Attacks/Breaches

3/2/2018
12:44 PM
50%
50%

Mueller May Indict Russians Who Hacked DNC

Special counsel is compiling a case against the hackers who breached the DNC and John Podesta's email account, NBC News reports.

Another shoe could soon drop: special counsel Robert Mueller reportedly is putting together a criminal case against Russian hackers behind the breach and leak of emails of the Democratic National Committee (DNC) and Clinton campaign chair John Podesta during the 2016 presidential campaign, according to an NBC News report.

That means a potential indictment or multiple indictments that could provide some of the first public details of the people and methods used by Russian state actors to hack the DNC email system and Podesta's account, as well as how they then leaked information via WikiLeaks. Last month, Mueller dropped an indictment on 13 people involved with The Internet Research Agency, a Russian organization that "had a strategic goal to sow discord in the U.S. political system, including the 2016 U.S. presidential election," according to that indictment.

A source told NBC News that if Mueller issues this second indictment, it could include information on any Americans who assisted or were duped into assisting the Russian hacking operation. Most likely, the indictment would refer to those Americans as "unnamed" individuals, however.

Read more here

 

Black Hat Asia returns to Singapore with hands-on technical Trainings, cutting-edge Briefings, Arsenal open-source tool demonstrations, top-tier solutions and service providers in the Business Hall. Click for information on the conference and to register.

Dark Reading's Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
sporter117
0%
100%
sporter117,
User Rank: Apprentice
3/7/2018 | 4:55:34 PM
Re: Wrong collusion
Agreed...

Want to look like a russian, hack a russian computer then attack your target...

51% of attacks are insiders, so I have always felt Seth Rich was the likely suspect.

Especially since he was killed while being robbed, yet his wallet was left on him with cash in it.

 
REISEN1955
0%
100%
REISEN1955,
User Rank: Ninja
3/5/2018 | 12:35:22 PM
Wrong collusion
Russian Hackers have done alot but they did not hack the DNC on first crack - that data breach was a (now dead) DNC staffer who handed Julian Assange a ton of information.  Physical transfer of data.  Hand to hand.  Assange has said so over and over and so far NOBODY HAS FOUND HIM WRONG.   They do not like his methods but he tells truth.  Personally I think of him as Ernst Stavro Blofeld --- all he needs is a Nehru jacket and a white cat.  Now the DNC was hacked in other areas later on.  Podesta and Madame Oven Mitt's famous server. 
SchemaCzar
0%
100%
SchemaCzar,
User Rank: Strategist
3/3/2018 | 3:35:21 PM
Since when are Russian hackers stupid enough to leak their own phishing emails?
Blaming the Russians for wikileaks is ridiculous.  Advanced cyber war teams for nation-states don't leave tracks.  Yes, Podesta was stupid enough to fall for a trivial phishing scam, but how stupid would it be to release the emails that included your own phishing breach?  Too stupid for Russians.

Wikileaks says it received the emails as a leak from someone authorized to see that information.  The emails were genuine. Why would Wikileaks jeopardize its own credibility by lying about its sources?
Crowdsourced vs. Traditional Pen Testing
Alex Haynes, Chief Information Security Officer, CDL,  3/19/2019
BEC Scammer Pleads Guilty
Dark Reading Staff 3/20/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: Well, at least it isn't Mobby Dick!
Current Issue
5 Emerging Cyber Threats to Watch for in 2019
Online attackers are constantly developing new, innovative ways to break into the enterprise. This Dark Reading Tech Digest gives an in-depth look at five emerging attack trends and exploits your security team should look out for, along with helpful recommendations on how you can prevent your organization from falling victim.
Flash Poll
The State of Cyber Security Incident Response
The State of Cyber Security Incident Response
Organizations are responding to new threats with new processes for detecting and mitigating them. Here's a look at how the discipline of incident response is evolving.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-20165
PUBLISHED: 2019-03-22
Cross-site scripting (XSS) vulnerability in OpenText Portal 7.4.4 allows remote attackers to inject arbitrary web script or HTML via the vgnextoid parameter to a menuitem URI.
CVE-2019-1716
PUBLISHED: 2019-03-22
A vulnerability in the web-based management interface of Session Initiation Protocol (SIP) Software for Cisco IP Phone 7800 Series and Cisco IP Phone 8800 Series could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition or execute arbitrary code. The vulnerability ...
CVE-2019-1763
PUBLISHED: 2019-03-22
A vulnerability in the web-based management interface of Session Initiation Protocol (SIP) Software for Cisco IP Phone 8800 Series could allow an unauthenticated, remote attacker to bypass authorization, access critical services, and cause a denial of service (DoS) condition. The vulnerability exist...
CVE-2019-1764
PUBLISHED: 2019-03-22
A vulnerability in the web-based management interface of Session Initiation Protocol (SIP) Software for Cisco IP Phone 8800 Series could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack. The vulnerability is due to insufficient CSRF protections for the ...
CVE-2019-1765
PUBLISHED: 2019-03-22
A vulnerability in the web-based management interface of Session Initiation Protocol (SIP) Software for Cisco IP Phone 8800 Series could allow an authenticated, remote attacker to write arbitrary files to the filesystem. The vulnerability is due to insufficient input validation and file-level permis...