Cyber Strikeback: Putin’s Aide Hacked

After a series of leaks of hacked emails belonging to senior member of the Democratic Party and Hillary Clinton’s campaign, recently it was the turn for the disclosure of correspondence belonging to a top aide to Russian President Vladimir Putin. The emails suggest direct political and financial ties with pro-Russian separatists in eastern Ukraine.

Mr Putin has denied any connection to the separatists, whether with military or financial support, despite widespread evidence to the contrary. Fighting has raged in eastern Ukraine for two years, since rebels in the Donetsk region proclaimed their independence from Ukraine and sought to join Russia. Anywhere up to 10,000 people have been killed.

USA Today said a Ukrainian group called Cyber Hunta hacked into the account of an assistant to presidential aide Vladislav Surkov and uploaded more than 2,000 emails this week. Mr Surkov, although under sanctions for his role in the separatist conflict, travelled to Berlin this month with Mr Putin for a summit on Ukraine.  

The hacked emails include a June 2014 list of casualties from the separatist Donetsk People’s Republic (DNR) in eastern Ukraine, sent by then-chairman, Denis Pushilin. Another email listed expenses to set up the DNR’s Ministry of Information.

The leaks followed claims from US intelligence agencies that Russia was responsible for a series of hacks on American officials. Some analysts suggested these new leaks could be a retaliation.

On 16th October, Vice President Biden told NBC that the US would be “sending a message” over the hacking that Mr Putin would recognise.

“He’ll know it,” Mr Biden said. “And it will be at the time of our choosing. And under the circumstances that have the greatest impact.”

Mark Galeotti, senior researcher at the Institute of International Relations in Prague told USA Today that while there was no evidence that the leak was the direct retaliation that Mr Biden had threatened, there was plenty to suggest it was.

“I cannot help but wonder if this is the kind of response that US policymakers have been hinting at, following the various hacks blamed on Russia, either working through Ukrainians or simply handed to them,” he said. “This kind of a leak is enough to warn the Russians that the USA has certain capabilities and is willing to use them. Welcome to the world of proxy cyberwars.”

Kremlin spokesman Dmitry Peskov dismissed the emails as fake in comments to Russian news agencies, saying that Mr Surkov did not use an email. But Ukraine’s National Security Service recently said that the emails were real.

The leak of the emails came as a new poll suggested that most Republicans believe Russia is attempting to influence the US presidential election.

Some 55 per cent of US adults, including 51 per cent of Republicans and 65 per cent of Democrats, said they thought Russia was trying to tip the scales in the election. The Reuters poll said most believe it is trying to help Mr Trump win.

Independent:                 Ukraine Crisis Fits Cyber War Narrative:

« Is Apple Abandoning Macs?
Australian Government Networks Hacked »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Micro Focus

Micro Focus

Micro Focus is one of the world’s largest enterprise software providers. We deliver trusted and proven mission-critical software that keeps the digital world running.

Bundesdruckerei

Bundesdruckerei

Bundesdruckerei specializes in secure identity technologies and services for protecting sensitive data, communications and infrastructures.

X-act Forensics

X-act Forensics

X-act forensics are computer forensic experts with experience in cases of computer fraud, intellectual property theft, and social networking cases.

Carson & SAINT

Carson & SAINT

Carson & SAINT is an award-winning consulting firm with deep experience in cybersecurity technology, software, and management consulting.

Crashtest Security

Crashtest Security

Crashtest Security is a cyber security company that helps digital companies to continuously create secure software with the help of automated vulnerability assessments.

Unlimited Technology

Unlimited Technology

Unlimited Technology offers a wide range of talent and experience, from assessing your requirements to implementing technologically advanced security solutions to best fit your needs.

Cyber Range Solutions (CRS)

Cyber Range Solutions (CRS)

CRS provides cyber security training and improve security team performance by providing a hyper realistic, virtual training environment.

SnapAttack

SnapAttack

SnapAttack is a collaborative platform that empowers your security team to stay ahead of threats, create robust behavioral analytics for your existing tools, and prove your program's effectiveness.

6clicks

6clicks

6clicks is an easy way to implement your risk and compliance program or achieve compliance with ISO 27001, SOC 2, PCI-DSS, HIPAA, NIST, FedRAMP and many other standards.

CyberUSA

CyberUSA

CyberUSA is a collaboration of leaders and states focused on a common mission purpose of enabling innovation, education, workforce development, enhanced cyber readiness and resilience.

Privacy Compliance Hub

Privacy Compliance Hub

Privacy Compliance Hub provide an easy to use platform with a comprehensive data protection compliance programme including training, information, templates and reporting.

Zilla Security

Zilla Security

Zilla combines identity governance with cloud security to deliver comprehensive access visibility, reviews, lifecycle management, and policy-based security remediation.

Fulcrum Technology Solutions

Fulcrum Technology Solutions

The Fulcrum team of technologists are recognized experts in the fields of IT Infrastructure Technology, Security, Service Management and Support.

Cork

Cork

Cork is a purpose-built cyber warranty company for managed service providers (MSPs) serving small businesses (SMBs) and the software solutions they manage.

CBIT Digital Forensics Services (CDFS)

CBIT Digital Forensics Services (CDFS)

CDFS is Australia’s premier supplier of digital forensic tools, industry-embedded training and certification to Law Enforcement, Government, and Corporate Enterprise.

EpicCyber

EpicCyber

Since 2011, Epic Cyber has pioneered the integration of enterprise cloud technology.