Surprise: FBI Say US Political Hacks ‘Probably Was Russia’

At the first 2016 US Presidential election debate with Hilary Clinton, Donald Trump  questioned the widely held belief that Russian intelligence agents were behind the Democratic National Committee hack.

"I don't know if we know it was Russia who broke into the DNC," the Republican presidential candidate said when the first presidential debate turned to the topic of cybersecurity. "She keeps saying 'Russia, Russia, Russia,' and maybe it was. It could be Russia but it could be China, could also be lots of other people. It could be someone sitting on their bed that weighs 400 pounds."

While Trump might not be certain about the source of the attack, the consensus is pretty strong among law enforcement and analysts: Russian intelligence was almost certainly behind it, or at least involved.

Recently, US Director of National Intelligence James Clapper, in his most explicit comments to date, suggested Russia was behind the breach and subsequent leaks, The Wall Street Journal reported. Clapper pointed out that the Russian spies have targeted the US since the 1960s and that the most recent attacks perhaps seem more shocking because they employed cyber-tools.

Also, a cybersecurity firm employed by the DNC to investigate the breach found evidence of two Russian intelligence-affiliated groups present in the DNC network in May.

To be sure, the FBI is still investigating the DNC hack, believed to have taken place over a year-long period, which came to light in April with the publication of leaked emails sufficiently embarrassing and well-timed to force the resignation of key DNC staffers ahead of the Democratic National Convention. 

The White House has tiptoed around blaming Russian President Vladimir Putin directly, citing the ongoing FBI investigation, but President Barack Obama has said cyber-experts implicated Russia in the hack and that Russia stands to benefit from a Trump White House win.

Cybersecurity experts have warned that if in fact Russia is found to be behind the breach and subsequent leaks of information, that infiltration would represent a paradigm shift in cyberwarfare.

"There's been a line that has been crossed, and there has to be some type of response if, indeed, there is a nation-state responsible," said Chris Finan, a former White House cybersecurity director in the Obama administration.

The DNC intrusion is evidence that data breaches are becoming a tool of global and geopolitical influence, wielded by motivated state actors, security experts said.

From the Chelsea Manning leak of hundreds of thousands of secret military and diplomatic documents to WikiLeaks in 2010, to the Edward Snowden NSA scandal that in 2013, to North Korean hack of Sony in 2014, what used to be considered a nuisance or an embarrassment has become much more serious.

"One thing that everyone's talking about is a weaponisation of data," said Danny Rogers, chief executive officer of cybersecurity intelligence firm Terbium, which was not involved in the DNC hack investigation.

CNBC
 

« Strategies For A Culture of Cyber-Security
In New Zealand, Hacking Is A Serious Business »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

WEBINAR: 2024 and Beyond: Top Six Cloud Security Trends

WEBINAR: 2024 and Beyond: Top Six Cloud Security Trends

April 4, 2024 | 11:00 AM PT: Join this webinar to find out about six emerging trends dominating the cloud cybersecurity landscape.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

ExaGrid Systems

ExaGrid Systems

ExaGrid provides Tiered Backup Storage with a unique disk-cache Landing Zone, long-term retention repository, and scale-out architecture.

Robert Half Technology

Robert Half Technology

Robert Half Technology offers a full spectrum of technology staffing solutions to meet contract and full-time IT recruitment needs.

NRI Secure Technologies

NRI Secure Technologies

NRI SecureTechnologies is a Cybersecurity group company of the Nomura Research Institute (NRI) and a global provider of next-generation Managed Security Services and Security Consulting.

Privitar

Privitar

Privitar is leading the development and adoption of privacy engineering technology enabling our customers to innovate and leverage data with an uncompromising approach to data privacy.

HCL Technologies

HCL Technologies

HCL offer an integrated portfolio of products, solutions and services built around Digital, IoT, Cloud, Automation, Cybersecurity, Analytics, Infrastructure Management and Engineering Services.

Wizlynx PTE LTD

Wizlynx PTE LTD

Wizlynx PTE LTD is the Singapore branch of Wizlynx Group located in Singapore, offering Information and Cyber Security Services throughout the entire Asia Pacific (APAC) region.

CybExer Technologies

CybExer Technologies

CybExer provide an on-premise, easily deployable solution for complex technical cyber security exercises based on experience in military grade ranges.

Anitian

Anitian

The Anitian Compliance Automation platform builds, configures, and monitors cloud environments to accelerate compliance for standards such as FedRAMP, PCI, ISO/GDPR and CJIS.

Lumu Technologies

Lumu Technologies

Lumu is a cybersecurity company that illuminates threats and attacks affecting enterprises worldwide.

ForAllSecure

ForAllSecure

ForAllSecure’s mission is to make the world’s software safe by pioneering autonomous cybersecurity tools that automatically find and fix vulnerabilities in run-time executable software.

Q6 Cyber

Q6 Cyber

Q6 Cyber is an innovative threat intelligence company collecting targeted and actionable threat intelligence related to cyber attacks, fraud activity, and existing data breaches.

Research Institute in Secure Hardware and Embedded Systems (RISE)

Research Institute in Secure Hardware and Embedded Systems (RISE)

The UK Research Institute in Secure Hardware and Embedded Systems (RISE) seeks to identify and address key issues that underpin our understanding of Hardware Security.

Bit Sentinel

Bit Sentinel

Bit Sentinel is an information security company. We help companies like yours discover, prioritize, and effectively remediate potential cybersecurity risks.

Security Compliance Associates (SCA)

Security Compliance Associates (SCA)

The sole focus of SCA is safeguarding critical information and complying with information security regulations.

Evervault

Evervault

Evervault provides engineers easy solutions to complex data security and compliance problems.

Astreya

Astreya

Astreya is the leading IT solutions provider for some of the world's most recognizable and innovative organizations.