Hackers Targeting Both Trump & Biden Presidential Campaigns

Four years after Russian hackers went into the email accounts of prominent Democrats ahead of the 2016 election, Google has now confirmed that foreign adversaries are still cyber attacking accounts.

State-backed hackers from China have targeted employees working on the US presidential campaign of Joe Biden, a senior Google security official said and it now it appears that foreign hackers targeted the personal email accounts of staffers on the presidential campaigns of Democratic primary candidate Joe Biden and President Donald Trump. 

The announcement, made on Twitter by the head of Google’s Threat Analysis Group, Shane Huntley, is the latest indication of the digital spying routinely aimed at top politicians.

It appears that state-backed hackers from China tried to target staffers on the Biden campaign, while Iranian hackers targeted the email accounts of Trump campaign staff. 

Shane Huntley tweeted that the hackers had made phishing attempts on campaign staff emails:  ‘Recently TAG saw China APT group targeting Biden campaign staff & Iran APT targeting Trump campaign staff with phishing. No sign of compromise. We sent users our government attack warning and we referred to fed law enforcement.’ A Google spokesperson has said that they had not seen evidence that any of the attempted attacks had been successful and they have now sent the information to federal law enforcement officials. 

A spokesperson for the Trump campaign told reporters that said it had been “briefed that foreign actors unsuccessfully attempted to breach the technology of our staff. We are vigilant about cybersecurity and do not discuss any of our precautions.”

Both camapaign organisations say they are aware of phishing attempts on campiagn workers and have been preparing to withstand hacking attempts.  

NPR:         Reuters:        The Verge:      

You Might Also Read: 

Hackers Came, But the French Were Prepared:

 

« Stanford University Offers The Best US Cyber Security Degree
Britain Turns To AI To Counter Espionage »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

BackupVault

BackupVault

BackupVault is a leading provider of completely automatic, fully encrypted online, cloud backup.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

CS Risk Management

CS Risk Management

CS Risk Management is a cyber security and risk management consultancy. Specialists in compliance, data protection & risk management.

NCX Group

NCX Group

NCX Group is an Information Risk Management Firm, specializing in Information Security, Business Continuity, Incident Response & Security as a Service

Celestya

Celestya

Celestya is dedicated to providing the most advanced and cost effective systems for human behavior education on cybersecurity awareness training.

Enosys Solutions

Enosys Solutions

Enosys Solutions is an IT security specialist with a skilled professional services team and 24x7 security operations centre servicing corporate and public sector organisations across Australia.

Irdeto

Irdeto

Irdeto is the world leader in digital platform security, protecting platforms and applications for media & entertainment, gaming, connected transport and IoT connected industries.

Montimage

Montimage

Montimage develops tools for testing and monitoring networks, applications and services; in particular, for the verification of functional, performance (QoS/QoE) and security aspects.

Fischer Identity

Fischer Identity

Fischer Identity provide identity & access management and identity governance administration solutions.

CS3STHLM

CS3STHLM

CS3STHLM is the Stockholm international summit on Cyber Security in SCADA and Industrial Control Systems.

German Israeli Partnership Accelerator (GIPA)

German Israeli Partnership Accelerator (GIPA)

GIPA is based on two pillars: it is an incubator aimed at young academics and a program to transfer cybersecurity expertise to corporate partners.

Trust Stamp

Trust Stamp

Trust Stamp provide Identity and Trust as a Service to answer two fundamental questions: “Who are you?” and “Do I trust you?"

SEMNet

SEMNet

SEMNet is an IT solutions provider and an infrastructure and security consulting firm.

Wisetek

Wisetek

Wisetek is a global provider of end-to-end IT Asset Disposition (ITAD), reuse and secure data destruction management services to the world’s leading IT Corporations, data centres and manufacturers.

Cyber Readiness Institute (CRI)

Cyber Readiness Institute (CRI)

At the Cyber Readiness Institute, our mission is simple: empower small and medium-sized enterprises with free tools and resources to help them become more secure and resilient.

Alias

Alias

Alias (previously known as Alias Forensics) provide penetration testing, vulnerability assessments, incident response and security consulting services.

Anonomatic

Anonomatic

Anonomatic’s mission is to make data privacy secure, simple and cost effective. We are Data and Privacy Experts who are passionate about helping organizations solve PII compliance.

Polygraph

Polygraph

Polygraph monitors the activities of click fraud gangs, including how they operate, who they target, the techniques they use, and how to detect their fraud.