Surprise: FBI Say US Political Hacks ‘Probably Was Russia’

At the first 2016 US Presidential election debate with Hilary Clinton, Donald Trump  questioned the widely held belief that Russian intelligence agents were behind the Democratic National Committee hack.

"I don't know if we know it was Russia who broke into the DNC," the Republican presidential candidate said when the first presidential debate turned to the topic of cybersecurity. "She keeps saying 'Russia, Russia, Russia,' and maybe it was. It could be Russia but it could be China, could also be lots of other people. It could be someone sitting on their bed that weighs 400 pounds."

While Trump might not be certain about the source of the attack, the consensus is pretty strong among law enforcement and analysts: Russian intelligence was almost certainly behind it, or at least involved.

Recently, US Director of National Intelligence James Clapper, in his most explicit comments to date, suggested Russia was behind the breach and subsequent leaks, The Wall Street Journal reported. Clapper pointed out that the Russian spies have targeted the US since the 1960s and that the most recent attacks perhaps seem more shocking because they employed cyber-tools.

Also, a cybersecurity firm employed by the DNC to investigate the breach found evidence of two Russian intelligence-affiliated groups present in the DNC network in May.

To be sure, the FBI is still investigating the DNC hack, believed to have taken place over a year-long period, which came to light in April with the publication of leaked emails sufficiently embarrassing and well-timed to force the resignation of key DNC staffers ahead of the Democratic National Convention. 

The White House has tiptoed around blaming Russian President Vladimir Putin directly, citing the ongoing FBI investigation, but President Barack Obama has said cyber-experts implicated Russia in the hack and that Russia stands to benefit from a Trump White House win.

Cybersecurity experts have warned that if in fact Russia is found to be behind the breach and subsequent leaks of information, that infiltration would represent a paradigm shift in cyberwarfare.

"There's been a line that has been crossed, and there has to be some type of response if, indeed, there is a nation-state responsible," said Chris Finan, a former White House cybersecurity director in the Obama administration.

The DNC intrusion is evidence that data breaches are becoming a tool of global and geopolitical influence, wielded by motivated state actors, security experts said.

From the Chelsea Manning leak of hundreds of thousands of secret military and diplomatic documents to WikiLeaks in 2010, to the Edward Snowden NSA scandal that in 2013, to North Korean hack of Sony in 2014, what used to be considered a nuisance or an embarrassment has become much more serious.

"One thing that everyone's talking about is a weaponisation of data," said Danny Rogers, chief executive officer of cybersecurity intelligence firm Terbium, which was not involved in the DNC hack investigation.

CNBC
 

« Strategies For A Culture of Cyber-Security
In New Zealand, Hacking Is A Serious Business »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Infosecurity Europe

Infosecurity Europe

Infosecurity Europe is Europe’s number one information security conference and exhibition.

Security Brigade

Security Brigade

Security Brigade is an information security firm specializing in Penetration Testing, Vulnerability Assessment, Web-application Security and Source Code Security Audit.

Nethemba

Nethemba

Nethemba provide pentesting and security audits for networks and web applications. Other services include digital forensics, training and consultancy.

Keyfactor

Keyfactor

Keyfactor is a leader in cloud-first PKI as-a-Service and crypto-agility solutions. Our Crypto-Agility Platform seamlessly orchestrates every key and certificate across the enterprise.

Jetico

Jetico

Jetico provides pure & simple data protection software for all sensitive information throughout the lifecycle. Solutions include data encryption and secure data erasure.

Vanbreda

Vanbreda

Vanbreda Risk & Benefits is the largest independent insurance broker and risk consultant in Belgium and the leading insurance partner in the Benelux.

Hut Six Security

Hut Six Security

Train, test and track your Information Security culture through information security awareness training and customised phishing simulation campaigns.

AUTOCRYPT

AUTOCRYPT

AUTOCRYPT is a mobility security provider dedicated to the safety of future transportation

Elpha Secure

Elpha Secure

Elpha Secure provides a comprehensive cybersecurity solution, combining technology and insurance to protect against cyber threats.

Acceptto

Acceptto

Acceptto offers the first unified and continuous authentication identity access platform with No-Password.

Melius Cyber Security

Melius Cyber Security

Melius Cyber Security has developed a world-leading SaaS platform, Cyber Safe Plus, built around continuous assessment and improvement through vulnerability scanning and penetration testing

Sevco Security

Sevco Security

Sevco Delivers Real-time Asset Intelligence to Identify and Close Unknown Security Gaps.

Menaya

Menaya

Menaya provide Ethical Hackers for leading companies while also providing cyber security solutions to help major infrastructures protect against cyber crime.

CloudWave

CloudWave

CloudWave, the expert in healthcare data security, provides cloud, cybersecurity, and managed services to healthcare organizations.

Casepoint

Casepoint

Casepoint is the legal technology platform of choice for corporations, government agencies, and law firms to meet their complex eDiscovery, investigations, and compliance needs.

Seal Security

Seal Security

Seal Security revolutionizes software supply chain security operations, empowering organizations to automate and scale their open source vulnerability remediation and patch management.