Hacking

Guccifer 2.0 leaks personal data of nearly 200 Congressional Democrats

Guccifer 2.0, the alleged hacker behind the DNC hack released another trove of documents about House Democrats, including Nancy Pelosi’s sensitive data.

The hack to the US Presidential election is becoming even more mysterious, while security experts are blaming the Russia for the cyber espionage, a strange figure claims the responsibility for the security breach.

He is Guccifer 2.0, an alleged lone wolf that was behind the attack against the Democratic National Committee (DNC). According to the security company CrowdStrike, the attack wasn’t the result of the action of a lone wolf, instead, two sophisticated Russian espionage groups, COZY BEAR and FANCY BEAR were involved in the cyber espionage operation.

Guccifer 2.0 is a play on a Romanian hacker calling himself Guccifer, which is believed to be the man behind hacking into Hillary Clinton’s personal email server.

Guffifer 2.0 ’s blog questions CrowdStrike’s conclusion that those behind the DNC attacks were sophisticated stating,

“I’m very pleased the company appreciated my skills so highly))) But in fact, it was easy, very easy.”

That’s not all.  To prove his point, Guccifer 2.0 released several sensitive DNC documents including donor lists, strategy lists, and even a document titled “NATIONAL SECURITY TRANSITION PLANNING” detailing a timeline of activities of transitioning Secretary Hilary Clinton into the role of President after the November election.

Now Guccifer 2.0 took credit also for hacking into the Democratic Congressional Campaign Committee (DCCC) that was reported by the Reuters at the end of July.

Yesterday Guccifer 2.0 published on his blog a huge amount of personal information belonging to nearly 200 Democratic House members.

“It’s time for new revelations now. All of you may have heard about the DCCC hack. As you see I wasn’t wasting my time! It was even easier than in the case of the DNC breach.

As you see the U.S. presidential elections are becoming a farce, a big political performance where the voters are far from playing the leading role. Everything is being settled behind the scenes as it was with Bernie Sanders.” wrote Guccifer 2.0.

“I wonder what happened to the true democracy, to the equal opportunities, the things we love the United States for. The big money bags are fighting for power today. They are lying constantly and don’t keep their word. The MSM are producing tons of propaganda  hiding the real stuff behind it. But I do believe that people have right to know what’s going on inside the election process in fact.

To make a long story short, here are some DCCC docs from their server. Make use of them.”

The hacker published several documents that include mobile phone numbers, personal e-mail addresses, home addresses, names of staffers, and other personal information of several. Democratic representatives.

The data dump also includes several memos from House Minority Leader Nancy Pelosi’s personal computer, the documents also include detailed information on fundraisers.

Guccifer 2.0 leaked online also the passwords of several DCCC accounts, including shared passwords used by the committee.

Guccifer 2.0 denies any link with the Kremlin and he continues to make fun of American politicians.

After the embarrassing data leakage, Representative of the House Permanent Select Committee on Intelligence Adam Schiff released the following statement:

“The unauthorized disclosure of people’s personally identifiable information is never acceptable, and we can fully expect the authorities will be investigating the posting of this information.” said Schiff.

Experts who have already analyzed the trove of documents in the latest data dump said that it doesn’t include uncomfortable truths.

Stay Tuned.

[adrotate banner=”9″] [adrotate banner=”12″]

Pierluigi Paganini

(Security Affairs – Guccifer 2.0, DNC hack)

[adrotate banner=”5″]

[adrotate banner=”13″]

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

Fintech firm Figure disclosed data breach after employee phishing attack

Fintech firm Figure confirmed a data breach after hackers used social engineering to trick an…

20 hours ago

U.S. CISA adds a flaw in BeyondTrust RS and PRA to its Known Exploited Vulnerabilities catalog

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds a flaw in BeyondTrust RS and…

21 hours ago

Suspected Russian hackers deploy CANFAIL malware against Ukraine

A new alleged Russia-linked APT group targeted Ukrainian defense, government, and energy groups, with CANFAIL…

1 day ago

New threat actor UAT-9921 deploys VoidLink against enterprise sectors

A new threat actor, UAT-9921, uses the modular VoidLink framework to target technology and financial…

2 days ago

Attackers exploit BeyondTrust CVE-2026-1731 within hours of PoC release

Attackers quickly targeted BeyondTrust flaw CVE-2026-1731 after a PoC was released, enabling unauthenticated remote code…

2 days ago

Google: state-backed hackers exploit Gemini AI for cyber recon and attacks

Google says nation-state actors used Gemini AI for reconnaissance and attack support in cyber operations.…

2 days ago

This website uses cookies.