector InfoTech

Vector InfoTech

Vector InfoTech is a leader in Industrial Security, Networks, IT and Telecommunications.

BehavioSec

BehavioSec

BehavioSec uses the way your customers type, swipe, and hold their devices, and enables them to authenticate themselves through their own behavior patterns.

Firedome

Firedome

Firedome's tailormade solution for IoT companies is designed to proactively prevent, detect, and respond to inevitable vulnerabilities in connected devices.

Base Cyber Security

Base Cyber Security

Base Cyber Security is an information and cyber security talent service provider and career specialist.

PreEmptive Solutions

PreEmptive Solutions

PreEmptive Protection hit the sweet spot between cost, convenience and functionality by helping you protect and secure your apps in a smarter way.

CentricalCyber

CentricalCyber

CentricalCyber is a cyber risk consultancy and NIST CSF specialist set up to help business leaders better understand and manage cyber risk.

R-Tech

R-Tech

R-Tech GmbH manages the digital start-up initiative, whose goal is to build a sustainable start-up culture in the field of digitization throughout the Upper Palatinate district of Bavaria.

Prescient Solutions

Prescient Solutions

Prescient Solutions is a managed services provider, using a cloud-based model to provide IT solutions to small, mid-sized, global organizations and government entities.

Deloitte

Deloitte

Deloitte is a multinational professional services firm providing audit, consulting, financial advisory, risk management, tax, and related services to clients.

Metrics that Matter (MTM)

Metrics that Matter (MTM)

Metrics that Matter redefines how organizations approach cybersecurity by offering unprecedented insight into the value of their assets to criminals and tailored action plans to protect.