Trump Campaign Emails Hacked

Former President Donald Trump’s campaign spokesman has claimed that  some of its internal communications had been hacked, blaming the Iranian government. He did not, however, provide direct evidence. 

This statement follows a Microsoft report detailing foreign agents’ attempts to interfere in US campaign. Microsoft has reported that the Trump campaign was targeted and a person going by the name “Robert” was emailing internal Trump campaign materials to news organisations in July.

Speaking at at the recent DEF CON security conference in Las Vegas Rob Joyce, the former National Security Agency director of cyber security commented that “we are in a cycle again, with hack and leak already starting.”

US intelligence officials said in July that Iran was one of several countries seeking to either influence or interfere in national elections, alongside Russia and China. Joyce told the DEF CON audience that he would not speculate on who was behind the campaign and had no inside information, but noted that Iran, Russia, and China have all engaged in election interference operations. 

Microsoft’s Threat Analysis Center said that hackers connected to Iran’s Islamic Revolutionary Guard Corps (IRGC) sent a phishing email to a high-ranking official on a presidential campaign from the compromised account of a former senior adviser. 

According to a report from Google, the hacking group APT42, also known as Charming Kitten, has been carrying out these cyberattacks since May. APT42's methods involve sending phishing emails with malicious links or infected PDF attachments, making it difficult for users to detect the threat.

Google’s report reveals that at least one of these attacks successfully compromised the email account of a well-known political advisor.

These reports are set against a background in which government agencies around the world have experienced a significant increase in cyber attacks last year. Notably, there was a 38% increase in malware, 51% in ransomware and a whacking 629% increase in encrypted threats. 

Executive VP of EMEA, Spencer Starkey at  SonicWall commented “The cyber battleground continues to expand... These cyberattacks raise concerns about a country’s own national security, critical national infrastructure as well as the safety of sensitive information."

Protecting government networks relies on constant communication and cooperation, working together with the private sector and imposing strict punishments, to deter future attacks, according to Starkey.

Following the recent assassination attempt on Trump, reports have emerged that a threat from Iran prompted the Secret Service to increase the ex-President's protection prior to the failed  attempt. It is not known if this is related to the Pennsylvania shooting.

This an echo of the controversy over Hilary Clinton's failed  campaign in 2016 and Joe Biden's successful Presidential bid in 2020, when hackers from Russia were suspected of intercepting campaign emails. 

Google   |   Microsoft   |   SonicWall   |   APNews   |    Politico   |     Cyberscoop   |   Guardian   |    ABC   |   

Irish Times   

Image: hoekstrarogier

You Might Also Read: 

Elections 2024 - Fake News & Misinformation [extract]:


If you like this website and use the comprehensive 7,000-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible




 

« EU Regulators Threaten To Prosecute Elon Musk
Business Identity Theft: Saving The Digital World From Fake Businesses »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Logpoint

Logpoint

Logpoint is a creator of innovative security platforms to empower security teams in accelerating threat detection, investigation and response with a consolidated tech stack.

Backup Systems

Backup Systems

Backup Systems is a leading backup and disaster recovery systems provider across the UK.

Jumpsec

Jumpsec

Jumpsec provides penetration testing, security assessments, social engineering testing, cyber incident response, training and consultancy services.

RedSeal

RedSeal

RedSeal’s network modeling and risk scoring platform is the foundation for enabling enterprise networks to be resilient to cyber events.

Cellopoint

Cellopoint

Cellopoint is a leading manufacturer of information security and email lifecycle management (ELM) products.

HCC Embedded

HCC Embedded

HCC’s mission is to ensure that data stored or communicated by an embedded IoT application is secure, safe and reliable.

CyberSaint Security

CyberSaint Security

CyberSaint’s CyberStrong Platform empowers organizations to implement automated, intelligent cybersecurity compliance and risk management.

Root9B (R9B)

Root9B (R9B)

R9B offers advanced cybersecurity products, services, and training to enhance the way organizations protect their networks.

Caveonix

Caveonix

Caveonix’s RiskForesight TM solution is an automated, proactive risk and compliance platform designed for hybrid and multi-cloud.

ThreatModeler

ThreatModeler

ThreatModeler is an automated threat modeling solution that fortifies an enterprise’s Software Development Lifecycle by identifying, predicting and defining threats.

SecureNation

SecureNation

SecureNation offers a wide variety of cutting-edge technologies and IT services to address almost any of your information security, network security and information assurance needs.

Stealth-ISS Group

Stealth-ISS Group

Stealth–ISS Group is your extended IT, cyber security, risk and compliance team, providing strategic guidance, engineering and audit services, along with technical remediation and security operations.

Dawgen Global

Dawgen Global

Dawgen Global is an integrated multidisciplinary professional service firm in the Caribbean Region providing a range of services including Risk Management and Information Systems Assurance.

Boecore

Boecore

Boecore is an aerospace and defense engineering company that specializes in software solutions, systems engineering, cybersecurity, enterprise networks, and mission operations.

Pulsar Security

Pulsar Security

Pulsar Security is a team of highly skilled, offensive cybersecurity professionals with the industry's most esteemed credentials and advanced real-world experience.

Internet Watch Foundation (IWF)

Internet Watch Foundation (IWF)

Since the early days of the internet, our job has been to help child victims of sexual abuse by hunting down and removing any online record of the abuse.