The Biter Bit: Secret Russian Files Are Leaked

A group of transparency advocates released a massive number of hacked and leaked Russian documents on Friday 25th January in what is being viewed as retaliation against Russia's sharing of hacked Democratic National Committee (DNC) emails to influence the 2016 presidential campaign.

The documents, totaling 175 gigabytes in data, were shared on Distributed Denial of Secret's website and on Internet Archive around the same time. The scope of the documents shared is far larger than the total known material Russian officials obtained from the DNC and then-Democratic candidate Hillary Clinton's campaign.  

The collection of material, called "The Dark Side of the Kremlin," includes insider information such as “hundreds of thousands of messages and files from Russian politicians, journalists, oligarchs, religious figures, and nationalists/terrorists in Ukraine,” according to the group that posted the documents.

Special counsel Robert Mueller indicted Russian intelligence members last year for the 2016 hacking of the DNC and former Clinton campaign chairman John Podesta. The Russian government has repeatedly denied hacking the DNC.In a new court filing last week, the DNC said it was also targeted by Russian hackers after the 2018 midterm elections in November. 

A chunk of the documents include material hacked from Russia’s Ministry of Internal Affairs that WikiLeaks did not publish in 2016, saying that it “rejects all submissions that it cannot verify” or that it finds “insignificant.”

Emma Best, a journalist and transparency advocate, told the Times that the posting of the Russian files was not done explicitly as payback for Russia’s 2016 hacks and leaks, but said “it does add some appreciable irony.” 

“Our motive is to collect and make available materials for a subject that was very underexplored, Russian power circles, how they interconnect, their influence operations,” Best said. “People have a cursory understanding of that, but outside of a few experts it hasn’t been looked at in detail and contextualised.” 

Best last year helped organise Distributed Denial of Secrets which hosts thousands of leaked documents from multiple countries, and operates similarly to WikiLeaks.

The Hill:

You Might Also Read:

The Image Of Julian Assange Grows Darker:

« No Brexit Deal? Then Its ‘Digital Dover’
AI Based Security Analytics Is Growing Fast »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

BetterCloud

BetterCloud

BetterCloud puts IT in control of the modern workplace through user lifecycle management, data discovery, and IT and security automation purpose-built for SaaS.

TCDI

TCDI

TCDI specializes in computer forensics, eDiscovery and cybersecurity services.

Secure Soft

Secure Soft

Secure Soft are experts in Computer and Information Security with a presence in Peru, Colombia and Ecuador.

infySEC

infySEC

InfySEC is an information security services organization offering Security Technology services, Security Consulting, Security Training, Research & Development.

Neudomains

Neudomains

Neudomains is a Corporate Domain Name Management and Brand Protection Online Specialist. One of the world's top providers of online brand protection and enforcement.

OpSec Security

OpSec Security

OpSec Online is the only brand protection solution that spans all channels so your brands are protected no matter what digital venue the criminals target.

Dasera

Dasera

Dasera’s Radar and Interceptor products deliver visibility, governance, and protection solutions for data-agile companies.

SecureOps

SecureOps

SecureOps is transforming the Managed Security Service Provider industry by providing tailored cybersecurity solutions proven to protect organizations from cyberattacks.

Great American Insurance Group

Great American Insurance Group

Great American's Cyber Risk Division offers cyber solutions for small and medium-sized businesses.

Nigerian Communications Commission (NCC)

Nigerian Communications Commission (NCC)

NCC has established a CSIRT for the telecommunication industry to provide services and support for the prevention and management of potential cyber security related emergencies.

Nonprofit Cyber

Nonprofit Cyber

Nonprofit Cyber is a first-of-its-kind coalition of global nonprofit organizations to enhance joint action to improve cybersecurity.

The PenTesting Company

The PenTesting Company

The PenTesting Company is owned and operated by offensive security professionals. Penetration Testing is essentially all we do.

Focus on Security

Focus on Security

Focus on Security are Cyber Security recruitment specialists. We’re dedicated to connecting you with the top Cyber Security talent across the globe. We focus on partnerships and results.

ClearSky Cyber Security

ClearSky Cyber Security

ClearSky cyber security provides cyber solutions, focused on threat intelligence services, mainly for the financial sector, critical infrastructure, public sector and the pharma sector.

Lintu Solutions

Lintu Solutions

Lintu Solutions is a trusted provider of comprehensive cybersecurity and enterprise risk management solutions.

Triskele Labs

Triskele Labs

Triskele Labs deliver services including Penetration Testing, Compliance and Risk Management through to 24*7*365 Security Operations and outsourced Cybersecurity Managers.