DNC email server hacked in 2015 says private security firm that did analysis

By: (plus.google.com) +David Herron; Date: November 8, 2017

Tags: Russia » Election Hacks

The hack of the Democratic National Committee's email service proved crucial to the leaks that brought down the Clinton Campaign in 2016. It's well known that the DNC's IT department ignored warnings from the NSA and FBI for several months. They then turned to a private company, CrowdStrike, because they couldn't trust the FBI to treat them fairly -- given what was going on concerning the FBI investigation into Hillary Clinton's email policies as Secretary of State. CrowdStrike had in its staff a highly experience cyber-security sleuth who had dealt with this sort of attack previously.

The hack is tied to Russians because of the sort of malware that was infiltrated into the server systems. The fingerprints on that malware are associated with a group named APT 29, which is believed to be associated with Russian Intelligence agencies.

With the malware in place, APT 29 installed configurations into the email servers so that every email sent through the DNC's email system was also forwarded to another email address somewhere else. In other words, some other entity had received a years worth of DNC's internal communications.

Back in June 2016, CrowdStrike published information about the attack on their blog. They identified two sources of attack on the DNC servers -

  • COZY BEAR (also referred to in some industry reports as CozyDuke or APT 29)
  • FANCY BEAR (also known as Sofacy or APT 28)

Both are hacking groups that are extremely well run, use sophisticated malware whose thoroughness indicates an extreme amount of testing and refinement, which in turn indicates a level of funding that can only be sustained by a "Nation State". They identify that Nation-State as Russia.

The APT 29 group was behind the hack of the Joint Chiefs of Staff and other computers deep in the US Federal Government. The DNC hack may have been part of that same hacking project.

That the DNC hasn't allowed the FBI et al to examine their servers has been controversial.


(www.buzzfeed.com) https://www.buzzfeed.com/jasonleopold/he-solved-the-dnc-hack-now-hes-telling-his-story-for-the

(www.crowdstrike.com) https://www.crowdstrike.com/blog/bears-midst-intrusion-democratic-national-committee/

(www.ecfr.eu) http://www.ecfr.eu/publications/summary/putins_hydra_inside_russias_intelligence_services

(www.cnn.com) http://www.cnn.com/2015/03/10/politics/state-department-hack-worst-ever/

« Facebook exploits vulnerabilities in human psychology, says early President of Facebook Review of the Orange Pi Zero Plus2 - incredibly tiny but uncertain of its usability »
2016 Election Acer C720 Ad block AkashaCMS Amazon Amazon Kindle Amiga Android Anti-Fascism AntiVirus Software Apple Apple Hardware History Apple iPhone Apple iPhone Hardware April 1st Arduino ARM Compilation Astronomy Asynchronous Programming Authoritarianism Automated Social Posting Ayo.JS Bells Law Big Brother Big Finish Bitcoin Mining Black Holes Blade Runner Blockchain Blogger Blogging Books Botnet Botnets Cassette Tapes Cellphones Christopher Eccleston Chrome Chrome Apps Chromebook Chromebooks Chromebox ChromeOS CIA CitiCards Citizen Journalism Civil Liberties Clinton Cluster Computing Command Line Tools Comment Systems Computer Hardware Computer Repair Computers Cross Compilation Crouton Cryptocurrency Curiosity Rover Cyber Security Cybermen Daleks Darth Vader Data backup Data Storage Database Database Backup Databases David Tenant DDoS Botnet Detect Adblocker Developers Editors Digital Photography Diskless Booting Disqus DIY DIY Repair DNP3 Do it yourself Docker Docker MAMP Docker Swarm Doctor Who Doctor Who Paradox Drobo Drupal Drupal Themes DVD E-Books E-Readers Early Computers Election Hacks Electric Bicycles Electric Vehicles Electron Emdebian Encabulators Energy Efficiency Enterprise Node EPUB ESP8266 Ethical Curation Eurovision Event Driven Asynchronous Express Facebook Fake News Fedora VirtualBox File transfer without iTunes FireFly Fraud Freedom of Speech Gallifrey git Gitlab GMAIL Google Google Chrome Google Gnome Google+ Government Spying Great Britain Heat Loss Hibernate Hoax Science Home Automation HTTPS Human ID I2C Protocol Image Analysis Image Conversion Image Processing ImageMagick In-memory Computing InfluxDB Infrared Thermometers Insulation Internet Internet Advertising Internet Law Internet of Things Internet Policy Internet Privacy iOS Devices iPad iPhone iPhone hacking Iron Man Iternet of Things iTunes Java JavaScript JavaScript Injection JDBC John Simms Journalism Joyent Kaspersky Labs Kindle Kindle Marketplace Lets Encrypt LibreOffice Linux Linux Hints Linux Single Board Computers Logging Mac OS Mac OS X Machine Readable ID macOS MacOS X setup Make Money Online MariaDB Mars Matt Lucas MEADS Anti-Missile Mercurial Michele Gomez Micro Apartments Military Hardware Minification Minimized CSS Minimized HTML Minimized JavaScript Missy Mobile Applications MODBUS Mondas MongoDB Mongoose Monty Python MQTT Music Player Music Streaming MySQL NanoPi Nardole NASA Net Neutrality Node Web Development Node.js Node.js Database Node.js Testing Node.JS Web Development Node.x North Korea npm NY Times Online advertising Online Community Online Fraud Online Journalism Online Video Open Media Vault Open Source Governance Open Source Licenses Open Source Software OpenAPI OpenVPN Paywalls Personal Flight Peter Capaldi Photography PHP Plex Plex Media Server Political Protest Postal Service Power Control Privacy Production use Public Violence Raspberry Pi Raspberry Pi 3 Raspberry Pi Zero Recycling Refurbished Computers Remote Desktop Republicans Retro-Technology Reviews Right to Repair River Song Robotics Rocket Ships RSS News Readers rsync Russia Russia Troll Factory Russian Hacking SCADA Scheme Science Fiction Search Engine Ranking Season 1 Season 10 Season 11 Security Security Cameras Server-side JavaScript Shell Scripts Silence Simsimi Skype Social Media Social Media Warfare Social Networks Software Development Space Flight Space Ship Reuse Space Ships SpaceX Spear Phishing Spring Spring Boot SQLite3 SSD Drives SSD upgrade SSH SSH Key SSL Swagger Synchronizing Files Telescopes Terrorism The Cybermen The Daleks The Master Time-Series Database Torchwood Total Information Awareness Trump Trump Administration Trump Campaign Ubuntu UDOO Virtual Private Networks VirtualBox VLC VNC VOIP Web Applications Web Developer Resources Web Development Web Development Tools Web Marketing Website Advertising Weeping Angels WhatsApp Window Insulation Wordpress YouTube YouTube Monetization