Intelligence

Clinton campaign servers were accessed as part of DNC hack

Media outlet continues to publish news regarding the DNC hack, computer servers used by Clinton campaign were compromised as part of DNC hack.

The news of the recent Democratic National Convention (DNC) hack is monopolizing the technological debate around the US presidential campaign.

Yesterday I reported the news of another hack against the operation of the DNC, according to the Reuters, the FBI is investigating a security breach of the systems of the Democratic Congressional Campaign Committee (DCCC).

While I was reporting the news of the DCCC hack, the Associated Press confirmed that the computer systems used by Hillary Clinton’s staff for the presidential campaign were hacked too as part of the DNC hack.

Last week Wikileaks published the first lot of 20,000 emails from top DNC officials announcing more to come. In response to the data leakage the DNC Chairwoman Debbie Wasserman Schultz resigned as the group’s leader

Assange is against the idea to have Hillary Clinton as the new president of the United States, he also declared that he had “a lot more material” about her presidential campaign that could lead the  indictment of Hillary Clinton.

It is likely that more data from the Clinton’s presidential campaign would be included in the next part of the Hillary Leaks series.

Who is behind the hack?

Security experts from CrowdStrike, Mandiant, Fidelis and the FBI believe that the Russian intelligence is behind the DNC hack, it operated to influence the presidential election and advantage Donald Trump who has had an interesting relationship with Vladimir Putin.

There is also the possibility that the DNC hack is just the result of an ordinary cyber espionage campaign launched by the Kremlin.

The above companies analyzed the systems compromised in the DNC hack and found strong evidence of the Russian Government involvement.

According to the forensic analysis conducted by the security firm CrowdStrike, the DNC servers were hacked on April 2016 by Russian nation-state hackers.

According to the firm, the Fancy Bear APT (aka APT28 and Pawn Storm) used a strain of malware called X-Tunnel to exfiltrate data from the hacked systems.

Experts from Invincea published an interesting report about the DNC hack, focusing on the X-Tunnel malware used by hackers to steal sensitive data from the DNC servers. The X-Tunnel appeared to be a repurposed open source tool from a Chinese company that hasn’t provided further information about the alleged the Russian origins of the XTunnel binary.

“The Invincea Deep Learning analysis neither supports nor refutes the Russian origins of the XTunnel binary.  The binary appears to be a repurposed open source tool that was used for nefarious purposes within the DNC.” reads the report published by Invincea.

“Previous reports from Crowdstrike and others note that the XTunnel tool was used to maintain network connectivity.  Whether the XTunnel tool was used for additional purposes as its capabilities suggest is unknown, but it had the potential to support a full range of additional activity.”

What’s the next?

Security experts, including the notorious Bruce Schneier warn about possible attacks against the American voting machines during the presidential machine.

Give a look to the article titled “By November, Russian hackers could target voting machines” published by the Washington Post

“Even more important, we need to secure our election systems before autumn. If Putin’s government has already used a cyberattack to attempt to help Trump win, there’s no reason to believe he won’t do it again — especially now that Trump is inviting the “help.”

Stay Tuned.

[adrotate banner=”9″] [adrotate banner=”12″]

Pierluigi Paganini

(Security Affairs – US Presidential Election 2016, DNC hack)

[adrotate banner=”5″]

[adrotate banner=”13″]

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

New Signal update stops Windows from capturing user chats

Signal implements new screen security on Windows 11, blocking screenshots by default to protect user…

1 hour ago

Law enforcement dismantled the infrastructure behind Lumma Stealer MaaS

Microsoft found 394,000 Windows systems talking to Lumma stealer controllers, a victim pool that included…

6 hours ago

Russia-linked APT28 targets western logistics entities and technology firms

CISA warns Russia-linked group APT28 is targeting Western logistics and tech firms aiding Ukraine, posing…

9 hours ago

A cyberattack was responsible for the week-long outage affecting Cellcom wireless network

Cellcom, a regional wireless carrier based in Wisconsin (US), announced that a cyberattack is the…

19 hours ago

Coinbase data breach impacted 69,461 individuals

Cryptocurrency exchange Coinbase announced that the recent data breach exposed data belonging to 69,461 individuals.…

1 day ago

U.S. CISA adds Ivanti EPMM, MDaemon Email Server, Srimax Output Messenger, Zimbra Collaboration, and ZKTeco BioTime flaws to its Known Exploited Vulnerabilities catalog

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds Ivanti EPMM, MDaemon Email Server, Srimax Output…

1 day ago